9,703 research outputs found

    The Cybernetic Ethos of Cryptocurrencies: Economic and Social Dimensions

    Get PDF
    The last years have experienced an effervescence in the field of monetary innovation, concerning both complementary currencies and cryptocurrencies. The scenario of innovation has been intensively investigated with regard to economic and socio-political aspects. Against the peculiar multidimensionality of the phenomenon, the paper argues that the analysis should take the opportunity of grasping a cobelonging between the economic and the social. Whether they seem related to a proliferation of new forms of sociality (as in many experiences of complementary currencies) or to a disquieting desocialization (as in certain domains of the cryptocurrencies' world), the social dimensions of the new monies can be fruitfully analyzed by focusing on how they are consonant with certain basic conceptions of economic life. After a brief discussion of this point with regard to complementary currencies, the above-mentioned theoretical approach is used to investigate the cybernetic ethos of cryptocurrencies. The analysis shows that the socio-technical imaginaries of some cryptocurrencies (with particular regard to Bitcoin) call into question the relationship between human and non-human agency and are complicit with certain ideas of economic life, one of whose main traits concerns the demand for unconditionally "assuring" the economic and for denying the dimension of uncertainty

    Estudio de modelos de privacidad de datos

    Get PDF
    El presente trabajo surge como una investigación motivada por la necesidad de proteger la privacidad de los usuarios de sistemas en contextos de análisis estadístico, inteligencia artificial y publicación de datos. Para ello se ha llevado a cabo un estudio del estado del arte y se han explorado técnicas de privatización de datos basadas en Privacidad Diferencial.Agencia Nacional de Investigación e InnovaciónICT4

    Burning Community Integration and Disability

    Get PDF
    Individuals with anxiety and depression have always been marginalized and stigmatized. Individuals with “hidden” disabilities are encouraged by society to keep them hidden, or face ridicule and persecution. Society decreases their sense of self-worth, and self-efficacy by destroying any perception of normalcy. Social support resources are vital for individuals with anxiety and depression’s continued mental health. As time goes on the individuals experience a decrease in the amount of available resources, at the same time the need for them increases. These individuals need a way to quickly replenish their social resources and the Burning Man regional network creates a unique opportunity to rebuild in safe place free of societal judgements. Despite this lucrative opportunity for social network understanding, there is a significant gap in the research. There is little research on the topic of social networking in festivals and even less so in regards to Burning Ban events. The limited research that does exist is specific to the origin event, Burning Man, with little about the regional network; comprised of smaller events around the globe. This study employs ethnographic methods to examine the benefits of Burning regional Network and determined there are significant benefits for individuals with psychiatric disabilities. This project examined the social networking that occurred during and between events, and determined the most common resource is emotional support and it is indeed enduring, after and between events. Social networks are built very quickly because of the 10 principle framework that guides Burn organization, activities, and behaviors. Burners approach each other with trust and compassion and allow each other to define themselves however they want free of judgement and stigmatization. This allows honest intentions and communication. Each participant lowers their barriers and bonds very quickly with each other, without trying to show they can provide value, other than cultural enrichment. Relationships are not based on a system of reciprocity, unlike those in the default world. Everyone is equal and people are free to explore themselves and each other

    Early childhood arts: three perspectives

    Get PDF

    Radical technologies: Blockchain as an organizational movement

    Get PDF
    The emergence of blockchain technology has created a debate regarding technologies’ socio-cultural symbolism. Prevailing as alternative or complementary to internet technology, blockchain’s decentralized radical architecture reflects organizational change, enhancement of degrees of freedom, for individual identities and communities, new schemes of distributed trust and privacy, transformation of power relations and social reality perception. The current paper aims to contribute to the ongoing debate, from an organizational and socio-psychological perspective, discussing the key elements of a socially grounded technology, like any other technological product within the history of humanity. Through an evolutionary lens, blockchain technology is examined as a decentralized grassroots organizational movement at birth, influencing and, at the same time, be influenced, by science, culture, as well as by other aspects of individual and collective networked life, apart from the economy. Social sciences and cyber sciences are in a crossroad where society and technology integrate creating a mixed socio-technological or techno-social reality. Therefore, it is of high importance for them, to address the new epistemological challenges by developing new methodologies and tools, independently from any utopian or dystopian predictions

