34,701 research outputs found
Recommended from our members
E-voting in Brazil - the risks to democracy
Literature has shown that countries with strong democratic traditions, such as the United States and Canada, are not yet using electronic voting systems intensively, due to the concern for and emphasis on security. It has revealed that there is no such thing as an error-free computer system, let alone an electronic voting system, and that existing technology does not offer the conditions necessary for a reliable, accurate and secure electronic voting system. In this context, then, what are the risks of e-voting to democracy? In what ways, if at all, can more fragile, less mature democracies be buttressed with e-voting systems? As a key component of e-democracy, it seems that e-voting technologies are to become more secure and increasingly reliable in the near future and will indeed be adopted in many countries. In what ways, if at all, will the introduction of such systems increase voter confidence in the political system, promote citizen engagement in political life, and nurture the evolution of democracy? If both e-voting and edemocracy are emerging based on popular demand - that is, as a demand-driven alternative to current processes, then there is no doubt that they are likely to enhance and improve the efficiency of traditional democracy. However, if e-voting technology is being introduced based on a supply-driven fashion - the technology exists therefore it should and must be implemented - then the implications for democracy should be considered. Brazil's introduction of e-voting offers a cautionary tale of supply-driven technological implication. The purpose of this paper is to demonstrate how the introduction of e-voting in Brazil is highly risky to democracy due to the lack of emphasis on security and the lack of a sociallyinformed and socially driven approach to technological innovation. The Brazilian example illustrates the democratic implications of a market-driven approach. The lack of a technology strategy designed to promote and extend democratic principles is not surprising given the closed door, market-based negotiations that led to the adoption of e-voting in Brazil. The promise, and indeed, the imperative of a democratic, voter-centered approach as an alternative for the development of an electronic voting system, is explored in the paper
Developing educational materials about risks on social network sites: a design based research approach
Nearly all of today’s Western teenagers have a profile on a social network site (SNS). As many risks have been reported, researchers and governments have emphasized the role of school education to teach teenagers how to deal safely with SNSs. However, little is known about the specific characteristics which would make interventions effective. Therefore, the overall objective of this research aims to propose a list of validated theoretical design principles for future development of educational materials about risks on SNSs. This research goal was pursued through a design-based research procedure. Thereby targeting teenagers of secondary education in 8 separate studies, the different steps of the design-based research procedure have iteratively been completed. Firstly, a problem analysis was executed through 3 explorative studies, including an observational study, a theoretical evaluation of existing materials and a survey study. Secondly, initial solutions were developed and evaluated in practice through 5 quasi-experimental intervention studies. Thirdly, we reflected upon all the previous results to produce design principles. Finally, we conclude with an analysis of the design-based research methodology
Vulnerabilities and responsibilities: dealing with monsters in computer security
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud
\ud
Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud
\ud
Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud
\ud
Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud
\ud
Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud
\ud
Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk
State of Alaska Election Security Project Phase 2 Report
A laska’s election system is among the most secure in the country,
and it has a number of safeguards other states are now adopting. But
the technology Alaska uses to record and count votes could be improved—
and the state’s huge size, limited road system, and scattered communities
also create special challenges for insuring the integrity of the vote.
In this second phase of an ongoing study of Alaska’s election
security, we recommend ways of strengthening the system—not only the
technology but also the election procedures. The lieutenant governor
and the Division of Elections asked the University of Alaska Anchorage to
do this evaluation, which began in September 2007.Lieutenant Governor Sean Parnell.
State of Alaska Division of Elections.List of Appendices / Glossary / Study Team / Acknowledgments / Introduction / Summary of Recommendations / Part 1 Defense in Depth / Part 2 Fortification of Systems / Part 3 Confidence in Outcomes / Conclusions / Proposed Statement of Work for Phase 3: Implementation / Reference
Digital and Media Literacy: A Plan of Action
Outlines a community education movement to implement Knight's 2009 recommendation to enhance digital and media literacy. Suggests local, regional, state, and national initiatives such as teacher education and parent outreach and discusses challenges
Mapping the technology landscape : linking pedagogy to the affordances of different technologies
This work evaluates the application of different learning technologies and their suitability to support blended learning approaches in Higher Education. Chickering and Gamsons's Seven Principles for Good Practice in Undergraduate Education (Chickering & Gamson, 1987) were used as an underlying pedagogical framework to evaluate the "perceived affordances‟ (Norman, 1999) of learning technologies.Chickering and Gamson‟s principles were selected as a framework due to their "face-validity‟, the accessibility of their language and since they have been derived from numerous years of reflective and effective teaching.Along with the principles we describe and recommend an innovative methodology for evaluation. This methodology can be used in a context of similar evaluation exercises.Final Accepted Versio
Spartan Daily November 6, 2012
Volume 139, Issue 38https://scholarworks.sjsu.edu/spartandaily/1354/thumbnail.jp
- …