2,867 research outputs found

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Get PDF
    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud \ud Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud \ud Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud \ud Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud \ud Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud \ud Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk

    Ethics of e-voting: an essay on requirements and values in Internet elections

    Get PDF
    In this paper, we investigate ethical issues involved in the development and implementation of Internet voting technology. From a phenomenological perspective, we describe how voting via the Internet mediates the relation between people and democracy. In this relation, trust plays a major role. The dynamics of trust in the relation between people and their world forms the basis for our analysis of the ethical issues involved. First, we consider established principles of voting, confirming the identity of our democracy, which function as expectations in current experiments with online voting in the Netherlands. We investigate whether and how Internet voting can meet these expectations and thereby earn trust, based on the experiments in the Netherlands. We identify major challenges, and provide a basis for ethical and political discussion on these issues, especially the changed relation between public and private. If we decide that we want to vote via the Internet, more practical matters come into play in the implementation of the technology. The choices involved here are discussed in relation to the mediating role of concrete voting technologies in the relation between citizen and state

    Vote buying revisited: implications for receipt-freeness

    Get PDF
    In this paper, we analyse the concept of vote buying based on examples that try to stretch the meaning of the concept. Which ex- amples can still be called vote buying, and which cannot? We propose several dimensions that are relevant to qualifying an action as vote buy- ing or not. As a means of protection against vote buying and coercion, the concept of receipt-freeness has been proposed. We argue that, in or- der to protect against a larger set of vote buying activities, the concept of receipt-freeness should be interpreted probabilistically. We propose a general definition of probabilistic receipt-freeness by adapting existing definitions of probabilistic anonymity to voting

    Statically checking confidentiality via dynamic labels

    Get PDF
    This paper presents a new approach for verifying confidentiality for programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prover PVS. We use dynamic labeling functions to abstractly interpret a simple programming language via modification of security levels of variables. Our approach is sound and compositional and results in an algorithm for statically checking confidentiality

    Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain

    Get PDF
    The security goals of an organization are implemented through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals without violating any policies, by combining physical, digital and social means. This paper presents the Portunes model, a model for describing and analyzing attack scenarios across the three security areas. Portunes formally describes security alignment of an organization and finds attack scenarios by analyzing inconsistencies between policies from the different security areas. For this purpose, the paper defines a language in the tradition of the Klaim family of languages, and uses graph-based algorithms to find attack scenarios that can be described using the defined language

    RIES: Internet voting in action

    Get PDF
    RIES stands for Rijnland Internet Election System. It is an online voting system that was developed by one of the Dutch local authorities on water management. The system has been used twice in the fall of 2004 for in total approximately two million potential voters. In this paper we describe how this system works. Furthermore we do not only describe how the outcome of the elections can be verified but also how it has been verified by us. To conclude the paper we describe some possible points for improvement

    La volonté machinale: understanding the electronic voting controversy

    Get PDF
    Contains fulltext : 32048_voloma.pdf (publisher's version ) (Open Access)Radboud Universiteit Nijmegen, 21 januari 2008Promotor : Jacobs, B.P.F. Co-promotores : Poll, E., Becker, M.226 p

    Lunar Resources Using Moderate Spectral Resolution Visible and Near-infrared Spectroscopy: Al/si and Soil Maturity

    Get PDF
    Modern visible and near-infrared detectors are critically important for the accurate identification and relative abundance measurement of lunar minerals; however, even a very small number of well-placed visible and near-infrared bandpass channels provide a significant amount of general information about crucial lunar resources. The Galileo Solid State Imaging system (SSI) multispectral data are an important example of this. Al/Si and soil maturity will be discussed as examples of significant general lunar resource information that can be gleaned from moderate spectral resolution visible and near-infrared data with relative ease. Because quantitative-albedo data are necessary for these kinds of analyses, data such as those obtained by Galileo SSI are critical. SSI obtained synoptic digital multispectral image data for both the nearside and farside of the Moon during the first Galileo Earth-Moon encounter in December 1990. The data consist of images through seven filters with bandpasses ranging from 0.40 microns in the ultraviolet to 0.99 microns in the near-infrared. Although these data are of moderate spectral resolution, they still provide information for the following lunar resources: (1) titanium content of mature mare soils based upon the 0.40/0.56-micron (UV/VIS) ratio; (2) mafic mineral abundance based upon the 0.76/0.99-micron ratio; and (3) the maturity or exposure age of the soils based upon the 0.56-0.76-micron continuum and the 0.76/0.99-micron ratio. Within constraints, these moderate spectral resolution visible and near-infrared reflectance data can also provide elemental information such as Al/Si for mature highland soils

    Combatting electoral traces: the Dutch tempest discussion and beyond

    Get PDF
    In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk. In this paper, we use actor-network theory to analyse the socio-technical origins of the Dutch tempest issue in e-voting, and its consequences for e-voting beyond the Netherlands. We introduce the term electoral traces to denote any physical, digital or social evidence of a voter's choices in an election. From this perspective, we provide guidelines for risk analysis as well as an overview of countermeasures
    corecore