83 research outputs found

    Tracing controversies in hacker communities: ethical considerations for internet research

    Get PDF
    This paper reflects on the ethics of internet research on community controversies. Specifically, it focuses on controversies concerning gendered, social interaction in hacking communities. It addresses the question how internet researchers should treat and represent content that individuals controversially discussed online. While many internet sources are likewise technically public, they may yet suggest distinct privacy expectations on the part of involved individuals. In internet research, ethical decision-making regarding which online primary sources may be, e.g., referenced and quoted or require anonymisation is still ambiguous and contested. Instead of generalisable rules, the context dependence of internet research ethics has been frequently stressed. Given this ambiguity, the paper elaborates on ethical decisions and their implications by exploring the case of a controversial hackerspaces.org mailing list debate. In tracing data across different platforms, it analyses the emerging ethico-methodological challenges

    Does relative age affect fame? Ask Wikipedia

    No full text

    An Architecture for Privacy-aware Inter-domain Identity Management

    No full text
    Abstract. The management of service oriented architectures demands an efficient control of service users and their authorizations. Similar to structured cabling in LANs, Identity & Access Management systems have proven to be important components of organizations ’ IT infrastructures. Yet, due to new management challenges such as virtual organizations, on-demand computing and the integration of third party services through composition, identity information has to be passed to external service providers; this decentralization inherently leads to interoperability and privacy issues, which existing management standards are not dealing with appropriately yet. We present an architecture, based on SAML, XACML and XSLT, which provides a tight integration of crossorganizational identity data transfer into the local provisioning business processes along with a policy-driven inter-domain privacy management system, and its implementation.

    Seek the Consent, Respect the Dissent: An Analysis of User Behaviors in Online Collaborative Community

    No full text
    • …
    corecore