5,017 research outputs found

    Flow Fragmentalism

    Get PDF
    In this paper, we articulate a version of non-standard A-theory – which we call Flow Fragmentalism – in relation to its take on the issue of supervenience of truth on being. According to the Truth Supervenes on Being (TSB) Principle, the truth of past- and future-tensed propositions supervenes, respectively, on past and future facts. Since the standard presentist denies the existence of past and future entities and facts concerning them that do not obtain in the present, she seems to lack the resources to accept both past and future-tensed truths and the TSB Principle. Contrariwise, positions in philosophy of time that accept an eternalist ontology (e.g., B-theory, moving spotlight, and Fine’s and Lipman’s versions of fragmentalism) allow for a “direct” supervenience base for past- and future-tensed truths. We argue that Flow Fragmentalism constitutes a middle ground, which retains most of the advantages of both views, and allows us to articulate a novel account of the passage of time

    Political Competitiveness

    Get PDF
    Political competitiveness – which many interpret as the degree of democracy – can be modeled as a monopolistic competition. All regimes are constrained by the threat of "entry," and thereby seek some combination of popular support and political entry barriers. This simple model predicts that many public policies are unrelated to political competitiveness, and that even unchallenged nondemocratic regimes should tax far short of their Laffer curve maximum. Economic sanctions, odious debt repudiation, and other policies designed to punish dictators can have the unintended consequences of increasing oppression and discouraging competition. Since entry barriers are a form of increasing returns, democratic countries (defined according to low entry barriers) are more likely to subdivide and nondemocratic countries are more likely to merge. These and other predictions are consistent with previous empirical findings on comparative public finance, election contests, international conflict, the size of nations, and the Lipset hypothesis. As in the private sector, the number of competitors is not necessarily a good indicator of public sector competitiveness.

    Privacy In The Smart Grid: An Information Flow Analysis

    Get PDF
    Project Final Report prepared for CIEE and California Energy Commissio

    An Examination of Australians of Hellenic Descent in the State Parliament of Victoria

    Get PDF
    Continuing a series of analyses of the role of elected State and Federal representatives of Hellenic descent in Australia, this paper will focus on the Victorian State Parliament, but with reference also to current and former Victorian Federal parliamentarians

    The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident

    Get PDF
    Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers\u27 computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided. The Article first addresses the market-based rationales that likely influenced Sony BMG\u27s deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG\u27s internal strategizing demonstrates a failure to adequately value security and privacy. After taking stock of the then-existing technological environment that both encouraged and enabled the distribution of these protection measures, the Article examines law, the third vector of influence on Sony BMG\u27s decision to release flawed protection measures into the wild, and argues that existing doctrine in the fields of contract, intellectual property, and consumer protection law fails to adequately counter the technological and market forces that allowed a self-interested actor to inflict these harms on the public. The Article concludes with two recommendations aimed at reducing the likelihood of companies deploying protection measures with known security vulnerabilities in the consumer marketplace. First, Congress should alter the Digital Millennium Copyright Act (DMCA) by creating permanent exemptions from its anti-circumvention and antitrafficking provisions that enable security research and the dissemination of tools to remove harmful protection measures. Second, the Federal Trade Commission should leverage insights from the field of human computer interaction security (HCI-Sec) to develop a stronger framework for user control over the security and privacy aspects of computers

    Bridging the Gap Between Privacy and Design

    Get PDF

    The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident

    Get PDF
    Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers\u27 computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided. The Article first addresses the market-based rationales that likely influenced Sony BMG\u27s deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG\u27s internal strategizing demonstrates a failure to adequately value security and privacy. After taking stock of the then-existing technological environment that both encouraged and enabled the distribution of these protection measures, the Article examines law, the third vector of influence on Sony BMG\u27s decision to release flawed protection measures into the wild, and argues that existing doctrine in the fields of contract, intellectual property, and consumer protection law fails to adequately counter the technological and market forces that allowed a self-interested actor to inflict these harms on the public. The Article concludes with two recommendations aimed at reducing the likelihood of companies deploying protection measures with known security vulnerabilities in the consumer marketplace. First, Congress should alter the Digital Millennium Copyright Act (DMCA) by creating permanent exemptions from its anti-circumvention and antitrafficking provisions that enable security research and the dissemination of tools to remove harmful protection measures. Second, the Federal Trade Commission should leverage insights from the field of human computer interaction security (HCI-Sec) to develop a stronger framework for user control over the security and privacy aspects of computers
    corecore