49,119 research outputs found

    A Network-Economic Policy Study of Identity Management Systems and Implications for Security and Privacy Policy

    Get PDF
    Solving the problems associated with identity management in the “virtual” world is proving to be one of the keys to full realization of the economic and social benefits of networked information systems. By definition, the virtual world lacks the rich combination of sensory and contextual cues that permit organizations and individual humans interacting in the physical world to reliably identify people and authorize them to engage in certain transactions or access specific resources. Being able to determine who an online user is and what they are authorized to do thus requires an identity management infrastructure. Some of the most vexing problems associated with the Internet (the deluge of spam, the need to regulate access to certain kinds of content, securing networks from intrusion and disruption, problems of inter-jurisdictional law enforcement related to online activities, impediments to the sharing of distributed computing resources) are fundamentally the problems of identity management. And yet, efforts by organizations and governments to solve those problems by producing and consuming identity systems may create serious risks to freedom and privacy. Thus the implementation and maintenance of identity management systems raises important public policy issues. The identity management systems (the IMS-s) often tend to require more information from the consumers than would otherwise be necessary for the authentication purposes. The typical choice being analyzed in IMS is the one between a completely centralized or integrated system (one ID - one password, and a single sign-on) and the one comprising a plethora of (highly) specialized IMS-s (multiple ID-s and passwords). While the centralized system is the most convenient one, it is also likely to require too much personal information about the users, which may infringe on their rights to privacy and which definitely will result in serious damage should this personal information be stolen and/or abused. When more than two IMS-s interconnect (more of a practical side with various types of commercial values), they share the private information with each other, thus increasing consumers’ exposure to possible information misuse. It is thus rather obvious that the public policy plays an important role to maintain the structure of identity management systems ensuring the existence of a sound balance between the authentication requirements and consumers’ rights to privacy. The focus of this paper is on investigating this type of tradeoff by employing a theoretical framework with agents whose utility depends on the amount of private information revealed, and on making policy recommendations related to the issue of interconnection between alternative IMS-s. Our model derives optimal process of interconnection between IMS-s in the simple case of three IMS-s, then generalizing it to the case of more than three firms. The socially optimal outcome of the interconnection process in our model implies encouraging the interconnection between smaller rather than larger IMS-s.Networks; Interconnection; Identity Management; Regulation Policy

    To be or not to be, the importance of Digital Identity in the networked society

    Get PDF
    The emergence of the web has had a deep impact at different levels of our society, changing the way people connect, interact, share information, learn and work. In the current knowledge economy, participatory media seems to play an important part in everyday interactions. The term “digital identity” is becoming part of both our lexicon and our lives. This paper explores some of the aspect s regarding approaches and practices of educators, using web technologies to foster their digital identity within their networks and, at the same time, developing a social presence to complement their professional and academic profiles. In fact, we think it is imperative to discuss the relationship between our social presence and our professional life, as online the two are often intertwined. We present the issues the web poses through dichotomies: open or closed, genuine or fake, single or multiple. We also comment on different approaches to these dichotomies through examples extracted from recent projects, drawing from user’s experiences in building their digital identities. This paper looks at the importance of digital identity in the current networked society, by reviewing the contemporaneous scenario of the participatory web, raising a set of questions about the advantages and implication of consciously developing one’s digital identity, thus opening the discussion regarding openness, uniqueness and integrity in connection with one’s digital identity. This paper is also a reflection of thinking and practice in progress, drawing from examples and real-life situations observed in a diversity of projects. The issue could be reduced, perhaps, to whether one consciously becomes a part of the digital world or not, and how that participation is managed. It is up to us to manage it wisely, and guide knowledge workers in their journey to create theirs

    Information and communication in a networked infosphere: a review of concepts and application in social branding

    Get PDF
    This paper aims at providing a contribution to the comprehensive review of the impact of information and communication, and their supporting technologies, in the current transformation of human life in the infosphere. The paper also offers an ex- ample of the power of new social approaches to the use of information and commu- nication technologies to foster new working models in organizations by presenting the main outcomes of a research project on social branding. A discussion about some trends of the future impact of new information and communication technologies in the infosphere is also included

    Sharing economy vs sharing cultures? Designing for social, economic and environmental good

