596 research outputs found

    A Critical Look at Decentralized Personal Data Architectures

    Full text link
    While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals. Developers, regulators, and consumer advocates have looked to alternative decentralized architectures as the natural response to threats posed by these centralized services. The result has been a great variety of solutions that include personal data stores (PDS), infomediaries, Vendor Relationship Management (VRM) systems, and federated and distributed social networks. And yet, for all these efforts, decentralized personal data architectures have seen little adoption. This position paper attempts to account for these failures, challenging the accepted wisdom in the web community on the feasibility and desirability of these approaches. We start with a historical discussion of the development of various categories of decentralized personal data architectures. Then we survey the main ideas to illustrate the common themes among these efforts. We tease apart the design characteristics of these systems from the social values that they (are intended to) promote. We use this understanding to point out numerous drawbacks of the decentralization paradigm, some inherent and others incidental. We end with recommendations for designers of these systems for working towards goals that are achievable, but perhaps more limited in scope and ambition

    The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

    Get PDF
    In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities.This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward

    Overcoming Human Trafficking via Operations Research and Analytics: Opportunities for Methods, Models, and Applications

    Get PDF
    Human trafficking is a transnational complex societal and economic issue. While human trafficking has been studied in a variety of contexts, including criminology, sociological, and clinical domains, to date there has been very little coverage in the operations research (OR) and analytics community. This paper highlights how operations research and analytics techniques can be used to address the growing issue of human trafficking. It is intended to give insight to operations research and analytics professionals into the unique concerns, problems, and challenges in human trafficking; the relevance of OR and analytics to key pillars of human trafficking including prevention, protection, and prosecution; and to discuss opportunities for OR and analytics to make a difference in the human trafficking domain. We maintain that a profound need exists to explore how operations research and analytics can be effectively leveraged to combat human trafficking, and set forth this call to action to inhibit its pervasiveness

    Online Privacy as a Collective Phenomenon

    Full text link
    The problem of online privacy is often reduced to individual decisions to hide or reveal personal information in online social networks (OSNs). However, with the increasing use of OSNs, it becomes more important to understand the role of the social network in disclosing personal information that a user has not revealed voluntarily: How much of our private information do our friends disclose about us, and how much of our privacy is lost simply because of online social interaction? Without strong technical effort, an OSN may be able to exploit the assortativity of human private features, this way constructing shadow profiles with information that users chose not to share. Furthermore, because many users share their phone and email contact lists, this allows an OSN to create full shadow profiles for people who do not even have an account for this OSN. We empirically test the feasibility of constructing shadow profiles of sexual orientation for users and non-users, using data from more than 3 Million accounts of a single OSN. We quantify a lower bound for the predictive power derived from the social network of a user, to demonstrate how the predictability of sexual orientation increases with the size of this network and the tendency to share personal information. This allows us to define a privacy leak factor that links individual privacy loss with the decision of other individuals to disclose information. Our statistical analysis reveals that some individuals are at a higher risk of privacy loss, as prediction accuracy increases for users with a larger and more homogeneous first- and second-order neighborhood of their social network. While we do not provide evidence that shadow profiles exist at all, our results show that disclosing of private information is not restricted to an individual choice, but becomes a collective decision that has implications for policy and privacy regulation

    The Prospects for Consumer-Oriented Social Media

    Get PDF
    The term \u27social media\u27 refers to a cluster of applications and online services that support human interaction and content broadcasting and sharing. Current services are isolated islands or \u27walled gardens\u27, and are based on a business model that is highly exploitative of individuals and their data. An alternative, consumer-oriented approach is feasible, involving open architecture, inter-operability and portability features, fair terms and privacy-sensitivity. Key impediments to the emergence of such services are identified, and means of overcoming the impediments are outlined.

