1,650 research outputs found

    Sites and Demonstrations in STAIR Scholarship

    Get PDF

    Beyond “Quasi-Norms”: The Challenges and Potential of Engaging with Norms in Cyberspace

    Get PDF
    As in any realm of human activity, norms are unavoidable in cyberspace. Yet cyber- space is a singularly complex setting within which to understand and try to shape norms. The problem is not simply the nature of cyberspace, although, as we will address below, acknowledging the unique characteristics of cyberspace is crucial when exploring norms in this realm. Rather, the challenge lies in the often over- looked nature of norms themselves and how their defining features render them especially difficult to decipher – and, by extension, to attempt to design – in the context of cyberspace. Norms are widely-accepted and internalised principles or codes of conduct that indicate what is deemed to be permitted, prohibited, or required of agents within a specific community. The modest aim of our chapter is to explore the challenges and potential of engaging with norms in cyberspace. By ‘engaging with norms in cyberspace’ we mean both understanding existing norms and the more prominent endeavour (prevalent in recent discussions of policies related to both cyber security and Internet governance) of what is variously described as ‘cultivating’, ‘promoting’ or ‘developing’ new norms.2 Our focus throughout most of this chapter will be on the former. Indeed, a central point of the argument that will follow is that one can- not hope to ‘cultivate’ norms in cyberspace without first understanding the existing normative landscape. In order to explore the challenges and potential of engaging with norms in cyberspace, we will take five steps. First, we will elaborate upon the definition of ‘norms’ offered above. In doing this, we will draw on influential work from within the discipline of International Relations (IR), and specifically from the multifaceted approaches labelled ‘normative IR theory’ and ‘constructivism’.3 Second, we will introduce a task that is fundamental to understanding existing norms in any realm, including cyberspace: interpreting the norms themselves. Third, we will highlight the characteristics of cyberspace that render this crucial task particularly difficult; namely, that it is a new and rapidly changing realm in which underlying values are contested and relevant agents are often difficult to identify. Fourth, we will link the difficulties of addressing norms in such a realm with the tendency to invoke what we will call ‘quasi-norms’, or merely purported norms. Fifth and finally, we will turn to the potential to engage with norms in cyberspace, regardless of obstacles, by uncovering what we will call the ‘norm of de-territorialised data’ and, in the process, demonstrating how evidence for its status as such can be uncovered in the justifications and judgements that agents in international politics offer when it is violated. Our hope is that these preliminary steps will take us some distance towards establishing a conceptual framework for speaking more coherently about norms in cyberspace

    Crossed Wires: International Cooperation on Cyber Security

    Get PDF

    Networked world: Risks and opportunities in the Internet of Things

    Get PDF
    The Internet of Things (IoT) – devices that are connected to the Internet and collect and use data to operate – is about to transform society. Everything from smart fridges and lightbulbs to remote sensors and cities will collect data that can be analysed and used to provide a wealth of bespoke products and services. The impacts will be huge - by 2020, some 25 billion devices will be connected to the Internet with some studies estimating this number will rise to 125 billion in 2030. These will include many things that have never been connected to the Internet before. Like all new technologies, IoT offers substantial new opportunities which must be considered in parallel with the new risks that come with it. To make sense of this new world, Lloyd’s worked with University College London’s (UCL) Department of Science, Technology, Engineering and Public Policy (STEaPP) and the PETRAS IoT Research Hub to publish this report. ‘Networked world’ analyses IoT’s opportunities, risks and regulatory landscape. It aims to help insurers understand potential exposures across marine, smart homes, water infrastructure and agriculture while highlighting the implications for insurance operations and product development. The report also helps risk managers assess how this technology could impact their businesses and consider how they can mitigate associated risks

    Cyber Metrics: Getting the conversation straight between technical and non-technical actors

    Get PDF
    On May 23, 2018, RISCS held a workshop in London that looked at the utility of cyber security metrics. The purpose of the workshop was to develop a deeper understanding of the ways in which cyber security metrics are used in decision-making more generally, and also to raise questions about how data is best presented to the board and the policy community more specifically. We wanted to explore the potential for metrics to help but we also want to take a critical approach to the underlying values that can shape metrics – and consequently, decisions

    A critical review on recent advancements of the removal of reactive dyes from dyehouse effluent by ion-exchange adsorbents

    Get PDF
    The effluent discharged by the textile dyehouses has a seriously detrimental effect on the aquatic environment. Some dyestuffs produce toxic decomposition products and the metal complex dyes release toxic heavy metals to watercourses. Of the dyes used in the textile industry, effluents containing reactive dyes are the most difficult to treat because of their high water-solubility and poor absorption into the fibers. A range of treatments has been investigated for the decolorization of textile effluent and the adsorption seems to be one of the cheapest, effective and convenient treatments. In this review, the adsorbents investigated in the last decade for the treatment of textile effluent containing reactive dyes including modified clays, biomasses, chitin and its derivatives, and magnetic ion-exchanging particles have been critically reviewed and their reactive dye binding capacities have been compiled and compared. Moreover, the dye binding mechanism, dye sorption isotherm models and also the merits/demerits of various adsorbents are discussed. This review also includes the current challenges and the future directions for the development of adsorbents that meet these challenges. The adsorption capacities of adsorbents depend on various factors, such as the chemical structures of dyes, the ionic property, surface area, porosity of the adsorbents, and the operating conditions. It is evident from the literature survey that decolorization by the adsorption shows a great promise for the removal of color from dyehouse effluent. If biomasses want to compete with the established ion-exchange resins and activated carbon, their dye binding capacity will need to be substantially improved

    POEMS neuropathy: optimising diagnosis and management

    Get PDF
    POEMS syndrome is a rare and disabling autoinflammatory condition characterised by a typical peripheral neuropathy and the presence of a monoclonal plasma cell disorder. The acronym 'POEMS' represents the complex and multisystem features of the disease, including polyneuropathy, organomegaly, endocrinopathy, a monoclonal plasma cell disorder and skin disease. The diagnosis of POEMS is a significant challenge because of the heterogeneity of clinical presentations and variation of POEMS features. Patients are often misdiagnosed with another cause of inflammatory neuropathy and receive one or more ineffective immunomodulatory medications, resulting in delayed diagnosis and further clinical deterioration before a diagnosis is made. University College London Hospitals sees one of the largest reported POEMS cohorts in Europe, and runs a multispecialist clinic to assist with diagnosis, treatment and ongoing support. This review draws upon our experience to present the typical features of POEMS syndrome and highlight diagnostic conundrums commonly experienced, supplemented with clinical cases. We provide an investigative guide for clinicians when considering POEMS as the diagnosis, and propose a treatment algorithm that centres on the site and degree of monoclonal cell proliferation

    Governance and Policy Cooperation on the Cyber Security of the Internet of Things

    Get PDF
    This report was based on a workshop. The impetus for this workshop was the recognition that international policy cooperation on the cybersecurity aspects of the IoT has made little progress. This is due in part to a failure to establish a functioning community of technicians and policymakers who are jointly focusing on these issues. From a technical perspective, the IoT will significantly increase opportunities to breach security via new attack surfaces. For policymakers, the heightened insecurity created by the rapid expansion of the IoT marks a significant governance challenge. Addressing these security deficiencies will require an increase in the capacity to share threat information as well as a range of innovative technical and policy solutions. The workshop marked a starting point in building a global community of security practitioners and policymakers who are interested in these issues and who are working on similar topics
    • 

    corecore