42,670 research outputs found

    Surveillant assemblages of governance in massively multiplayer online games:a comparative analysis

    Get PDF
    This paper explores governance in Massively Multiplayer Online Games (MMOGs), one sub-sector of the digital games industry. Informed by media governance studies, Surveillance Studies, and game studies, this paper identifies five elements which form part of the system of governance in MMOGs. These elements are: game code and rules; game policies; company community management practices; player participatory practices; and paratexts. Together these governance elements function as a surveillant assemblage, which relies to varying degrees on lateral and hierarchical forms of surveillance, and the assembly of human and nonhuman elements.Using qualitative mixed methods we examine and compare how these elements operate in three commercial MMOGs: Eve Online, World of Warcraft and Tibia. While peer and participatory surveillance elements are important, we identified two major trends in the governance of disruptive behaviours by the game companies in our case studies. Firstly, an increasing reliance on automated forms of dataveillance to control and punish game players, and secondly, increasing recourse to contract law and diminishing user privacy rights. Game players found it difficult to appeal the changing terms and conditions and they turned to creating paratexts outside of the game in an attempt to negotiate the boundaries of the surveillant assemblage. In the wider context of self-regulated governance systems these trends highlight the relevance of consumer rights, privacy, and data protection legislation to online games and the usefulness of bringing game studies and Surveillance Studies into dialogue

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    PSRO update

    Get PDF
    Newsletter for Massachusetts physicians, providing updates on the development of Professional Standards Review Organizations (PSROs) as Medicare and Medicaid standards were established

    Children, family and the state : revisiting public and private realms

    Get PDF
    The state is often viewed as part of the impersonal public sphere in opposition to the private family as a locus of warmth and intimacy. In recent years this modernist dichotomy has been challenged by theoretical and institutional trends which have altered the relationship between state and family. This paper explores changes to both elements of the dichotomy that challenge this relationship: a more fragmented family structure and more individualised and networked support for children. It will also examine two new elements that further disrupt any clear mapping between state/family and public/private dichotomies: the third party role of the child in family/state affairs and children's application of virtual technology that locates the private within new cultural and social spaces. The paper concludes by examining the rise of the 'individual child' hitherto hidden within the family/state dichotomy and the implications this has for intergenerational relations at personal and institutional levels

    Investigating privacy in an ambient world

    Get PDF
    Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. The focus of this paper will be on the method used and preliminary findings will be discussed

    Biometric surveillance in schools : cause for concern or case for curriculum?

    Get PDF
    This article critically examines the draft consultation paper issued by the Scottish Government to local authorities on the use of biometric technologies in schools in September 2008 (see http://www.scotland.gov.uk/Publications/2008/09/08135019/0). Coming at a time when a number of schools are considering using biometric systems to register and confirm the identity of pupils in a number of settings (cashless catering systems, automated registration of pupils' arrival in school and school library automation), this guidance is undoubtedly welcome. The present focus seems to be on using fingerprints, but as the guidance acknowledges, the debate in future may encompass iris prints, voice prints and facial recognition systems, which are already in use in non-educational settings. The article notes broader developments in school surveillance in Scotland and in the rest of the UK and argues that serious attention must be given to the educational considerations which arise. Schools must prepare pupils for life in the newly emergent 'surveillance society', not by uncritically habituating them to the surveillance systems installed in their schools, but by critically engaging them in thought about the way surveillance technologies work in the wider world, the various rationales given to them, and the implications - in terms of privacy, safety and inclusion - of being a 'surveilled subject'

    Privacy & law enforcement

    Get PDF

    Online Privacy as a Collective Phenomenon

    Full text link
    The problem of online privacy is often reduced to individual decisions to hide or reveal personal information in online social networks (OSNs). However, with the increasing use of OSNs, it becomes more important to understand the role of the social network in disclosing personal information that a user has not revealed voluntarily: How much of our private information do our friends disclose about us, and how much of our privacy is lost simply because of online social interaction? Without strong technical effort, an OSN may be able to exploit the assortativity of human private features, this way constructing shadow profiles with information that users chose not to share. Furthermore, because many users share their phone and email contact lists, this allows an OSN to create full shadow profiles for people who do not even have an account for this OSN. We empirically test the feasibility of constructing shadow profiles of sexual orientation for users and non-users, using data from more than 3 Million accounts of a single OSN. We quantify a lower bound for the predictive power derived from the social network of a user, to demonstrate how the predictability of sexual orientation increases with the size of this network and the tendency to share personal information. This allows us to define a privacy leak factor that links individual privacy loss with the decision of other individuals to disclose information. Our statistical analysis reveals that some individuals are at a higher risk of privacy loss, as prediction accuracy increases for users with a larger and more homogeneous first- and second-order neighborhood of their social network. While we do not provide evidence that shadow profiles exist at all, our results show that disclosing of private information is not restricted to an individual choice, but becomes a collective decision that has implications for policy and privacy regulation

    Unshackle the Internet: Independent Voices and the Role of Foreign Internet Companies Operating in China

    Get PDF
    Advances in information technology have the potential to empower individuals globally and to serve as a force for democratization. The number of Internet users in mainland China continues to increase at a phenomenal rate. From 1998 to 2005, China's online population grew from 1.17 million to 103 million, with the most recent official count in January 2006 at approximately 110 million.In China, the Internet has become an increasingly important tool for empowering Chinese activists, journalists, rights defenders, intellectuals and grassroots groups by providing increased access to information as well as a virtual commons for the exchange of ideas between groups and individuals.However, technology and control of the Internet have also been utilized by the Chinese government to implement censorship, surveillance and social and political control.In the last several months, as foreign IT companies have come under media and U.S. government scrutiny, HRIC has been actively monitoring the human rights impact of their activities and developing suggestions for implementing the human rights responsibilities of foreign-based IT companies operating in China
    corecore