    Get PDF
    This paper explores the story behind a crowdfunding service as an example of sharing technology. Research in a small neighborhood of London showed how locally-developed initiatives can differ in tone, scale, ambition and practice to those getting attention in the so-called sharing economy. In local accounts, we see an emphasis on organizing together to create shared spaces for collaborative use of resources and joint ownership of projects and places. Whereas, many global business models feature significant elements of renting, leasing and hiring and focus only on resource management, sometimes at the expense of community growth. The service we discuss is based in the area we studied and has a collective model of sharing, but hopes to be part of the new global movement. We use this hybridity to problematize issues of culture, place and scalability in developing sharing resources and addressing sustainability concerns. We relate this to the motivation, rhetoric and design choices of other local sharing enterprises and other global sharing economy initiatives, arguing, in conclusion, that there is no sharing economy, but a variety of new cultures being fostered

    Building the HIVe: disrupting biomedical HIV and AIDS research with gay men, other men who have sex with men (MSM) and transgenders

    Get PDF
    Networked and digital technologies now mediate the sexual behaviors of many gay men, other men that have sex with men and transgenders, challenging the effectiveness of biomedical HIV/AIDS research and prevention practices. Driven by the normative positivist philosophy of science, these approaches—while paramount to fighting the epidemic—have neglected to rethink their ontological and epistemological assumptions when confronting the social drivers of HIV. Building the HIVe responds by forefronting community-based and led sociological HIV/AIDS research and prevention that addresses digitally mediated and driven sexual behaviors. The HIVe disrupts biomedical approaches by building an accessible and dynamic social science research community engaged in reflexive performativity to improve the health and human rights of marginalized communities disproportionately at risk of HIV/AIDS

    Why Youth (heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life

    Get PDF
    Part of the Volume on Youth, Identity, and Digital Media Social network sites like MySpace and Facebook serve as "networked publics." As with unmediated publics like parks and malls, youth use networked publics to gather, socialize with their peers, and make sense of and help build the culture around them. This article examines American youth engagement in networked publics and considers how properties unique to such mediated environments (e.g., persistence, searchability, replicability, and invisible audiences) affect the ways in which youth interact with one another. Ethnographic data is used to analyze how youth recognize these structural properties and find innovative ways of making these systems serve their purposes. Issues like privacy and impression management are explored through the practices of teens and youth participation in social network sites is situated in a historical discussion of youth's freedom and mobility in the United States

    The Internet of Things Will Thrive by 2025

    Get PDF
    This report is the latest research report in a sustained effort throughout 2014 by the Pew Research Center Internet Project to mark the 25th anniversary of the creation of the World Wide Web by Sir Tim Berners-LeeThis current report is an analysis of opinions about the likely expansion of the Internet of Things (sometimes called the Cloud of Things), a catchall phrase for the array of devices, appliances, vehicles, wearable material, and sensor-laden parts of the environment that connect to each other and feed data back and forth. It covers the over 1,600 responses that were offered specifically about our question about where the Internet of Things would stand by the year 2025. The report is the next in a series of eight Pew Research and Elon University analyses to be issued this year in which experts will share their expectations about the future of such things as privacy, cybersecurity, and net neutrality. It includes some of the best and most provocative of the predictions survey respondents made when specifically asked to share their views about the evolution of embedded and wearable computing and the Internet of Things

