4,425 research outputs found
Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sonyâs production of The Interview and considers the hackâs chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americansâ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
New models for digital government: the role of service brokers in driving innovation
Executive summary
Digital Government strategies are being rolled out in many Australian and international jurisdictions, ushering in a fundamentally different approach to the design and delivery of public sector services. Digital Government makes digital services (usually delivered through internet and mobile channels) the default delivery channels for the majority of services, and places them at the centre of innovating, designing and operating government services.
Public sector or independent service brokers are increasingly important to delivering and designing these services. Service brokers are organisations or businesses that enable customers to interact with other organisations through easy-to-use and seamless interfaces.
In the digital realm, a public sector service brokers example is one that provides a customer-focussed portal, such as the Federal Department of Human Servicesâ MyGov website.
Independent service brokers from the private or community sectors can also provide greater service choice and innovation in how people interact with governments. Models for independent service brokers include Digital Mailboxes and Personal Safeboxes (eg Australia Post); public transport information service brokers (eg TripView, Tripgo and Google Transit), taxation service brokers (eg Xero and MYOB Online), community service brokers (eg HubCare) and access brokers for government services (eg public libraries, online access centres, etc) to assist those unable to access digital services.
It is likely that the ambitious goals for large-scale adoption of digital government will only be achieved if governments encourage the involvement of independent service brokers to complement the role of public sector service brokers. However, there is currently little guidance on best practice models for agencies seeking to collaborate with independent service brokers or the other way around. This report addresses this critical knowledge gap by providing a practical guide to the service broker model. It explains the different roles of public sector and independent service brokers and provides case studies of service broker models. This will help to inform digital government strategies and policies to encourage the development of public sector and independent service brokers.
It also considers how the emergence of a marketplace of service brokers will raise important issues such as how customer data is managed and protected, identity assured and how research and analysis of the data generated by these digital services can help inform better public policies and service improvement
Addressing the cyber safety challenge: from risk to resilience
Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each groupâs unique cyber safety needs.
Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ârisk and protectionâ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to:
Address the needs of populations often neglected by current policies and programs â including adults, seniors, parents, and small to medium enterprises
Continue to build the digital literacy skills of all populations, because digital literacy strongly influences usersâ ability to engage safely online â this is best achieved by a hands-on learning approach
Keep risk in perspective â the risks and benefits of digital participation go hand in hand
Broaden the focus from awareness-raising to long-term behaviour change.
As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved.
Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services
Biometric Cyberintelligence and the Posse Comitatus Act
This Article addresses the rapid growth of what the military and the intelligence community refer to as âbiometric-enabled intelligence.â This newly emerging intelligence tool is reliant upon biometric databasesâfor example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term âbiometric cyberintelligenceâ to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big dataâs massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendmentâs privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use
Biometric Cyberintelligence and the Posse Comitatus Act
This Article addresses the rapid growth of what the military and the intelligence community refer to as âbiometric-enabled intelligence.â This newly emerging intelligence tool is reliant upon biometric databasesâfor example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term âbiometric cyberintelligenceâ to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big dataâs massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult to enforce to protect against militarized cyberpolicing and cybersurveillance harms that may generate from the domestic use of military grade cybersurveillance tools. Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendmentâs privacy jurisprudence, therefore, must be reinforced in the digital age to appropriately protect citizens from militarized cyberpolicing: the blending of military/foreign intelligence tools and operations, and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use
Recommended from our members
Electronic transformation of government in the U.K.: a research agenda
This paper presents the findings of an exploratory research project into future
e-Government (electronic Government) initiatives. The Virtual Institute for
Electronic Government Research (VIEGO) project aimed at identifying and
further developing the research agenda of e-Government based on a solid
practical ground. As such, the paper offers a novel methodology in identifying
the road map for future e-Government initiatives based on a series of
workshops organised around the U.K. hosting a mixture of stakeholders
involving both academics and parishioners. The analysis of the VIEGO
workshops depicted that an e-Government research agenda involves a
combination of social, technological and organisational issues at both
governmental and individual citizen level, ultimately driven by empirical
case-based experience and active participation in e-Government processes.
Unlike other propositions for the future of e-Government offered in the e-
Government literature, raised research questions not only originated from an
analysis of e-Government literature but also on the outcome of brainstorming,
reflections and contemplations throughout the duration of the project
Frontline(s)
The challenge of theorising and analysing socio-political phenomena can feel overwhelming given todayâs somewhat threatening realpolitik (9/11, US-led wars on Afghanistan, Iraq and now, perhaps, Syria) and the rapid pace with which (dis)information is received, digested and discarded. Through an act of âliterary montageâ construction, and prefaced by some interpretation of my own, I offer this âexhibitâ as an attempt to highlight this sense of dislocation whilst simultaneously âbuilding a pictureâ. A specific concern is to problematise the notion of âthe frontlineâ. Given blatant military and economic imperialism by the US, underscored by the construction and fetishising of the rational subject under modernity and the social democratic state, I suggest that frontlines are located in any public or private space where the legitimacy of these interests and categories is questioned. Expressions of difference, including peace activism, thus become âproliferating illegitimaciesâ and are policed as such. Against this context, the texts positioned here tell of growing realisation and fear of the coldness and instrumentalism at the heart of empire-building, of which both the horrific violence currently inflicted on Iraqi people, and the discounting and suppression of dissent to war worldwide, are part. For a global anti-capitalist/pro-justice movement that recognises trade in arms as a core constraint on human potential, reaching beyond this fear - retaining the hope of the âpolitics of possibilityâ with which this âmovement of movementsâ has come to be identified â emerges as a latent and essential challenge
Roadmap for NIS education programmes in Europe:education
This document continues work from previous activities by suggesting training materials, scenarios and a way forward for implementing the EC roadmap for NIS education in Europe. In doing so, the Agency has recognised the heterogeneous landscape of Europe in this area
Research Roundup Newsletter: November 2022
NCITE (National Counterterrorism Innovation, Technology, and Education) is the Department of Homeland Security\u27s center of excellence for terrorism prevention and counterterrorism research. They are a federally funded academic consortium based in Omaha, Nebraska. Their newsletters covers the current news, activities, and updates of the center and the latest in counterterrorism research. The Research Roundup specifically highlights research and resources on timely counterterrorism topics
- âŠ