3,294 research outputs found

    Threats and countermeasures for network security

    Get PDF
    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented

    It's the protocol, stupid!

    Get PDF

    Privacy and Power: Computer Databases and Metaphors for Information Privacy

    Get PDF
    Journalists, politicians, jurists, and legal academics often describe the privacy problem created by the collection and use of personal information through computer databases and the Internet with the metaphor of Big Brother - the totalitarian government portrayed in George Orwell\u27s Nineteen Eighty-Four. Professor Solove argues that this is the wrong metaphor. The Big Brother metaphor as well as much of the law that protects privacy emerges from a longstanding paradigm for conceptualizing privacy problems. Under this paradigm, privacy is invaded by uncovering one\u27s hidden world, by surveillance, and by the disclosure of concealed information. The harm caused by such invasions consists of inhibition, self-censorship, embarrassment, and damage to one\u27s reputation. Privacy law has developed with this paradigm in mind, and consequently, it has failed to adapt to grapple effectively with the database problem. Professor Solove argues that the Big Brother metaphor merely reinforces this paradigm and that the problem is better captured by Franz Kafka\u27s The Trial. Understood with the Kafka metaphor, the problem is the powerlessness, vulnerability, and dehumanization created by the assembly of dossiers of personal information where individuals lack any meaningful form of participation in the collection and use of their information. Professor Solove illustrates that conceptualizing the problem with the Kafka metaphor has profound implications for the law of information privacy as well as which legal approaches are taken to solve the problem

    Too Many Secrets: Challenges to the Control of Strong Crypto and the National Security Perspective

    Get PDF

    It's the protocol, stupid!

    Get PDF

    CheckUp

    Get PDF
    https://scholarlyworks.lvhn.org/checkup/1446/thumbnail.jp

    CSI Las Vegas: Privacy, Policing, and Profiteering in Casino Structured Intelligence

    Get PDF
    This Article argues that the intricate, vast amounts of consumer information compiled through casino structured intelligence require greater protection and oversight in the contexts of both bankruptcy and law enforcement. Section II examines the various types of casino technology and information gathering that casinos perform. Section III considers the available protections of private information in terms of security breaches, law enforcement sharing, and sales in the context of a bankruptcy. Section IV discusses additional safeguards and ethical concerns that should be considered as casinos continue to increase their data mining efforts. Finally, Section V concludes that, minimally, consumers are entitled to more candid disclosures and a meaningful opportunity to protect their own privacy

    Recognizing the Societal Value in Information Privacy

    Get PDF
    Much has been written about database privacy in the Internet Age, most of it critical of the way in which the American legal system addresses the issue. In this article, Professor Nehf maintains that one of the fundamental difficulties with the public policy debates is that information privacy is often discussed as a typical consumer problem rather than a problem of more general societal concern. As a result, arguments over appropriate resolutions reduce to a balancing of individual rights against more general societal interests, such as increased efficiency in law enforcement, government operations or commercial enterprise. Although privacy scholars discussed the societal value of information privacy in the 1960s and early 1970s, the concept was not fully developed. More recently, political theorists have revived the idea and argue the importance of recognizing privacy as a societal norm. Professor Nehf adopts a functional analysis that compares information privacy to other societal values, such as environmental protection, and concludes that privacy policy could take a different form if the issue were viewed in this way

    The Cowl - v.56 - n.14 - Feb 12, 1992

    Get PDF
    The Cowl - student newspaper of Providence College. Volume 56, Number 14 - February 12, 1992. 24 pages
    • …
    corecore