2,055 research outputs found

    Data-Driven Elections and Political Parties in Canada: Privacy Implications, Privacy Policies and Privacy Obligations

    Get PDF
    In light of the revelations concerning Cambridge Analytica, we are now in an era of heightened publicity and concern about the role of voter analytics in elections. Parties in Canada need to enhance their privacy management practices and commit to complying with national privacy principles in all their operations. As shown in this article’s comparative analysis of the privacy policies of federal and provincial political parties in Canada, policies are often difficult to find, unclear, and, with a couple of exceptions, do not address all the privacy principles. Accountability and complaints mechanisms are often not clearly publicized, and many are silent on procedures for the access and correction of data, and unsubscribing from lists. Vague and expansive statements of purpose are also quite common. However, this article shows that parties could comply with all 10 principles within the Canadian Standard Association (CSA)’s National Standard of Canada, upon which Canadian privacy law is based, without difficulty; though compliance will require a thorough process of self-assessment and a commitment across the political spectrum to greater transparency. The early experience in British Columbia (B.C.), where parties are regulated under the provincial Personal Information Protection Act, suggests that this process is beneficial for all concerned. In contrast to the system of self-regulation incorporated into the Elections Modernization Act, there is no inherent reason why parties could not be legally mandated to comply with all 10 principles, under the oversight of the Office of the Privacy Commissioner of Canada

    Weak randomness completely trounces the security of QKD

    Get PDF
    In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels

    Privacy, surveillance, and the democratic potential of the social web

    Full text link
    This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements in social networking environments. We fi rst explore how social networking services (SNS) have evolved through diff erent phases and how they enable political deliberation. Subsequently, we discuss more traditional individualistic and intersubjective theories of privacy in relation to social networking and point out their limitations in identifying and redressing social networking-related harms. We then critique emerging claims concerning the social value of privacy in the context of the social Web. Here we point out how these theories might identify non-individualized harms, yet, at the same time, suff er important challenges in application. We conclude by arguing that deliberative democratic theory can add some critical insights into the privacy harms encountered on the contemporary “social Web” that are only imperfectly understood by individualistic and social conceptions of privac

    Implementation of the Multiple Point Principle in the Two-Higgs Doublet Model of type II

    Full text link
    The multiple point principle (MPP) is applied to the non--supersymmetric two-Higgs doublet extension of the Standard Model (SM). The existence of a large set of degenerate vacua at some high energy scale caused by the MPP results in a few relations between Higgs self-coupling constants which can be examined at future colliders. The numerical analysis reveals that these MPP conditions constrain the mass of the SM--like Higgs boson to lie below 180 GeV for a wide set of MPP scales Λ\Lambda and tan⁥ÎČ\tan\beta.Comment: 26 pages, 3 figures, some minor changes to the tex

    Quantum vortices and trajectories in particle diffraction

    Full text link
    We investigate the phenomenon of the diffraction of charged particles by thin material targets using the method of the de Broglie-Bohm quantum trajectories. The particle wave function can be modeled as a sum of two terms ψ=ψingoing+ψoutgoing\psi=\psi_{ingoing}+\psi_{outgoing}. A thin separator exists between the domains of prevalence of the ingoing and outgoing wavefunction terms. The structure of the quantum-mechanical currents in the neighborhood of the separator implies the formation of an array of \emph{quantum vortices}. The flow structure around each vortex displays a characteristic pattern called `nodal point - X point complex'. The X point gives rise to stable and unstable manifolds. We find the scaling laws characterizing a nodal point-X point complex by a local perturbation theory around the nodal point. We then analyze the dynamical role of vortices in the emergence of the diffraction pattern. In particular, we demonstrate the abrupt deflections, along the direction of the unstable manifold, of the quantum trajectories approaching an X-point along its stable manifold. Theoretical results are compared to numerical simulations of quantum trajectories. We finally calculate the {\it times of flight} of particles following quantum trajectories from the source to detectors placed at various scattering angles Ξ\theta, and thereby propose an experimental test of the de Broglie - Bohm formalism.Comment: 17 pages, 7 figures, accepted by IJB

    Practical quantum repeaters with linear optics and double-photon guns

    Get PDF
    We show how to create practical, efficient, quantum repeaters, employing double-photon guns, for long-distance optical quantum communication. The guns create polarization-entangled photon pairs on demand. One such source might be a semiconducter quantum dot, which has the distinct advantage over parametric down-conversion that the probability of creating a photon pair is close to one, while the probability of creating multiple pairs vanishes. The swapping and purifying components are implemented by polarizing beam splitters and probabilistic optical CNOT gates.Comment: 4 pages, 4 figures ReVTe
    • 

    corecore