20,010 research outputs found

    Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier

    Full text link
    As universities recognize the inherent value in the data they collect and hold, they encounter unforeseen challenges in stewarding those data in ways that balance accountability, transparency, and protection of privacy, academic freedom, and intellectual property. Two parallel developments in academic data collection are converging: (1) open access requirements, whereby researchers must provide access to their data as a condition of obtaining grant funding or publishing results in journals; and (2) the vast accumulation of 'grey data' about individuals in their daily activities of research, teaching, learning, services, and administration. The boundaries between research and grey data are blurring, making it more difficult to assess the risks and responsibilities associated with any data collection. Many sets of data, both research and grey, fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities are exploiting these data for research, learning analytics, faculty evaluation, strategic decisions, and other sensitive matters. Commercial entities are besieging universities with requests for access to data or for partnerships to mine them. The privacy frontier facing research universities spans open access practices, uses and misuses of data, public records requests, cyber risk, and curating data for privacy protection. This paper explores the competing values inherent in data stewardship and makes recommendations for practice, drawing on the pioneering work of the University of California in privacy and information security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201

    Securing intellectual capital:an exploratory study in Australian universities

    Get PDF
    Purpose – To investigate the links between IC and the protection of data, information and knowledge in universities, as organizations with unique knowledge-related foci and challenges.Design/methodology/approach – We gathered insights from existing IC-related research publications to delineate key foundational aspects of IC, identify and propose links to traditional information security that impact the protection of IC. We conducted interviews with key stakeholders in Australian universities in order to validate these links.Findings – Our investigation revealed two kinds of embeddedness characterizing the organizational fabric of universities: (1) vertical and (2) horizontal, with an emphasis on the connection between these and IC-related knowledge protection within these institutions.Research implications – There is a need to acknowledge the different roles played by actors within the university, and the relevance of information security to IC-related preservation.Practical implications – Framing information security as an IC-related issue can help IT security managers communicate the need for knowledge security with executives in higher education, and secure funding to preserve and secure such IC-related knowledge, once its value is recognized.Originality/value – This is one of the first studies to explore the connections between data and information security and the three core components of IC’s knowledge security in the university context

    Cyber Insurance, Data Security, and Blockchain in the Wake of the Equifax Breach

    Get PDF

    Кибербезопасность в образовательных сетях

    Get PDF
    The paper discusses the possible impact of digital space on a human, as well as human-related directions in cyber-security analysis in the education: levels of cyber-security, social engineering role in cyber-security of education, “cognitive vaccination”. “A Human” is considered in general meaning, mainly as a learner. The analysis is provided on the basis of experience of hybrid war in Ukraine that have demonstrated the change of the target of military operations from military personnel and critical infrastructure to a human in general. Young people are the vulnerable group that can be the main goal of cognitive operations in long-term perspective, and they are the weakest link of the System.У статті обговорюється можливий вплив цифрового простору на людину, а також пов'язані з людиною напрямки кібербезпеки в освіті: рівні кібербезпеки, роль соціального інжинірингу в кібербезпеці освіти, «когнітивна вакцинація». «Людина» розглядається в загальному значенні, головним чином як та, що навчається. Аналіз надається на основі досвіду гібридної війни в Україні, яка продемонструвала зміну цілей військових операцій з військовослужбовців та критичної інфраструктури на людину загалом. Молодь - це вразлива група, яка може бути основною метою таких операцій в довгостроковій перспективі, і вони є найслабшою ланкою системи.В документе обсуждается возможное влияние цифрового пространства на человека, а также связанные с ним направления в анализе кибербезопасности в образовании: уровни кибербезопасности, роль социальной инженерии в кибербезопасности образования, «когнитивная вакцинация». «Человек» рассматривается в общем смысле, в основном как ученик. Анализ представлен на основе опыта гибридной войны в Украине, которая продемонстрировала изменение цели военных действий с военного персонала и критической инфраструктуры на человека в целом. Молодые люди являются уязвимой группой, которая может быть главной целью когнитивных операций в долгосрочной перспективе, и они являются самым слабым звеном Систем

    The Path of Internet Law: An Annotated Guide to Legal Landmarks

    Get PDF
    The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property. Justice Holmes’s classic essay on the path of the law drew upon six centuries of case reports and statutes. In less than twenty-five years, Internet law has created new legal dilemmas and challenges in accommodating new information technologies. Part I is a brief timeline of Internet case law and statutory developments for Internet-related intellectual property (IP) law. Part II describes some of the ways in which the Internet is redirecting the path of IP in a globalized information-based economy. Our broader point is that every branch of substantive and procedural law is adapting to the digital world. Part III is the functional equivalent of a GPS for locating the latest U.S. and foreign law resources to help lawyers, policymakers, academics and law students lost in cyberspace

    The Path of Internet Law: An Annotated Guide to Legal Landmarks

    Get PDF
    The evolution of the Internet has forever changed the legal landscape. The Internet is the world’s largest marketplace, copy machine, and instrumentality for committing crimes, torts, and infringing intellectual property. Justice Holmes’s classic essay on the path of the law drew upon six centuries of case reports and statutes. In less than twenty-five years, Internet law has created new legal dilemmas and challenges in accommodating new information technologies. Part I is a brief timeline of Internet case law and statutory developments for Internet-related intellectual property (IP) law. Part II describes some of the ways in which the Internet is redirecting the path of IP in a globalized information-based economy. Our broader point is that every branch of substantive and procedural law is adapting to the digital world. Part III is the functional equivalent of a GPS for locating the latest U.S. and foreign law resources to help lawyers, policymakers, academics and law students lost in cyberspace
    corecore