    Novel architectures and strategies for security offloading

    Get PDF
    Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects of our lives. This phenomena has positioned the network and its services as fundamental assets over which we rely and trust. However, Internet is far from being perfect. It has considerable security issues and vulnerabilities that jeopardize its main core functionalities with negative impact over its players. Furthermore, these vulnerabilities¿ complexities have been amplified along with the evolution of Internet user mobility. In general, Internet security includes both security for the correct network operation and security for the network users and endpoint devices. The former involves the challenges around the Internet core control and management vulnerabilities, while the latter encompasses security vulnerabilities over end users and endpoint devices. Similarly, Internet mobility poses major security challenges ranging from routing complications, connectivity disruptions and lack of global authentication and authorization. The purpose of this thesis is to present the design of novel architectures and strategies for improving Internet security in a non-disruptive manner. Our novel security proposals follow a protection offloading approach. The motives behind this paradigm target the further enhancement of the security protection while minimizing the intrusiveness and disturbance over the Internet routing protocols, its players and users. To accomplish such level of transparency, the envisioned solutions leverage on well-known technologies, namely, Software Defined Networks, Network Function Virtualization and Fog Computing. From the Internet core building blocks, we focus on the vulnerabilities of two key routing protocols that play a fundamental role in the present and the future of the Internet, i.e., the Border Gateway Protocol (BGP) and the Locator-Identifier Split Protocol (LISP). To this purpose, we first investigate current BGP vulnerabilities and countermeasures with emphasis in an unresolved security issue defined as Route Leaks. Therein, we discuss the reasons why different BGP security proposals have failed to be adopted, and the necessity to propose innovative solutions that minimize the impact over the already deployed routing solution. To this end, we propose pragmatic security methodologies to offload the protection with the following advantages: no changes to the BGP protocol, neither dependency on third party information nor on third party security infrastructure, and self-beneficial. Similarly, we research the current LISP vulnerabilities with emphasis on its control plane and mobility support. We leverage its by-design separation of control and data planes to propose an enhanced location-identifier registration process of end point identifiers. This proposal improves the mobility of end users with regards on securing a dynamic traffic steering over the Internet. On the other hand, from the end user and devices perspective we research new paradigms and architectures with the aim of enhancing their protection in a more controllable and consolidated manner. To this end, we propose a new paradigm which shifts the device-centric protection paradigm toward a user-centric protection. Our proposal focus on the decoupling or extending of the security protection from the end devices toward the network edge. It seeks the homogenization of the enforced protection per user independently of the device utilized. We further investigate this paradigm in a mobility user scenario. Similarly, we extend this proposed paradigm to the IoT realm and its intrinsic security challenges. Therein, we propose an alternative to protect both the things, and the services that leverage from them by consolidating the security at the network edge. We validate our proposal by providing experimental results from prof-of-concepts implementations.Internet se ha convertido en una poderosa e indispensable herramienta para nuestra sociedad moderna. Su omnipresencia y aplicabilidad han promovido grandes cambios en diferentes aspectos de nuestras vidas. Este fenómeno ha posicionado a la red y sus servicios como activos fundamentales sobre los que contamos y confiamos. Sin embargo, Internet está lejos de ser perfecto. Tiene considerables problemas de seguridad y vulnerabilidades que ponen en peligro sus principales funcionalidades. Además, las complejidades de estas vulnerabilidades se han ampliado junto con la evolución de la movilidad de usuarios de Internet y su limitado soporte. La seguridad de Internet incluye tanto la seguridad para el correcto funcionamiento de la red como la seguridad para los usuarios y sus dispositivos. El primero implica los desafíos relacionados con las vulnerabilidades de control y gestión de la infraestructura central de Internet, mientras que el segundo abarca las vulnerabilidades de seguridad sobre los usuarios finales y sus dispositivos. Del mismo modo, la movilidad en Internet plantea importantes desafíos de seguridad que van desde las complicaciones de enrutamiento, interrupciones de la conectividad y falta de autenticación y autorización globales. El propósito de esta tesis es presentar el diseño de nuevas arquitecturas y estrategias para mejorar la seguridad de Internet de una manera no perturbadora. Nuestras propuestas de seguridad siguen un enfoque de desacople de la protección. Los motivos detrás de este paradigma apuntan a la mejora adicional de la seguridad mientras que minimizan la intrusividad y la perturbación sobre los protocolos de enrutamiento de Internet, sus actores y usuarios. Para lograr este nivel de transparencia, las soluciones previstas aprovechan nuevas tecnologías, como redes definidas por software (SDN), virtualización de funciones de red (VNF) y computación en niebla. Desde la perspectiva central de Internet, nos centramos en las vulnerabilidades de dos protocolos de enrutamiento clave que desempeñan un papel fundamental en el presente y el futuro de Internet, el Protocolo de Puerta de Enlace Fronterizo (BGP) y el Protocolo de Separación Identificador/Localizador (LISP ). Para ello, primero investigamos las vulnerabilidades y medidas para contrarrestar un problema no resuelto en BGP definido como Route Leaks. Proponemos metodologías pragmáticas de seguridad para desacoplar la protección con las siguientes ventajas: no cambios en el protocolo BGP, cero dependencia en la información de terceros, ni de infraestructura de seguridad de terceros, y de beneficio propio. Del mismo modo, investigamos las vulnerabilidades actuales sobre LISP con énfasis en su plano de control y soporte de movilidad. Aprovechamos la separacçón de sus planos de control y de datos para proponer un proceso mejorado de registro de identificadores de ubicación y punto final, validando de forma segura sus respectivas autorizaciones. Esta propuesta mejora la movilidad de los usuarios finales con respecto a segurar un enrutamiento dinámico del tráfico a través de Internet. En paralelo, desde el punto de vista de usuarios finales y dispositivos investigamos nuevos paradigmas y arquitecturas con el objetivo de mejorar su protección de forma controlable y consolidada. Con este fin, proponemos un nuevo paradigma hacia una protección centrada en el usuario. Nuestra propuesta se centra en el desacoplamiento o ampliación de la protección de seguridad de los dispositivos finales hacia el borde de la red. La misma busca la homogeneización de la protección del usuario independientemente del dispositivo utilizado. Además, investigamos este paradigma en un escenario con movilidad. Validamos nuestra propuesta proporcionando resultados experimentales obtenidos de diferentes experimentos y pruebas de concepto implementados

