16,144 research outputs found

    The Crypto-democracy and the Trustworthy

    Full text link
    In the current architecture of the Internet, there is a strong asymmetry in terms of power between the entities that gather and process personal data (e.g., major Internet companies, telecom operators, cloud providers, ...) and the individuals from which this personal data is issued. In particular, individuals have no choice but to blindly trust that these entities will respect their privacy and protect their personal data. In this position paper, we address this issue by proposing an utopian crypto-democracy model based on existing scientific achievements from the field of cryptography. More precisely, our main objective is to show that cryptographic primitives, including in particular secure multiparty computation, offer a practical solution to protect privacy while minimizing the trust assumptions. In the crypto-democracy envisioned, individuals do not have to trust a single physical entity with their personal data but rather their data is distributed among several institutions. Together these institutions form a virtual entity called the Trustworthy that is responsible for the storage of this data but which can also compute on it (provided first that all the institutions agree on this). Finally, we also propose a realistic proof-of-concept of the Trustworthy, in which the roles of institutions are played by universities. This proof-of-concept would have an important impact in demonstrating the possibilities offered by the crypto-democracy paradigm.Comment: DPM 201

    Responding to organised crime through intervention in recruitment pathways

    Get PDF
    Foreword: A multifaceted strategy is required to effectively combat organised crime. A key element of preventing and responding to organised criminal activity is to target how individuals become involved in illicit activities and to develop effective methods of preventing their recruitment. Using prior research into the methods used by organised crime groups to identify potential targets or confederates, and individuals’ motivations to seek or agree to participate in criminal activity, a framework is presented that identified key recruitment pathways together with some strategies that would make recruitment and engagement less effective

    Honesty Without Truth: Lies, Accuracy, and the Criminal Justice Process

    Get PDF
    Focusing on “lying” is a natural response to uncertainty but too narrow of a concern. Honesty and truth are not the same thing and conflating them can actually inhibit accuracy. In several settings across investigations and trials, the criminal justice system elevates compliant statements, misguided beliefs, and confident opinions while excluding more complex evidence. Error often results. Some interrogation techniques, for example, privilege cooperation over information. Those interactions can yield incomplete or false statements, confessions, and even guilty pleas. Because of the impeachment rules that purportedly prevent perjury, the most knowledgeable witnesses may be precluded from taking the stand. The current construction of the Confrontation Clause right also excludes some reliable evidence—especially from victim witnesses—because it favors face-to-face conflict even though overrated demeanor cues can mislead. And courts permit testimony from forensic experts about pattern matches, such as bite-marks and ballistics, if those witnesses find their own methodologies persuasive despite recent studies discrediting their techniques. Exploring the points of disconnect between honesty and truth exposes some flaws in the criminal justice process and some opportunities to advance fact-finding, truth-seeking, and accuracy instead. At a time when “post-truth” challenges to shared baselines beyond the courtroom grow more pressing, scaffolding legal institutions, so they can provide needed structure and helpful models, seems particularly important. Assessing the legitimacy of legal outcomes and fostering the engagement necessary to reach just conclusions despite adversarial positions could also have an impact on declining facts and decaying trust in broader public life

    Our Space: Being a Responsible Citizen of the Digital World

    Get PDF
    Our Space is a set of curricular materials designed to encourage high school students to reflect on the ethical dimensions of their participation in new media environments. Through role-playing activities and reflective exercises, students are asked to consider the ethical responsibilities of other people, and whether and how they behave ethically themselves online. These issues are raised in relation to five core themes that are highly relevant online: identity, privacy, authorship and ownership, credibility, and participation.Our Space was co-developed by The Good Play Project and Project New Media Literacies (established at MIT and now housed at University of Southern California's Annenberg School for Communications and Journalism). The Our Space collaboration grew out of a shared interest in fostering ethical thinking and conduct among young people when exercising new media skills

    Remittance micro-worlds and migrant infrastructure: circulations, disruptions, and the movement of money

