3,391 research outputs found

    Who's Behind ICE: The Tech and Data Companies Fueling Deportations

    Get PDF
    Tech is transforming immigration enforcement. As advocates have known for some time, the immigration and criminal justice systems have powerful allies in Silicon Valley and Congress, with technology companies playing an increasingly central role in facilitating the expansion and acceleration of arrests, detentions, and deportations. What is less known outside of Silicon Valley is the long history of the technology industry's "revolving door" relationship with federal agencies, how the technology industry and its products and services are now actually circumventing city- and state-level protections for vulnerable communities, and what we can do to expose and hold these actors accountable.Mijente, the National Immigration Project, and the Immigrant Defense Project — immigration and Latinx-focused organizations working at the intersection of new technology, policing, and immigration — commissioned Empower LLC to undertake critical research about the multi-layered technology infrastructure behind the accelerated and expansive immigration enforcement we're seeing today, and the companies that are behind it. The report opens a window into the Department of Homeland Security's (DHS) plans for immigration policing through a scheme of tech and database policing, the mass scale and scope of the tech-based systems, the contracts that support it, and the connections between Washington, D.C., and Silicon Valley. It surveys and investigates the key contracts that technology companies have with DHS, particularly within Immigration and Customs Enforcement (ICE), and their success in signing new contracts through intensive and expensive lobbying

    Automating decisions for inter-enterprise collaboration management

    Get PDF
    Proceeding volume: 283/2008The current trend towards networked business forces enterprises to enter federated, loosely-coupled business networks, since much of the competition takes place between networks and value nets. The Pilarcos E2B interoperability middleware supports trend by providing services such as business service discovery and selection, interoperability management, eContracting and reputation-based trust management. Although these services automate the interoperability knowledge management and interoperability. testing, and may help in routine decisions, an essential element of the architecture involves oil expert system that automates or supports decisions oil joining collaborations, acting in them, or leaving them. The expert system focuses oil a single enterprise needs. This paper focuses on the ways of governing the automation level in the expert system in a way suitable for autonomous enterprises to control their participation in agile collaborations.Peer reviewe

    ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS

    Full text link
    La pérdida de privacidad se está convirtiendo en uno de los mayores problemas en el mundo de la informática. De hecho, la mayoría de los usuarios de Internet (que hoy en día alcanzan la cantidad de 2 billones de usuarios en todo el mundo) están preocupados por su privacidad. Estas preocupaciones también se trasladan a las nuevas ramas de la informática que están emergiendo en los ultimos años. En concreto, en esta tesis nos centramos en la privacidad en los Sistemas Multiagente. En estos sistemas, varios agentes (que pueden ser inteligentes y/o autónomos) interactúan para resolver problemas. Estos agentes suelen encapsular información personal de los usuarios a los que representan (nombres, preferencias, tarjetas de crédito, roles, etc.). Además, estos agentes suelen intercambiar dicha información cuando interactúan entre ellos. Todo esto puede resultar en pérdida de privacidad para los usuarios, y por tanto, provocar que los usuarios se muestren adversos a utilizar estas tecnologías. En esta tesis nos centramos en evitar la colección y el procesado de información personal en Sistemas Multiagente. Para evitar la colección de información, proponemos un modelo para que un agente sea capaz de decidir qué atributos (de la información personal que tiene sobre el usuario al que representa) revelar a otros agentes. Además, proporcionamos una infraestructura de agentes segura, para que una vez que un agente decide revelar un atributo a otro, sólo este último sea capaz de tener acceso a ese atributo, evitando que terceras partes puedan acceder a dicho atributo. Para evitar el procesado de información personal proponemos un modelo de gestión de las identidades de los agentes. Este modelo permite a los agentes la utilización de diferentes identidades para reducir el riesgo del procesado de información. Además, también describimos en esta tesis la implementación de dicho modelo en una plataforma de agentes.Such Aparicio, JM. (2011). ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/13023Palanci

