13,749 research outputs found

    Platform Neutrality: Enhancing Freedom of Expression in Spheres of Private Power

    Get PDF
    AbstractTroubling patterns of suppressed speech have emerged on the corporate internet. A large platform may marginalize (or entirely block) potential connections between audiences and speakers. Consumer protection concerns arise, for platforms may be marketing themselves as open, comprehensive, and unbiased, when they are in fact closed, partial, and self-serving. Responding to protests, the accused platform either asserts a right to craft the information environment it desires, or abjures responsibility, claiming to merely reflect the desires and preferences of its user base. Such responses betray an opportunistic commercialism at odds with the platforms’ touted social missions. Large platforms should be developing (and holding themselves to) more ambitious standards for promoting expression online, rather than warring against privacy, competition, and consumer protection laws. These regulations enable a more vibrant public sphere. They also defuse the twin specters of monopolization and total surveillance, which are grave threats to freedom of expression.</jats:p

    Towards new methods for mobility data gathering: content, sources, incentives

    Get PDF
    Over the past decade, huge amounts of work has been done in mobile and opportunistic networking research. Unfortunately, much of this has had little impact as the results have not been applicable to reality, due to incorrect assumptions and models used in the design and evaluation of the systems. In this paper, we outline some of the problems of the assumptions of early research in the field, and provide a survey of some initial work that has started to take place to alleviate this through more realistic modelling and measurements of real systems. We do note that there is still much work to be done in this area, and then go on to identify some important properties of the network that must be studied further. We identify the types of data that are important to measure, and also give some guidelines on finding existing and potentially new sources for such data and incentivizing the holders of the data to share it

    Opportunistic mobile social networks: architecture, privacy, security issues and future directions

    Get PDF
    Mobile Social Networks and its related applications have made a very great impact in the society. Many new technologies related to mobile social networking are booming rapidly now-a-days and yet to boom. One such upcoming technology is Opportunistic Mobile Social Networking. This technology allows mobile users to communicate and exchange data with each other without the use of Internet. This paper is about Opportunistic Mobile Social Networks, its architecture, issues and some future research directions. The architecture and issues of Opportunistic Mobile Social Networks are compared with that of traditional Mobile Social Networks. The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks. Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security

    Trusting (and Verifying) Online Intermediaries\u27 Policing

    Get PDF
    All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the Washington establishment? Questions like these will persist, and erode the legitimacy of intermediary self-policing, as long as key operations of leading companies are shrouded in secrecy. Administrators must develop an institutional competence for continually monitoring rapidly-changing business practices. A trusted advisory council charged with assisting the Federal Trade Commission (FTC) and Federal Communications Commission (FCC) could help courts and agencies adjudicate controversies concerning intermediary practices. An Internet Intermediary Regulatory Council (IIRC) would spur the development of expertise necessary to understand whether companies’ controversial decisions are socially responsible or purely self-interested. Monitoring is a prerequisite for assuring a level playing field online
    • …
    corecore