    Get PDF
    Remittances are increasingly central to development discourses in Africa. The development sector seeks to leverage transnational migration and rapid innovations in financial technologies (fintech), to make remittance systems cheaper for end-users and less risky for states and companies. Critical scholarship, however, questions the techno-fix tendency, calling for grounded research on the intersections between remittances, technologies, and everyday life in African cities and beyond. Building on this work, we deploy the concepts of “micro-worlds” and “migrant infrastructure” to make sense of the complex networks of actors, practices, regulations, and materialities that shape remittance worlds. To ground the work, we narrate two vignettes of remittance service providers who operate in Cape Town, South Africa, serving the Congolese diaspora community. We showcase the important role of logistics companies in the “informal” provision of remittance services and the rise of fintech companies operating in the remittance space. These vignettes give substance to the messy and relational dynamics of remittance micro-worlds. This relationality allows us to see how remittances are circulations, not unidirectional flows; how they are not split between formal and informal, but in fact intersect in blurry ways; how digital technologies are central to the story of migrant infrastructures; and how migrants themselves are compositional of these networks. In doing so, we tell a more relational story about how remittance systems are constituted and configured

    Operator-based approaches to harm minimisation in gambling: summary, review and future directions

    Get PDF
    In this report we give critical consideration to the nature and effectiveness of harm minimisation in gambling. We identify gambling-related harm as both personal (e.g., health, wellbeing, relationships) and economic (e.g., financial) harm that occurs from exceeding one’s disposable income or disposable leisure time. We have elected to use the term ‘harm minimisation’ as the most appropriate term for reducing the impact of problem gambling, given its breadth in regard to the range of goals it seeks to achieve, and the range of means by which they may be achieved. The extent to which an employee can proactively identify a problem gambler in a gambling venue is uncertain. Research suggests that indicators do exist, such as sessional information (e.g., duration or frequency of play) and negative emotional responses to gambling losses. However, the practical implications of requiring employees to identify and interact with customers suspected of experiencing harm are questionable, particularly as the employees may not possess the clinical intervention skills which may be necessary. Based on emerging evidence, behavioural indicators identifiable in industryheld data, could be used to identify customers experiencing harm. A programme of research is underway in Great Britain and in other jurisdiction

    Living in virtual communities : an ethnography of life online

    Get PDF
    This thesis examines some of the issues involved in the development of human relationships in cyberspace. Set within the wider context of the Internet and society it investigates how geographically distant individuals are coming together on the Internet to inhabit new kinds of social spaces or virtual communities. People 'live in' and 'construct' these new spaces in such a way as to suggest that the Internet is not a placeless cyberspace that is distinct and separate from the real world. Building on the work of other cyberethnographers, I combine original ethnographic research in Cybertown (http: /www. cybertown. com), a Virtual Community, with face-to-face meetings to illustrate how, for many people, cyberspace is just another place to meet. Secondly I suggest that people in Cybertown are investing as much effort in maintaining relationships in cyberspace as in other social spaces. By extending traditional human relationships into Cybertown, they are widening their webs of relationships, not weakening them. Human relationships in cyberspace are formed and maintained in similar ways to those in wider society. Rather than being exotic and removed from real life, they are actually being assimilated into everyday life. Furthermore they are often moved into other social settings, just as they are in offline life

    Love at First Sight: The Interplay Between Privacy Dispositions and Privacy Calculus in Online Social Connectivity Management

    Get PDF
    Privacy has become the key concern of many users when they are confronted with friend requests on online social networking websites. Nonetheless, users’ responses to friend requests seem at times inconsistent with their concerns about potential privacy implications. They accept friend requests and expose their personal profiles to largely unfamiliar others even though they are aware of the risks involved. Drawing on impression formation theory and the privacy calculus perspective, this paper elucidates the intriguing roles of privacy risks and expected social capital gains in social connectivity management by examining the key types of social information that users consider and their behavioral responses to online friend requests. We conducted a scenario-based experiment with 141 subjects. Our results indicate that individuals utilize two key types of social information; namely, network mutuality and profile diagnosticity in evaluating privacy risks and expected social capital gains. In addition, we find that privacy risks and expected social capital gains powerfully predict the likelihood of no-action and the likelihood of accepting friend requests on online social networking websites. In sum, this study contributes to the information systems literature by integrating impression formation theory and the privacy calculus perspective to identify the key types of social information that influence privacy tradeoff and predict individuals’ behavioral responses toward establishing new online social connections
    corecore