    Novel architectures and strategies for security offloading

    Get PDF
    Internet has become an indispensable and powerful tool in our modern society. Its ubiquitousness, pervasiveness and applicability have fostered paradigm changes around many aspects of our lives. This phenomena has positioned the network and its services as fundamental assets over which we rely and trust. However, Internet is far from being perfect. It has considerable security issues and vulnerabilities that jeopardize its main core functionalities with negative impact over its players. Furthermore, these vulnerabilities¿ complexities have been amplified along with the evolution of Internet user mobility. In general, Internet security includes both security for the correct network operation and security for the network users and endpoint devices. The former involves the challenges around the Internet core control and management vulnerabilities, while the latter encompasses security vulnerabilities over end users and endpoint devices. Similarly, Internet mobility poses major security challenges ranging from routing complications, connectivity disruptions and lack of global authentication and authorization. The purpose of this thesis is to present the design of novel architectures and strategies for improving Internet security in a non-disruptive manner. Our novel security proposals follow a protection offloading approach. The motives behind this paradigm target the further enhancement of the security protection while minimizing the intrusiveness and disturbance over the Internet routing protocols, its players and users. To accomplish such level of transparency, the envisioned solutions leverage on well-known technologies, namely, Software Defined Networks, Network Function Virtualization and Fog Computing. From the Internet core building blocks, we focus on the vulnerabilities of two key routing protocols that play a fundamental role in the present and the future of the Internet, i.e., the Border Gateway Protocol (BGP) and the Locator-Identifier Split Protocol (LISP). To this purpose, we first investigate current BGP vulnerabilities and countermeasures with emphasis in an unresolved security issue defined as Route Leaks. Therein, we discuss the reasons why different BGP security proposals have failed to be adopted, and the necessity to propose innovative solutions that minimize the impact over the already deployed routing solution. To this end, we propose pragmatic security methodologies to offload the protection with the following advantages: no changes to the BGP protocol, neither dependency on third party information nor on third party security infrastructure, and self-beneficial. Similarly, we research the current LISP vulnerabilities with emphasis on its control plane and mobility support. We leverage its by-design separation of control and data planes to propose an enhanced location-identifier registration process of end point identifiers. This proposal improves the mobility of end users with regards on securing a dynamic traffic steering over the Internet. On the other hand, from the end user and devices perspective we research new paradigms and architectures with the aim of enhancing their protection in a more controllable and consolidated manner. To this end, we propose a new paradigm which shifts the device-centric protection paradigm toward a user-centric protection. Our proposal focus on the decoupling or extending of the security protection from the end devices toward the network edge. It seeks the homogenization of the enforced protection per user independently of the device utilized. We further investigate this paradigm in a mobility user scenario. Similarly, we extend this proposed paradigm to the IoT realm and its intrinsic security challenges. Therein, we propose an alternative to protect both the things, and the services that leverage from them by consolidating the security at the network edge. We validate our proposal by providing experimental results from prof-of-concepts implementations.Internet se ha convertido en una poderosa e indispensable herramienta para nuestra sociedad moderna. Su omnipresencia y aplicabilidad han promovido grandes cambios en diferentes aspectos de nuestras vidas. Este fenómeno ha posicionado a la red y sus servicios como activos fundamentales sobre los que contamos y confiamos. Sin embargo, Internet está lejos de ser perfecto. Tiene considerables problemas de seguridad y vulnerabilidades que ponen en peligro sus principales funcionalidades. Además, las complejidades de estas vulnerabilidades se han ampliado junto con la evolución de la movilidad de usuarios de Internet y su limitado soporte. La seguridad de Internet incluye tanto la seguridad para el correcto funcionamiento de la red como la seguridad para los usuarios y sus dispositivos. El primero implica los desafíos relacionados con las vulnerabilidades de control y gestión de la infraestructura central de Internet, mientras que el segundo abarca las vulnerabilidades de seguridad sobre los usuarios finales y sus dispositivos. Del mismo modo, la movilidad en Internet plantea importantes desafíos de seguridad que van desde las complicaciones de enrutamiento, interrupciones de la conectividad y falta de autenticación y autorización globales. El propósito de esta tesis es presentar el diseño de nuevas arquitecturas y estrategias para mejorar la seguridad de Internet de una manera no perturbadora. Nuestras propuestas de seguridad siguen un enfoque de desacople de la protección. Los motivos detrás de este paradigma apuntan a la mejora adicional de la seguridad mientras que minimizan la intrusividad y la perturbación sobre los protocolos de enrutamiento de Internet, sus actores y usuarios. Para lograr este nivel de transparencia, las soluciones previstas aprovechan nuevas tecnologías, como redes definidas por software (SDN), virtualización de funciones de red (VNF) y computación en niebla. Desde la perspectiva central de Internet, nos centramos en las vulnerabilidades de dos protocolos de enrutamiento clave que desempeñan un papel fundamental en el presente y el futuro de Internet, el Protocolo de Puerta de Enlace Fronterizo (BGP) y el Protocolo de Separación Identificador/Localizador (LISP ). Para ello, primero investigamos las vulnerabilidades y medidas para contrarrestar un problema no resuelto en BGP definido como Route Leaks. Proponemos metodologías pragmáticas de seguridad para desacoplar la protección con las siguientes ventajas: no cambios en el protocolo BGP, cero dependencia en la información de terceros, ni de infraestructura de seguridad de terceros, y de beneficio propio. Del mismo modo, investigamos las vulnerabilidades actuales sobre LISP con énfasis en su plano de control y soporte de movilidad. Aprovechamos la separacçón de sus planos de control y de datos para proponer un proceso mejorado de registro de identificadores de ubicación y punto final, validando de forma segura sus respectivas autorizaciones. Esta propuesta mejora la movilidad de los usuarios finales con respecto a segurar un enrutamiento dinámico del tráfico a través de Internet. En paralelo, desde el punto de vista de usuarios finales y dispositivos investigamos nuevos paradigmas y arquitecturas con el objetivo de mejorar su protección de forma controlable y consolidada. Con este fin, proponemos un nuevo paradigma hacia una protección centrada en el usuario. Nuestra propuesta se centra en el desacoplamiento o ampliación de la protección de seguridad de los dispositivos finales hacia el borde de la red. La misma busca la homogeneización de la protección del usuario independientemente del dispositivo utilizado. Además, investigamos este paradigma en un escenario con movilidad. Validamos nuestra propuesta proporcionando resultados experimentales obtenidos de diferentes experimentos y pruebas de concepto implementados.Postprint (published version

