120 research outputs found

    Security Analysis: A Critical Thinking Approach

    Get PDF
    Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material includes techniques for analyzing beliefs and political cultures. The book also functions as an introduction to Foreign Policy and Security Studies.https://encompass.eku.edu/ekuopen/1005/thumbnail.jp

    Minding the Gap: Computing Ethics and the Political Economy of Big Tech

    Get PDF
    In 1988 Michael Mahoney wrote that “[w]hat is truly revolutionary about the computer will become clear only when computing acquires a proper history, one that ties it to other technologies and thus uncovers the precedents that make its innovations significant” (Mahoney, 1988). Today, over thirty years after this quote was written, we are living right in the middle of the information age and computing technology is constantly transforming modern living in revolutionary ways and in such a high degree that is giving rise to many ethical considerations, dilemmas, and social disruption. To explore the myriad of issues associated with the ethical challenges of computers using the lens of political economy it is important to explore the history and development of computer technology

    Technical Debt is an Ethical Issue

    Get PDF
    We introduce the problem of technical debt, with particular focus on critical infrastructure, and put forward our view that this is a digital ethics issue. We propose that the software engineering process must adapt its current notion of technical debt – focusing on technical costs – to include the potential cost to society if the technical debt is not addressed, and the cost of analysing, modelling and understanding this ethical debt. Finally, we provide an overview of the development of educational material – based on a collection of technical debt case studies - in order to teach about technical debt and its ethical implication

    Proceedings of the ETHICOMP 2022: Effectiveness of ICT ethics - How do we help solve ethical problems in the field of ICT?

    Get PDF
    This Ethicomp is again organized in exceptional times. Two previous ones were forced to turn to online conferences because of Covid-pandemic but it was decided that this one would be the physical one or cancelled as the need for real encounters and discussion between people are essential part of doing philosophy. We need possibility to meet people face to face and even part of the presentation were held distance–because of insurmountable problems of arriving by some authors– we manage to have real, physical conference, even the number of participants was smaller than previous conferences.The need of Ethicomp is underlined by the way world nowadays is portrayed for us. The truthfulness and argumentation seem to be replaced by lies, strategic games, hate and disrespect of humanity in personal, societal and even global communication. EThicomp is many times referred as community and therefore it is important that we as community do protect what Ethicomp stands for. We need to seek for goodness and be able to give argumentation what that goodness is. This lead us towards Habermass communicative action and Discourse ethics which encourages open and respectful discourse between people (see eg.Habermass 1984;1987;1996). However, this does not mean that we need to accept everything and everybody. We need to defend truthfulness, equality and demand those from others too. There are situations when some people should be removed from discussions if they neglect the demand for discourse. Because by giving voice for claims that have no respect for argumentation, lacks the respect of human dignity or are not ready for mutual understanding (or at least aiming to see possibility for it) we cannot have meaningful communication. This is visible in communication of all levels today and it should not be accepted, but resisted. It is duty of us all.</p

    “Be a Pattern for the World”: The Development of a Dark Patterns Detection Tool to Prevent Online User Loss

    Get PDF
    Dark Patterns are designed to trick users into sharing more information or spending more money than they had intended to do, by configuring online interactions to confuse or add pressure to the users. They are highly varied in their form, and are therefore difficult to classify and detect. Therefore, this research is designed to develop a framework for the automated detection of potential instances of web-based dark patterns, and from there to develop a software tool that will provide a highly useful defensive tool that helps detect and highlight these patterns

    Analyzing Network (Non-)Neutrality for Monopolistic, Competing, or Vertically Integrated Content Providers with a Unified Model

    Get PDF
    This paper deals with the hot and sensitive network neutrality debate. It designs a model simultaneously encompassing several scenarios regarding the content-providing market structure: a monopolistic content provider, competitive ones, and a vertically-integrated one facing a non vertically-integrated competitor. We each time compare the outputs when non-neutral, weak neutral or strong neutral policies are applied, in order to get insights regarding the possible consequences of each type of neutrality regulation

    Food and Drug Regulation: Statutory and Regulatory Supplement

    Get PDF
    This Statutory and Regulatory Supplement is intended for use with its companion casebook, Food and Drug Regulation: A Statutory Approach (2021). This is not a traditional statutory supplement. Instead, it contains selected, aggressively edited provisions of the Federal Food, Drug and Cosmetic Act (FFDCA), related statutes, and the Code of Federal Regulations. The Supplement includes all provisions assigned as reading in the casebook, as well as a few additional provisions that some professors may wish to cover. The excerpts are designed to be teachable rather than comprehensive.https://elibrary.law.psu.edu/fac_books/1029/thumbnail.jp

    Risk Management

    Get PDF
    Every business and decision involves a certain amount of risk. Risk might cause a loss to a company. This does not mean, however, that businesses cannot take risks. As disengagement and risk aversion may result in missed business opportunities, which will lead to slower growth and reduced prosperity of a company. In today's increasingly complex and diverse environment, it is crucial to find the right balance between risk aversion and risk taking. To do this it is essential to understand the complex, out of the whole range of economic, technical, operational, environmental and social risks associated with the company's activities. However, risk management is about much more than merely avoiding or successfully deriving benefit from opportunities. Risk management is the identification, assessment, and prioritization of risks. Lastly, risk management helps a company to handle the risks associated with a rapidly changing business environment

    Divergence in Architectural Research

    Get PDF
    ConCave Ph.D. Symposium 2020: Divergence in Architectural Research, March 5-6, 2020, Georgia Institute of Technology, Atlanta, GA.The essays in this volume have come together under the theme “Divergence in Architectural Research” and present a snapshot of Ph.D. research being conducted in over thirty architectural research institutions, representing fourteen countries around the world. These essays also provide a window into the presentations and discussions that took place March 5-6, 2020, during the ConCave Ph.D. Symposium “Divergence in Architectural Research,” under the auspices of the School of Architecture, Georgia Institute of Technology, in Atlanta, Georgia. On a preliminary reading, the essays respond to the call of divergence by doing just that; they present the great diversity of research topics, methodologies, and practices currently found under the umbrella of “architectural research.” They inform inquiry within architectural programs and across disciplinary concentrations, and also point to the ways that the academy, research methodologies, and the design profession are evolving and encroaching upon one another, with the unspoken hope of encouraging new relationships, reconfiguring previous assumptions about the discipline, and interweaving research and practice

    Latency-Sensitive Web Service Workflows: A Case for a Software-Defined Internet

    Full text link
    The Internet, at large, remains under the control of service providers and autonomous systems. The Internet of Things (IoT) and edge computing provide an increasing demand and potential for more user control for their web service workflows. Network Softwarization revolutionizes the network landscape in various stages, from building, incrementally deploying, and maintaining the environment. Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) are two core tenets of network softwarization. SDN offers a logically centralized control plane by abstracting away the control of the network devices in the data plane. NFV virtualizes dedicated hardware middleboxes and deploys them on top of servers and data centers as network functions. Thus, network softwarization enables efficient management of the system by enhancing its control and improving the reusability of the network services. In this work, we propose our vision for a Software-Defined Internet (SDI) for latency-sensitive web service workflows. SDI extends network softwarization to the Internet-scale, to enable a latency-aware user workflow execution on the Internet.Comment: Accepted for Publication at The Seventh International Conference on Software Defined Systems (SDS-2020
    • …
    corecore