2,120 research outputs found
Quantum Applications In Political Science
Undergraduate Research ScholarshipThis paper will show the current state of quantum computation and its application as a political science research method. It will look at contemporary empirical literature to assess the current state of the method in both political science and computer science. Then, by assessing the state of quantum computation, this paper will make predictions concerning quantum computation as a research tool and also assess its capability as a catalyst for international diplomacy and discourse. Quantum computation is an emerging technology with increasing scientific attention. This paper will use IBM’s quantum computer, accessed through the cloud, to model and execute quantum algorithms that show the utility for political science research. Furthermore, through the base mathematics of common quantum algorithms, this paper will show how these algorithms can be expanded. This paper finds that quantum computation is a valuable tool with remarkable potential. However, quantum computing has its limitations and currently resides in an important juncture that will decide whether technology involving it will be resigned as a niche theoretical tool or be continued to be developed into a mainstream technology.No embargoAcademic Major: World Politic
Recommended from our members
Regulating Disruption: Blockchain, GDPR, and Questions of Data Sovereignty
The article discusses the nature of law in cyberspace. Topics discussed include distinction between regulation as infringement of private autonomy and regulation as a collaborative enterprise; blockchain regulatory conundrum; and neoliberal market-complementing regulation. Also being discussed is the regulation for economic efficiency and consumer choice
The American Assembly: Art, Technology, and Intellectual Property
Examines intellectual property issues as the arts sector joins other sectors in the race to deal with an increasingly information-driven economy
PRECEPT:a framework for ethical digital forensics investigations
Purpose: Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction. Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain. This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.Design methodology: In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure.Findings: The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.Practical Implications: Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.Originality/value: Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
Recommended from our members
The Conundrum of Security in Modern Cloud Computing
In today’s economic climate organizations are seeking greater cost-saving measures, increased agility, and scalability that responds to the rapid changes in technology and business. Cloud computing, with its low cost pay-as-you-go business model, is helping organizations manage these changes while transforming information technology (IT) into an engine that drives business. Benefits from on-demand clouds provide users greater portability and the ability to access information from virtually anywhere: at home, a client location, when traveling, or at the office. The reduced costs and increased flexibility, however, associated with cloud computing also come with complex security issues and increased overall risk. When cloud services are moved beyond organizational boundaries, outside the border firewall, security is heightened for most organizations and navigating the complexity of these environments can be daunting. In this research paper we seek to help organizations make pragmatic decisions about where and when to use cloud solutions by outlining specific security issues that enterprises should address. We use external research sources and explore current security trends within cloud computing in order to provide background information, related research, and conclusions. We make use of colleagues, textbooks, peer reviewed journal articles, and Internet websites related to information technology and information security. Each section of our research is formatted similarly and presents pertinent security information, techniques, and tools that organizations would need in order to make relevant decisions when utilizing Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS)
The Bring your own device conundrum for organizations and investigators: An examination of the policy and legal concerns in light of investigatory challenges
In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the potential benefits of integrating a BYOD policy. In this paper we first set a context for the BYOD conundrum, then examine associated corporate policies, highlight the limitations to the digital investigator’s reach regarding digital evidence and review the investigatory challenges presented to the involved parties (such as the forensic examiner) from a BYOD environment. We conclude by offering recommendations such as implementing finely crafted policies and procedures (such as incident response), utilizing Mobile Device Management and other software, corporate owned devices, and enforcing signed agreements
PRECEPT: A Framework for Ethical Digital Forensics Investigations.
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Cyber-enabled crimes are on the increase, and law enforcement has had to expand many of their detecting activities into the digital domain. As such, the field of digital forensics has become far more sophisticated over the years and is now able to uncover even more evidence that can be used to support prosecution of cyber criminals in a court of law. Governments, too, have embraced the ability to track suspicious individuals in the online world. Forensics investigators are driven to gather data exhaustively, being under pressure to provide law enforcement with sufficient evidence to secure a conviction.
Yet, there are concerns about the ethics and justice of untrammeled investigations on a number of levels. On an organizational level, unconstrained investigations could interfere with, and damage, the organization’s right to control the disclosure of their intellectual capital. On an individual level, those being investigated could easily have their legal privacy rights violated by forensics investigations. On a societal level, there might be a sense of injustice at the perceived inequality of current practice in this domain.
This paper argues the need for a practical, ethically-grounded approach to digital forensic investigations, one that acknowledges and respects the privacy rights of individuals and the intellectual capital disclosure rights of organisations, as well as acknowledging the needs of law enforcement. We derive a set of ethical guidelines, then map these onto a forensics investigation framework. We subjected the framework to expert review in two stages, refining the framework after each stage. We conclude by proposing the refined ethically-grounded digital forensics investigation framework. Our treatise is primarily UK based, but the concepts presented here have international relevance and applicability.
In this paper, the lens of justice theory is used to explore the tension that exists between the needs of digital forensic investigations into cybercrimes on the one hand, and, on the other, individuals’ rights to privacy and organizations’ rights to control intellectual capital disclosure.
The investigation revealed a potential inequality between the practices of digital forensics investigators and the rights of other stakeholders. That being so, the need for a more ethically-informed approach to digital forensics investigations, as a remedy, is highlighted, and a framework proposed to provide this.
Our proposed ethically-informed framework for guiding digital forensics investigations suggest a way of re-establishing the equality of the stakeholders in this arena, and ensuring that the potential for a sense of injustice is reduced.
Justice theory is used to highlight the difficulties in squaring the circle between the rights and expectations of all stakeholders in the digital forensics arena. The outcome is the forensics investigation guideline, PRECEpt: Privacy-Respecting EthiCal framEwork, which provides the basis for a re-aligning of the balance between the requirements and expectations of digital forensic investigators on the one hand, and individual and organizational expectations and rights, on the other
- …