    Future directions for scientific advice in Europe

    Get PDF
    Across Europe, scientific evidence and advice is in great demand, to inform policies and decision making on issues such as climate change, new technologies and environmental regulation. But the diversity of political cultures and attitudes to expertise in different European countries can make the task of designing EU-wide advisory institutions and processes both sensitive and complex. In January 2015, President Juncker asked Commissioner Moedas to report on options for improving scientific advice within the European Commission. At a time when these issues are higher than usual on the political agenda, it is important that the case for scientific advice and evidence-informed policy is articulated and analysed afresh. To support these efforts, this collection brings together agenda-setting essays by policymakers, practitioners, scientists and scholars from across Europe. Authors include Anne Glover, Ulrike Felt, Robert Madelin, Andy Stirling, Vladimír Šucha and Jos van der Meer. Their contributions outline various challenges but also constructive ways forward for scientific advice in Europe

    The electric commons: A qualitative study of community accountability

    Get PDF
    This study explores how energy might be conceptualised as a commons, a resource owned and managed by a community with a system of rules for production and consumption. It tests one aspect of Elinor Ostrom's design principles for successful management of common pool resources: that there should be community accountability for individual consumption behaviour. This is explored through interviews with participants in a community demand response (DR) trial in an urban neighbourhood in the UK. Domestic DR can make a contribution to balancing electricity supply and demand. This relies on smart meters, which raise vertical (individual to large organisation) privacy concerns. Community and local approaches could motivate greater levels of DR than price signals alone. We found that acting as part of a community is motivating, a conclusion which supports local and community based roll out of smart meters. Mutually supportive, voluntary, and anonymous sharing of information was welcomed. However, mutual monitoring was seen as an invasion of horizontal (peer to peer) privacy. We conclude that the research agenda, which asks whether local commons-based governance of electricity systems could provide social and environmental benefits, is worth pursuing further. This needs a shift in regulatory barriers and ‘governance-system neutral’ innovation funding
    corecore