4,713 research outputs found
Federalism as an effective antidote to terrorism
Many governments as well as terrorist experts see the use of military and police forces as the only way to effectively counter terrorism. The most effective negative sanctions are considered to be military strikes, aggressive actions (including kidnapping and killing) against individuals known or suspected of being terrorists, or against persons supporting and harboring terrorists. Overt and covert military and paramilitary action is also thought advisable to pre-empt and prevent actions by terrorist groups, as well as against states suspected of hosting or tolerating terrorists. This paper argues that decentralization constitutes a powerful antidote as it strongly reduces the incentives for terrorists to attack and because the expected damage suffered is much smaller than in a centralized society. It moreover strengthens society, as economic, political and social decentralization (or polycentricity) is an essential element of a free and vigorous society. This in turn makes a society less vulnerable to terrorist attacks. Indeed, terrorism has no chance of success against a society that actively guards its fundamental liberal institutions, of which decentralized decision-making forms an essential part
Privacy in the Genomic Era
Genome sequencing technology has advanced at a rapid pace and it is now
possible to generate highly-detailed genotypes inexpensively. The collection
and analysis of such data has the potential to support various applications,
including personalized medical services. While the benefits of the genomics
revolution are trumpeted by the biomedical community, the increased
availability of such data has major implications for personal privacy; notably
because the genome has certain essential features, which include (but are not
limited to) (i) an association with traits and certain diseases, (ii)
identification capability (e.g., forensics), and (iii) revelation of family
relationships. Moreover, direct-to-consumer DNA testing increases the
likelihood that genome data will be made available in less regulated
environments, such as the Internet and for-profit companies. The problem of
genome data privacy thus resides at the crossroads of computer science,
medicine, and public policy. While the computer scientists have addressed data
privacy for various data types, there has been less attention dedicated to
genomic data. Thus, the goal of this paper is to provide a systematization of
knowledge for the computer science community. In doing so, we address some of
the (sometimes erroneous) beliefs of this field and we report on a survey we
conducted about genome data privacy with biomedical specialists. Then, after
characterizing the genome privacy problem, we review the state-of-the-art
regarding privacy attacks on genomic data and strategies for mitigating such
attacks, as well as contextualizing these attacks from the perspective of
medicine and public policy. This paper concludes with an enumeration of the
challenges for genome data privacy and presents a framework to systematize the
analysis of threats and the design of countermeasures as the field moves
forward
Cybersecurity Stovepiping
I. Introduction
II. The Concept of Stovepiping
III. Stovepiping in Cybersecurity ... A. Policy Making, Complexity, and Change ... B. Complex Passwords: A Case Study ... 1. Fundamentals of Password Complexity ... 2. “Guessability”—the False Assumption ... a. Password Guessing via Authentication (Login) Interfaces ... b. Password Guessing via Unprotected/Unsanitized Service ... c. Offline Password Attacks ... 3. “Defense in Depth”—Measuring Marginal Benefit
IV. Implications of the Stovepiping Disjuncture ... A. Addressing the Same Question … B. Overcoming Policy Entrenchment ... C. Risk-Analytic Framework for Cybersecurity
V. Conclusio
- …