8,673 research outputs found

    Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier

    Full text link
    As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property. Two parallel developments in academic data collection are converging: (1) open access requirements, whereby researchers must provide access to their data as a condition of obtaining grant funding or publishing results in journals; and (2) the vast accumulation of 'grey data' about individuals in their daily activities of research, teaching, learning, services, and administration. The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities are exploiting these data for research, learning analytics, faculty evaluation, strategic decisions, and other sensitive matters. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them. The privacy frontier facing research universities spans open access practices, uses and misuses of data, public records requests, cyber risk, and curating data for privacy protection. This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201

    Review of Computer Network Security System

    Get PDF
    Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. Keywords: Mitigation, Cryptography, Network, Securit

    Managing the Misinformation Marketplace: The First Amendment and the Fight Against Fake News

    Get PDF
    In recent years, fake news has overtaken the internet. Fake news publishers are able to disseminate false stories widely and cheaply on social media websites, amassing millions of likes, comments, and shares, with some fake news even “trending” on certain platforms. The ease with which a publisher can create and spread falsehoods has led to a marketplace of misinformation unprecedented in size and power. People’s vulnerability to fake news means that they are far less likely to receive accurate political information and are therefore unable to make informed decisions when voting. Because a democratic system relies on an informed populace to determine how it should act, fake news presents a unique threat to U.S. democracy. Although fake news threatens democratic institutions, First Amendment protections for false speech present a significant obstacle for regulatory remedies. This Note explores the ways these speech protections interfere with the government’s ability to protect political discourse—the process that enables it to function effectively—and proposes that the government regulate journalists to ensure that people can rely on legitimate news media to receive accurate information
    • …
    corecore