328,261 research outputs found

    Women In The Web of Secondary Copyright Liability and Internet Filtering

    Get PDF
    This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are gendered in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem important. Internet specific content restrictions for the purposes of protecting copyrights and protecting children jeopardize online freedoms for women in diverse ways, and sometimes for different reasons than they do for men. Disparities in the ways women and men use, experience and communicate over the Internet need to be recognized, studied, and accommodated by those who would theorize cyberspace law and advocate directions for its evolution

    The Benefits and Costs of Online Privacy Legislation

    Get PDF
    Many people are concerned that information about their private life is more readily available and more easily captured on the Internet as compared to offline technologies. Specific concerns include unwanted email, credit card fraud, identity theft, and harassment. This paper analyzes key issues surrounding the protection of online privacy. It makes three important contributions: First, it provides the most comprehensive assessment to date of the estimated benefits and costs of regulating online privacy. Second, it provides the most comprehensive evaluation of legislation and legislative proposals in the U.S. aimed at protecting online privacy. Finally, it offers some policy prescriptions for the regulation of online privacy and suggests areas for future research. After analyzing the current debate on online privacy and assessing the potential costs and benefits of proposed regulations, our specific recommendations concerning the government's involvement in protecting online privacy include the following: The government should fund research that evaluates the effectiveness of existing privacy legislation before considering new regulations. The government should not generally regulate matters of privacy differently based on whether an issue arises online or offline. The government should not require a Web site to provide notification of its privacy policy because the vast majority of commercial U.S.-based Web sites already do so. The government should distinguish between how it regulates the use and dissemination of highly sensitive information, such as certain health records or Social Security numbers, versus more general information, such as consumer name and purchasing habits. The government should not require companies to provide consumers broad access to the personal information that is collected online for marketing purposes because the benefits do not appear to be significant and the costs could be quite high. The government should make it easier for the public to obtain information on online privacy and the tools available for consumers to protect their own privacy. The message of this paper is not that online privacy should be unregulated, but rather that policy makers should think through their options carefully, weighing the likely costs and benefits of each proposal.

    European Digital Libraries: Web Security Vulnerabilities

    Get PDF
    Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons. Design/methodology/approach – A web vulnerability testing tool was used to analyze 80 European library sites in four countries to determine how many security vulnerabilities each had and what were the most common types of problems. Findings – Analysis results from surveying the libraries show the majority have serious security flaws in their web applications. The research shows that despite country-specific laws mandating secure sites, system librarians have not implemented appropriate measures to secure their online information systems. Research limitations/implications – Further research on library vulnerability throughout the world can be taken to educate librarians in other countries of the serious nature of protecting their systems. Practical implications – The findings serve to remind librarians of the complexity in providing a secure online environment for their patrons and that a disregard or lack of awareness of securing systems could lead to serious vulnerabilities of the patrons' personal data and systems. Lack of consumer trust may result in a decreased use of online commerce and have serious repercussions for the municipal libraries. Several concrete examples of methods to improve security are provided. Originality/value – The paper serves as a current paper on data security issues at Western European municipal library web sites. It serves as a useful summary regarding technical and managerial measures librarians can take to mitigate inadequacies in their security implementation

    Improving Clean Water Conservation in Western Ethiopia Using ArcGIS Server

    Get PDF
    A Web map application was developed to disseminate information on the locations of freshwater springs and their status in Western Ethiopia. Ethiopia suffers an insufficient clean water supply. Only one-third of the rural population has access to safe drinking water. Various organizations have been involved in protecting water springs, but these efforts were not well coordinated due to the lack of spatial information about the locations of springs and their status in the area of intervention. The Tropical Health Alliance Foundation (THAF) is one of the organizations that have been committing its efforts and funds to protect springs in Western Ethiopia. THAF identified the need to improve communication by virtue of a Web-based interactive mapping in order to help coordinate interventions and attract more funds from various donors by providing better information shared over the Web. A Web GIS application proves to be an effective tool for ensuring water security for Ethiopia in the coming years

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    Internet Privacy and Institutional Trust: Insights From a National Survey

    Get PDF
    What does the US public believe about the credibility of institutional actors when it comes to protecting information privacy online? Drawing on perspectives of environmental risk, this article addresses the question through a nationally representative telephone survey of 1200 adults who go online at home. A key result is that a substantial percentage of internet users believes that major corporate or government institutions will both help them to protect information privacy and take that privacy away by disclosing information to other parties without permission. This finding and others raise questions about the dynamics of risk-perception and institutional trust on the web

    LOCKSS, CLOCKSS & PORTICO: A LOOK INTO DIGITAL PRESERVATION POLICIES

    Get PDF
    Digital preservation is the process of preserving information in the digital form. By digital form we mean a non- print form. Information is moving from print to web (non-print) and it has become easy for masses especially the scholarly population to access information on the web from anywhere 24*7. Since digital information is more prone to damage and loss than print information, therefore, it is imperative to protect access to this information not only for the benefit of present but for future generation as well. Various initiatives and policies are currently in place to ensure the long term preservation of digital information. LOCKSS, CLOCKSS, and PORTICO are the three major digital preservation initiatives aimed at protecting and preserving the digital content for its long term access and use. The current study provides an overview of how these three initiatives started and how these policies function in collaboration with publishers and libraries for long term digital content preservation

    Vulnerability Analysis and Prevention on Software as a Service (SaaS) of Archive Websites

    Get PDF
    Web Archive is a SaaS service that has an important role in providing better document storage and management. Good document management has a positive impact on optimizing business operations, increasing collaboration, reducing costs, and protecting sensitive information. Cybercrime, which has an increasingly high intensity, is a serious threat to the security of data stored in web archives. This research aims to improve data security on web archives by conducting ongoing testing. Testing was carried out on a server with a Linux operating system and web archives managed by a file manager system. This study tests the attack using the OWASP application method, and an XSS attack on a web archive with a Linux server and using a file management application. The testing phase includes Information Gathering, Vulnerability Assessment, Exploiting, and Reporting. Based on the results of the research, it was obtained that the first vulnerability test contained 9 vulnerabilities in 9 categories. The second vulnerability test obtained 7 vulnerabilities and the third test found no vulnerabilities. At the end of each test, recommendations for improvements to the web archive are made to the web archive manager and a re-testing process for vulnerabilities is carried out. This process is carried out repeatedly with continuous improvement. Testing the attack and repair of the web archive was carried out repeatedly and managed to get a vulnerability level of Level 0.1-3.9 points with Low status

    Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK

    Full text link
    Cyber adversaries have increasingly leveraged social engineering attacks to breach large organizations and threaten the well-being of today's online users. One clever technique, the "watering hole" attack, compromises a legitimate website to execute drive-by download attacks by redirecting users to another malicious domain. We introduce a game-theoretic model that captures the salient aspects for an organization protecting itself from a watering hole attack by altering the environment information in web traffic so as to deceive the attackers. Our main contributions are (1) a novel Social Engineering Deception (SED) game model that features a continuous action set for the attacker, (2) an in-depth analysis of the SED model to identify computationally feasible real-world cases, and (3) the CyberTWEAK algorithm which solves for the optimal protection policy. To illustrate the potential use of our framework, we built a browser extension based on our algorithms which is now publicly available online. The CyberTWEAK extension will be vital to the continued development and deployment of countermeasures for social engineering.Comment: IAAI-20, AICS-2020 Worksho
    • …
    corecore