1,969 research outputs found

    Do Not Touch My Data: Exploring a Disclosure-Based Framework to Address Data Access

    Full text link
    Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low risk, medium risk, or high risk. These algorithms are flawed and deeply biased because they use factors that correlate with race and socioeconomic status. The law should recognize people’s property interests in their data. Recognizing individuals’ property interests in their data sets up a robust disclosure-based solution. The disclosure-based solution gives individuals substantial control over their data. The Note proposes a centralized platform—the Private Information Reporting System—for individuals to know where their data is used and restrict companies from selling it. This will result in more power for individuals and equity in the justice system

    The phenomenon of fandom consumption in k-pop commodity through the army community : Bangtan Sonyeondan fandom

    Get PDF
    The appearance of ARMY as a loyal fans is a response to what BTS has to offer as a K-Pop idols. Aside being a fan, their consumption behavior is inevitable. Along with the development of media technology and as a result of pop culture commodities, fans create its own meaning and culture as an active actor of consumption. This research provides an overview of the way consumption culture is formed in ARMY fandom and how it affects most significant aspects in their life. The researcher also wants to examine related to the concept of free fan labor that fans holds such an important role at maintaining the fan production culture in the web and benefit the K-Pop industry to broaden their market globally. This research uses a qualitative method. Then the researcher collects data by interviewing six informants who have consume BTS merchandise continuously with purposive sampling technique. The result of this research showed that fans consistently interpret the goods they consumed, the value they generate from their sense of closeness to BTS members. This research also demonstrated regarding fans becoming “free” fan labor with their own eagerness, along with the fan production culture results to the personalize customization into their own interest as an active and loyal costumer, with the exchange of pleasure they got from actively interact and exchanging feedback with another fans in the cyberspace.&nbsp

    Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment

    Get PDF
    Now more than ever, organizations are being created to protect the cyberspace environment. The capability of cyber organizations tasked to defend critical infrastructure has been called into question by numerous cybersecurity experts. Organizational theory states that organizations should be constructed to fit their operating environment properly. Little research in this area links existing organizational theory to cyber organizational structure. Because of the cyberspace connection to critical infrastructure assets, the factors that influence the structure of cyber organizations designed to protect these assets warrant analysis to identify opportunities for improvement. This thesis analyzes the cyber‐connected critical infrastructure environment using the dominant organizational structure theories. By using multiple case study and content analysis, 2,856 sampling units are analyzed to ascertain the level of perceived uncertainty in the environment (complexity, dynamism, and munificence). The results indicate that the general external environment of cyber organizations tasked to protect critical infrastructure is highly uncertain thereby meriting implementation of organic structuring principles

    The European Union versus External Disinformation Campaigns in the Midst of Information Warfare: Ready for the Battle? College of Europe EU Diplomacy Paper 01/2019

    Get PDF
    As a result of increased globalisation and digitalisation, new security challenges emerge such as the rise of online disinformation which undermines democracy and people’s trust in mainstream media and public authorities. The 2016 United States presidential elections, the Brexit referendum in the United Kingdom and the 2017 French presidential elections have all been disturbed by external interference coming from Russia, including massive disinformation campaigns which were disseminated on social media to influence citizens’ opinion. This paper studies the European Union’s (EU) strategy to counter external disinformation campaigns in cyberspace, i.e. the campaigns that are diffused online by foreign actors, such as Russia, within the EU’s territory. To what extent is the EU strategically prepared to counter external disinformation campaigns in cyberspace? The EU has adopted a defensive strategy to deal with disinformation. It has delivered several strategic documents, including an Action Plan in December 2018, that provides a promising basis for action. The work done by the East StratCom Task Force, which detects and debunks Russian narratives, is a strong asset for the EU. The major online platforms are currently trying to implement a Code of Practice that the European Commission has set up with the aim of curbing disinformation spreading on social networks. Having a long-term perspective in mind, the EU rightly implements measures to enhance societal resilience and improve media literacy among its citizens. However, the financial resources dedicated to counter disinformation are not commensurate with the threat it represents. Furthermore, the EU’s approach is not focusing enough on artificial intelligence tools that can significantly influence how disinformation is carried out and disseminated but can, on the other hand, also help fact-checking activities. Hence, the EU is not entirely prepared to counter external disinformation campaigns in cyberspace. Moreover, disinformation should be looked at in the wider framework of hybrid warfare and should therefore be considered as a cybersecurity matter

    (Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices

    Get PDF
    This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose to treat access limitations and the secrecy we encounter as methodological tools that provide insights into social relations and power structures of security fields. We develop the argument in two steps. First, we argue for a more fine-grained taxonomy of secrecy, that allows to distinguish between mystery, concealment and the relational dimension of secrecy. Second, we apply the taxonomy to our respective fieldwork experiences in the fields of cybersecurity and refugee governance, to show how attending to different forms of secrecy produces empirical insights into the fields of study. Setting out how to work with rather than against secrecy, the article contributes to methodological debates in Critical Security Studies and Secrecy Studies, and ultimately to further cross-fertilize these fields

    Open educational resources : conversations in cyberspace

    Get PDF
    172 p. : ill. ; 25 cm.Libro ElectrónicoEducation systems today face two major challenges: expanding the reach of education and improving its quality. Traditional solutions will not suffice, especially in the context of today's knowledge-intensive societies. The Open Educational Resources movement offers one solution for extending the reach of education and expanding learning opportunities. The goal of the movement is to equalize access to knowledge worldwide through openly and freely available online high-quality content. Over the course of two years, the international community came together in a series of online discussion forums to discuss the concept of Open Educational Resources and its potential. This publication makes the background papers and reports from those discussions available in print.--Publisher's description.A first forum : presenting the open educational resources (OER) movement. Open educational resources : an introductory note / Sally Johnstone -- Providing OER and related issues : an introductory note / Anne Margulies, ... [et al.] -- Using OER and related issues : in introductory note / Mohammed-Nabil Sabry, ... [et al.] -- Discussion highlights / Paul Albright -- Ongoing discussion. A research agenda for OER : discussion highlights / Kim Tucker and Peter Bateman -- A 'do-it-yourself' resource for OER : discussion highlights / Boris Vukovic -- Free and open source software (FOSS) and OER -- A second forum : discussing the OECD study of OER. Mapping procedures and users / Jan Hylén -- Why individuals and institutions share and use OER / Jan Hylén -- Discussion highlights / Alexa Joyce -- Priorities for action. Open educational resources : the way forward / Susan D'Antoni

    Infolitrans: A model for the development of information competence for translators

    Get PDF
    Purpose: Since every community of practice generates, seeks, retrieves and uses information resources and sources related to the cognitive structure being researched or studied and the tasks being performed, the need arises to undertake studies focused on real user communities, which in our case is the group of translators. Approach: In this arena of application, it is important to remember that translators are not only information users, but also information processors and producers. Thus, their documentary competence has to evolve in three dimensions: the informational, the methodological and the strategic. The conceptual model we propose is based on information literacy (INFOLIT) standards and also our knowledge of translation practice and the competencies it demands, where INFOLIT plays a starring role. Findings: This paper is part of a broader research currently in progress, whose main goal is to provide translators and interpreters with a solid instruction in information literacy. As a first step, here we introduce a model for information literacy specifically intended to develop the information competence of this community of users. The model is a gathering of skills, competences, knowledge and values, and it is based on the cooperation between the authors’ expert knowledge of Information Science and professional translation practice
    • 

    corecore