4,713 research outputs found

    Federalism as an effective antidote to terrorism

    Get PDF
    Many governments as well as terrorist experts see the use of military and police forces as the only way to effectively counter terrorism. The most effective negative sanctions are considered to be military strikes, aggressive actions (including kidnapping and killing) against individuals known or suspected of being terrorists, or against persons supporting and harboring terrorists. Overt and covert military and paramilitary action is also thought advisable to pre-empt and prevent actions by terrorist groups, as well as against states suspected of hosting or tolerating terrorists. This paper argues that decentralization constitutes a powerful antidote as it strongly reduces the incentives for terrorists to attack and because the expected damage suffered is much smaller than in a centralized society. It moreover strengthens society, as economic, political and social decentralization (or polycentricity) is an essential element of a free and vigorous society. This in turn makes a society less vulnerable to terrorist attacks. Indeed, terrorism has no chance of success against a society that actively guards its fundamental liberal institutions, of which decentralized decision-making forms an essential part

    Rules, Standards and Geeks

    Get PDF

    Privacy in the Genomic Era

    Get PDF
    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward

    Cybersecurity Stovepiping

    Get PDF
    I. Introduction II. The Concept of Stovepiping III. Stovepiping in Cybersecurity ... A. Policy Making, Complexity, and Change ... B. Complex Passwords: A Case Study ... 1. Fundamentals of Password Complexity ... 2. “Guessability”—the False Assumption ... a. Password Guessing via Authentication (Login) Interfaces ... b. Password Guessing via Unprotected/Unsanitized Service ... c. Offline Password Attacks ... 3. “Defense in Depth”—Measuring Marginal Benefit IV. Implications of the Stovepiping Disjuncture ... A. Addressing the Same Question … B. Overcoming Policy Entrenchment ... C. Risk-Analytic Framework for Cybersecurity V. Conclusio
    • …
    corecore