78,239 research outputs found

    Intangible trust requirements - how to fill the requirements trust "gap"?

    Get PDF
    Previous research efforts have been expended in terms of the capture and subsequent instantiation of "soft" trust requirements that relate to HCI usability concerns or in relation to "hard" tangible security requirements that primarily relate to security a ssurance and security protocols. Little direct focus has been paid to managing intangible trust related requirements per se. This 'gap' is perhaps most evident in the public B2C (Business to Consumer) E- Systems we all use on a daily basis. Some speculative suggestions are made as to how to fill the 'gap'. Visual card sorting is suggested as a suitable evaluative tool; whilst deontic logic trust norms and UML extended notation are the suggested (methodologically invariant) means by which software development teams can perhaps more fully capture hence visualize intangible trust requirements

    Civil Society Space in Africa

    Get PDF
    If there is an event or a series of events that demonstrate the need to protect democracy and reclaim the space for civil society; it is none other than the uprisings in North Africa and the Middle East. These have reaffirmed the crucial point in democratic and transitional studies; that is; that economic development without political and social progress is not sustainable. By all standards and indices, North Africa was always rated highly in terms of economic performance, yet simmering underneath was a revolution as a result of the closure of the public sphere. So when in 2011, popular uprisings spread like bushfire in that region, many in academia, media, civil society and governments were caught unprepared. Change came from unexpected circles, challenging assumed doctrines and theories associated with the functionality of organised formations

    The Legislative Environment for Civil Society In Africa A Synthesis Report

    Get PDF
    This paper is therefore a discussion of the legislative environment under which civil society, in particular organized formations, operate in Africa. It is based on twelve African countries (Angola, DRC, Ethiopia, Liberia, Mauritius, Mozambique, Seychelles, Sierra Leone, South Africa, Uganda, Zambia and Zimbabwe). In all these countries we studied civil/state relations, existing NGO laws and NGO policies, including other laws that have an impact on NGOs, national constitutions, processes and the general political economy of the third sector. The merging findings point to some interesting conclusions. More studies are underway in Botswana, Cameroon, Ghana, Kenya, Lesotho, Madagascar, Malawi, Namibia, Nigeria, Senegal, and Swaziland. The findings from these will be integrated into the current paper. This paper is therefore work in progress -- nevertheless the countries studied already are significant to begin a discourse on state/civil society relations, public spaces, and the general legislative environment for citizens and their formations. One of the emerging findings is that the political context determined the emergence of these legal instruments

    Passport Revocation As Proxy Denaturalization: Examining the Yemen Cases

    Get PDF

    Algorithmic Jim Crow

    Get PDF
    This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    Making the Most of United States v. Jones in a Surveillance Society: A Statutory Implementation of Mosaic Theory

    Get PDF
    article published in law journalIn the Supreme Court's recent decision in United States v. Jones, a majority of the Justices appeared to recognize that under some circumstances aggregation of information about an individual through governmental surveillance can amount to a Fourth Amendment search. If adopted by the Court, this notion sometimes called "mosaic theory"-could bring about a radical change to Fourth Amendment jurisprudence, not just in connection with surveillance of public movements-the issue raised in Jonesbut also with respect to the government's increasingly pervasive record-mining efforts. One reason the Court might avoid the mosaic theory is the perceived difficulty of implementing it. This article provides, in the guise of a model statute, a means of doing so. More specifically, this article explains how proportionality reasoning and political process theory can provide concrete guidance for the courts and police in connection with physical and data surveillance
    corecore