    Technology and Labor Trafficking: in a Network Society - General Overview, Emerging Innovations, and Phillippines Case Study

    Get PDF
    New information and communication technologies (ICTs) have become an integral part of the networks that underpin labor trafficking in the 21st Century. Yet little research exists on the impact of technology in exacerbating or addressing the isolation, fraud, force, and/or coercion so often at the heart of trafficking cases. There is a lack of evidence-based research on any relationship between technology and labor trafficking either within or across national borders. To effectively intervene in labor trafficking, the impact of technology needs to be addressed by policy makers, governments, NGOs, researchers, and the private sector.This research report is the first to investigate the relationship between technology and labor trafficking. The evidence gathered and analyzed in this report is based on public documents, websites, interviews with key stakeholders in the US and internationally, and fieldwork in the Philippines. With little previous research on the topic, this study is inherently exploratory. Thus this report's primary goal is to frame technology's impact on labor trafficking and to establish a set of definitions, theories, terms, themes, recommendations, and principles that can guide future research and policy

    Sex Trafficking Prevention Training for Higher Education Students

    Get PDF
    Higher education students are vulnerable to being sex trafficked (Campus Law Enforcement-DHS, n.d.). As a means of prevention, an online training was developed for higher education students. The purpose of this training was to provide awareness and education about sex trafficking and promote safety in terms of relationships, jobs, and the internet. The intention of this study was to research the effectiveness of this training in building an understanding of sex trafficking. A convergent mixed methods study was conducted using pre and post surveys to assess awareness around sex trafficking in higher education. The training was found to be effective in educating participants about “discerning legitimate and safe websites and apps.” In addition, participants’ questions and concerns about sex trafficking are included for future course development and awareness training. Ideas for future steps to help prevent sex trafficking are also included. This dissertation is available in open access at AURA (https://aura.antioch.edu) and OhioLINK ETD Center (https:// etd.ohiolink.edu)

    Cloud Computing in the Global South: Drivers, Effects and Policy Measures

    Get PDF
    Cloud computing has started to transform economic activities in the global South. Many businesses are taking advantage of the pay-as-you-go model of the technology, and its scalability and flexibility features, and government agencies in the South have been investing in cloud-related mega-projects. Cloud-based mobile applications are becoming increasingly popular and the pervasiveness of cellphones means that the cloud may transform the way these devices are used. However, findings and conclusions drawn from surveys, studies and experiences of companies on the potential and impact of cloud computing in the developing world are inconsistent. This article reviews cloud diffusion in developing economies and examines some firms in the cloud's supply side in these economies to present a framework for evaluating the attractiveness of this technology in the context of evolving needs, capabilities and competitive positions. It examines how various determinants related to the development and structure of related industries, externality mechanisms and institutional legitimacy affect cloud-related performances and impacts

    Application of Cloud Computing in University Libraries: Case Study of Selected University Libraries in Gujarat

    Get PDF
    The purpose of this paper is to determine the awareness and use of cloud computing services and technology among library personnel and library users in selected university libraries in Gujarat, India. A detailed survey was piloted using structured set of questionnaires among 210 library users which comprised of post graduate students, research scholars and faculty of the respective university and 15 senior library professionals participated in the survey. Study discovered that 78.57% of library users and 80% of library staff are aware about cloud technology. They are using multiple devices for cloud computing and 65.71% of library users using Laptop and 31.41% of them using smart phone, tablets and ipads. Majority of professional library staff use desktop and expressed that cloud technology is very useful in providing library services. Maximum 96% of respondents using Gmail services, 52.44% video service through YouTube, 65.78% using Google drive for file storage & sharing services. It is observed that library personnel used less of event calendar and online presentation. They are using cloud technology for acquisition and technical work data import and export purpose. 73.33% of library staff expressed that library services is improved by using cloud technology and overall 66.67% of them are satisfied with application of existing cloud technology in university library. It is also perceived that majority of library professionals stated that basic training is required to use advanced cloud technology in university library. Study concluded with the recommendations to enhance library services with maximum utilization of available cloud technology in university library

    Winter 2011

    Get PDF
    • …
    corecore