    Talking to the Empowered Consumer Dealing with the Shift of Power

    Get PDF
    The concept of the empowered consumer cannot be considered as a field of exact scientific research yet. Nevertheless, it has become part of scholars’ interest and gains more and more importance in the research of organisational relationships with customers. It is suggested that two influencing criteria are especially at the forefront: The emergence of the Internet, which effected that barriers to collect and to disseminate information across boundaries were decisively reduced. As a consequence consumers could organise globally and collect and exchange information and experiences about organisations and their products. Furthermore, flexible interactivity between companies and consumers, but particularly from consumers to consumers enable direct interaction changing many previously established rules of doing business. Due to these new opportunities new business models developed and the proposition is that intangible values such as reputation gained even more importance and influence tangible outcomes. Suggestions are that 1.), this concept links communication, corporate behaviour and legitimacy of activities influencing reputation as a driver of value. 2.), reputation as a corporate asset can be managed but it is beyond the pure control of an organisation. 3.), reputation is part of public perception, which an organisation has to build, maintain and expand depending on communicative abilities and willingness to accept consumers as a centre of power. The following discussion will present Grunig et al.’s communication model explaining changed organisational challenges. It is put forward as a framework for marketing for times in which online opportunities added to the earlier b2b and b2c models c2c and P2P considerations and architectures. The annual studies of the market research institute puls undertaking regular representative research among German consumers since November 2005 will present evidence for the relationship of improved prices, which may be achieved, and the perception a firm possesses. This paper deals mostly with German examples and data, but the hypothesis is that a) the general situation in other Western countries is alike, but needs b) specific additional research, since cultural differences are expected to have a considerable influence, especially when criteria such as individualist and collectivist organisation of society and high and low context communication styles are involved. Hence, the results of the same study in different countries are therefore expected to present some variation. Additionally, the Cluetrain Manifesto challenges corporate behaviour of those companies still believing to have the ability to control information disseminated by and written about it. Examples provided will support the hypothesis that powerful consumers may have significant impact on organisational behaviour, decision-making and outcomes. Keywords: Empowered Consumer Concept, Symmetric Two-way communication, Reputation, c2c, P2

    Configuring the Networked Citizen

    Get PDF
    Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies code as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what public design obligations might follow from such a conclusion. Others have argued that code belongs firmly on the private side of the public/private divide because it originates in the innovative activity of private actors. In a forthcoming book, the author argues that the project of situating code within one or another part of the familiar constitutional landscape too often distracts legal scholars from more important questions about the quality of the regulation that networked digital architectures produce. The gradual, inexorable embedding of networked information technologies has the potential to alter, in largely invisible ways, the interrelated processes of subject formation and culture formation. Within legal scholarship, the prevailing conceptions of subjectivity tend to be highly individualistic, oriented around the activities of speech and voluntary affiliation. Subjectivity also tends to be understood as definitionally independent of culture. Yet subjectivity is importantly collective, formed by the substrate within which individuality emerges. People form their conceptions of the good in part by reading, listening, and watching—by engaging with the products of a common culture—and by interacting with one another. Those activities are socially and culturally mediated, shaped by the preexisting communities into which individuals are born and within which they develop. They are also technically mediated, shaped by the artifacts that individuals encounter in common use. The social and cultural patterns that mediate the activities of self-constitution are being reconfigured by the pervasive adoption of technical protocols and services that manage the activities of content delivery, search, and social interaction. In developed countries, a broad cross-section of the population routinely uses networked information technologies and communications devices in hundreds of mundane, unremarkable ways. We search for information, communicate with each other, and gain access to networked resources and services. For the most part, as long as our devices and technologies work as expected, we give little thought to how they work; those questions are understood to be technical questions. Such questions are better characterized as sociotechnical. As networked digital architectures increasingly mediate the ordinary processes of everyday life, they catalyze gradual yet fundamental social and cultural change. This chapter—originally published in Imagining New Legalities: Privacy and Its Possibilities in the 21st Century, edited by Austin Sarat, Lawrence Douglas, and Martha Merrill Umphrey (2012)—considers two interrelated questions that flow from understanding sociotechnical change as (re)configuring networked subjects. First, it revisits the way that legal and policy debates locate networked information technologies with respect to the public/private divide. The design of networked information technologies and communications devices is conventionally treated as a private matter; indeed, that designation has been the principal stumbling block encountered by constitutional theorists of technology. The classification of code as presumptively private has effects that reach beyond debates about the scope of constitutional guarantees, shaping views about the extent to which regulation of technical design decisions is normatively desirable. This chapter reexamines that discursive process, using lenses supplied by literatures on third-party liability and governance. Second, this chapter considers the relationship between sociotechnical change and understandings of citizenship. The ways that people think, form beliefs, and interact with one another are centrally relevant to the sorts of citizens that they become. The gradual embedding of networked information technologies into the practice of everyday life therefore has important implications for both the meaning and the practice of citizenship in the emerging networked information society. If design decisions are neither merely technical nor presumptively private, then they should be subject to more careful scrutiny with regard to the kind of citizen they produce. In particular, policy-makers cannot avoid engaging with the particular values that are encoded
    • 

    corecore