592 research outputs found

    Online File Sharing: Resolving the Tensions Between Privacy and Property

    Get PDF
    This essay expands upon an earlier work (Grodzinsky and Tavani, 2005) in which we analyzed the implications of the Verizon v RIAA case for P2P Networks vis-Ă -vis concerns affecting personal privacy and intellectual property. In the present essay we revisit some of the concerns surrounding this case by analyzing the intellectual property and privacy issues that emerged in the MGM Studios v. Grokster case. These two cases illustrate some of the key tensions that exist between privacy and property interests in cyberspace. In our analysis, we contrast Digital Rights Management (DRM) and Interoperability and we examine some newer distribution models of sharing over P2P networks. We also analyze some privacy implications in the two cases in light of the theory of privacy as contextual integrity (Nissenbaum, 2004)

    Enhancing the social issues components in our computing curriculum: Computing for the social good

    Get PDF
    The acceptance and integration of social issues into computing curricula is still a work in progress twenty years after it was first incorporated into the ACM Computing Curricula. Through an international survey of computing instructors, this paper corroborates prior work showing that most institutions include the societal impact of ICT in their programs. However, topics often concentrate on computer history, codes of ethics and intellectual property, while neglecting broader issues of societal impact. This paper explores how these neglected topics can be better developed through a subtle change of focus to the significant role that ICT plays in addressing the needs of the community. Drawing on the survey and a set of implementation cases, the paper provides guidance by means of examples and resources to empower teaching teams to engage students in the application of ICT to bring about positive social outcomes – computing for the social good

    ON BITCOIN AND SIMMEL’S IDEA OF PERFECT MONEY

    Get PDF
    Georg Simmel in his book Philosophy of Money, described how money evolves through history and predicted that it will evolve to the point where it no longer relies on any substance. He called this stage “perfect money,” which he described as “money detached from every substantial value”. Today we are faced with the development of cryptocurrencies, of which Bitcoin is the best known. Bitcoin presents a new system of transaction which does not require governments or middlemen to regulate trade. Since such currencies are completely beyond substantial value, the philosophical question emerges whether Bitcoin is “perfect money.” This essay will argue that Bitcoin can be understood in connection with Simmel’s idea of “perfect money.” But will also consider Simmel’s claim that perfect money is only possible in a stable society and will show the limitations of cyrptocurrencies and Bitcoin in light of this

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue

    Should we campaign against sex robots?

    Get PDF
    In September 2015 a well-publicised Campaign Against Sex Robots (CASR) was launched. Modelled on the longer-standing Campaign to Stop Killer Robots, the CASR opposes the development of sex robots on the grounds that the technology is being developed with a particular model of female-male relations (the prostitute-john model) in mind, and that this will prove harmful in various ways. In this chapter, we consider carefully the merits of campaigning against such a technology. We make three main arguments. First, we argue that the particular claims advanced by the CASR are unpersuasive, partly due to a lack of clarity about the campaign’s aims and partly due to substantive defects in the main ethical objections put forward by campaign’s founder(s). Second, broadening our inquiry beyond the arguments proferred by the campaign itself, we argue that it would be very difficult to endorse a general campaign against sex robots unless one embraced a highly conservative attitude towards the ethics of sex, which is likely to be unpalatable to those who are active in the campaign. In making this argument we draw upon lessons from the campaign against killer robots. Finally, we conclude by suggesting that although a generalised campaign against sex robots is unwarranted, there are legitimate concerns that one can raise about the development of sex robots

    Attitudes of sixth form female students towards the IT field

    Get PDF
    It is well-known that girls are not interested in computer science, information systems (IS) and software engineering studies. While the underlying reasons for this phenomenon have been studied in the US, Canada and Australia, only a few studies have been carried out in Europe and none in Scandinavia. To fill this gap in the research, we have analyzed the qualitative responses of 64 female sixth-form students concerning their attitudes towards studying information technology (IT), including Computer Science, Information Systems and Software engineering disciplines, and their views on IT as a profession. The results suggest that the IT field is seen in quite a positive light by the girls. Although many of the respondents do not consider IT to be their profession, they nevertheless have positive attitudes towards the field. According to the respondents, the field is growing and developing; it is respected, and seen as the field of future. Girls who want to become IT professionals see that the profession entails good employment possibilities and benefits and is respected. Some girls have negative views towards the field. These views illustrate the underlying reasons that these girls do not want to study IT. These girls did not perceive the field to be human-related (the work is only computer-related, according to the respondents). The need for skills in mathematics and physics are also listed as key reasons that some girls do not want to become IT students The results of the study suggest that there is a need to clarify among sixth form students the fact that IT jobs can be divided into computer science, information systems and software engineering, all of which require different competences

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    Information in the Context of Philosophy and Cognitive Sciences

    Get PDF
    This textbook briefly maps as many as possible areas and contexts in which information plays an important role. It attempts an approach that also seeks to explore areas of research that are not commonly associated, such as informatics, information and library science, information physics, or information ethics. Given that the text is intended especially for students of the Master's Degree in Cognitive Studies, emphasis is placed on a humane, philosophical and interdisciplinary approach. It offers rather directions of thought, questions, and contexts than a complete theory developed into mathematical and technical details
    • …
    corecore