    Personal Information Markets AND Privacy: A New Model to Solve the Controversy

    Get PDF
    From the early days of the information economy, personal data has been its most valuable asset. Despite data protection laws, companies trade personal information and often intrude on the privacy of individuals. As a result, consumers feel out of control and lose trust in electronic environments. Technologists and regulators are struggling to develop solutions that meet businesses’ demand for more personal information while maintaining privacy. However, no promising proposals seem to be in sight. We propose a 3-tier personal information market model with privacy. In our model, clear roles, rights and obligations for all actors re-establish trust. The ‘relationship space’ enables data subjects and visible business partners to build trusting relationships. The ‘service space’ supports customer relationships with distributed information processing. The ‘rich information space’ enables anonymized information exchange. To transition to this model, we show how existing privacy-enhancing technologies and legal requirements can be integrated

    Agile Market Engineering: Bridging the gap between business concepts and running markets

    Get PDF
    The agile market engineering process model (AMEP) is built on the insight, that market design and development is a wicked problem. Electronic markets are too complex to be completely designed upfront. Instead, AMEP tries to bridge the gap between theoretic market design and practical electronic market platform development using an agile, iterative approach that relies on early customer feedback and continuous improvement. The AMEP model is complemented by several supporting software artifacts

    Control of Cyber-Physical Production Systems: A Concept to Increase the Trustworthiness within Multi-Agent Systems with Distributed Ledger Technology

    Get PDF
    In the course of increasing the flexibility in the area of production, industrial enterprises have been presented with cyber-physical production systems (CPPS). Through the use of autonomously acting CPPS and CPPS components – which often receive multi-agent systems as their corresponding cyber parts – new challenges arise from the need for flexibility and interoperability on the one hand and consistency, trustworthiness as well as reliability of the systems and their components on the other. In order to meet these challenges, this research paper is dedicated to the creation of a technical concept for implementing distributed ledger technology production systems. The paper follows a design-science approach, which consist of analysis, design, and evaluation. The technical concept is based on the GAIA method, which aims to design multi-agent systems and specifically addresses the security and trustworthiness of CPPS-environments. The subsequent evaluation of the concept based on discussions with experts documents its relevance and potential

    From legal contracts to smart contracts and back again: Towards an automated approach

    Get PDF
    Blockchain smart contracts, programs with the potential to automate transactions and beyond, have gained tremendous popularity over the past years. Central to the original of smart contracts is that every computable clause of a contract or agreement is encoded into arbitrary computer logic with the aim of coding this logic into computer programs, and let the program decide and execute what happens during the contract's life span. The term smart legal contract has been coined to describe smart contracts that aim to capture legally binding agreements between parties. This dissertation presents a method to facilitate the creation of smart legal contracts that constitute a legally binding contract and that can (partially) self-enforce their terms and conditions within that contract, regardless of the blockchain platform. Understanding how blockchain technology works is pivotal to grapple the ramifications of this choice for smart contracts. Chapter 2 presents an overview of the literature on blockchain to delineate architectural perspectives on the technology, and to define its properties. Finally, the chapter points out the current challenges for the technology and gaps in literature. In Chapter 3, a background on smart contracts will be provided using a motivational example. Chapter 4 expounds the research methodology, the research paradigm adopted for the research, and the philosophy underpinning the method called Model Driven Architecture. Following, in Chapter 5 a domain model for smart legal contracts is presented. The chapter demonstrates how the contents of a legal contract could be captured in a model using a motivational example. Chapter 6 is devoted to describing the models that can be employed to write smart contracts. The chapter presents a platform specific model for the Ethereum and Hyperledger Fabric blockchain platforms. A platform agnostic model for blockchain technology is thereafter presented that captures the commonalities between these platforms. Chapter 7 discusses how the main research question is addressed. Derived from the insights of the discussion some opportunities for future research are discussed. Finally, Chapter 8 concludes the dissertation
    • …
    corecore