427 research outputs found

    \u27How\u27s My Driving?\u27 for Everyone (and Everything?)

    Get PDF
    This is a paper about using reputation tracking technologies to displace criminal law enforcement and improve the tort system. The paper contains an extended application of this idea to the regulation of motorist behavior in the United States and examines the broader case for using technologies that aggregate dispersed information in various settings where reputational concerns do not adequately deter antisocial behavior. The paper begins by exploring the existing data on “How’s My Driving?” programs for commercial fleets. Although more rigorous study is warranted, the initial data is quite promising, suggesting that the use of “How’s My Driving?” placards in commercial trucks is associated with fleet accident reductions ranging from 20% to 53%. The paper then proposes that all vehicles on American roadways be fitted with “How’s My Driving?” placards so as to collect some of the millions of daily stranger-on-stranger driving observations that presently go to waste. By delegating traffic regulation to the motorists themselves, the state might free up substantial law enforcement resources, police more effectively dangerous and annoying forms of driver misconduct that are rarely punished, reduce information asymmetries in the insurance market, improve the tort system, and alleviate road rage and driver frustration by providing drivers with opportunities to engage in measured expressions of displeasure. The paper addresses obvious objections to the displacement of criminal traffic enforcement with a system of “How’s My Driving?”-based civil fines. Namely, it suggests that by using the sorts of feedback algorithms that eBay and other reputation tracking systems have employed, the problems associated with false and malicious feedback can be ameliorated. Indeed, the false feedback problem presently appears more soluble in the driving context than it is on eBay. Driver distraction is another potential pitfall, but available technologies can address this problem, and the implementation of a “How’s My Driving?” for Everyone system likely would reduce the substantial driver distraction that already results from driver frustration and rubbernecking. The paper also addresses the privacy and due process implications of the proposed regime. It concludes by examining various non-driving applications of feedback technologies to help regulate the conduct of soldiers, police officers, hotel guests, and participants in virtual worlds, among others

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    The use of a user-centric smart mobile application prototype for supporting safety and security in a city: a design science method

    Get PDF
    Cities have always been the drivers of innovation, growth and change. Cities around the world are still rapidly expanding, especially on the African and Asian continents. Cape Town is one of those cities, where urbanisation rates are high, and crime is persisting at alarmingly high levels with crime rates being among the worst in the country and the world. Additionally, the city is home to 7 of 10 worst-performing police services in the country. Combining these factors, there is a need to look at ‘smart' ways of growth which includes facilitating a safe and secure city for citizens. Although Cape Town is pursuing smart initiatives, these have failed to place communities and individuals among the key stakeholders in the smart planning process. This research focuses on further researching smart city initiatives in Cape Town, placing citizens at the centre of the development process. As Cape Town's mobile phone penetration rate is high and access to Internet is rapidly expanding, this research aims to use crowdsourcing techniques for developing a smart mobile application prototype that is focused on enhancing community engagement and facilitating increased perceived feelings of safety and security for citizens. The study uses a Design Science Research method with Cape Town citizens as the main stakeholders, to propose an artifact based on their wishes, needs and current issues faced with regards to safety and security in the city. The proposed artifact focuses on enhancing community engagement, through a chat room and user-logged incident reports, as well as a customised safe route planning functionality where users can send emergency signals to comembers with the use of GPS live location tracking. The research shows participants are willing to adopt the use of the mobile application prototype, given there is substantial community buy-in, and the functionalities in the app are easy to use and quickly accessible. The study further identifies the need for better police follow up and involvement, as the city's police system could benefit from crowd-sourced crime-data in reducing the number of crimes in neighbourhoods to make citizens feel more safe and secure
    corecore