Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2023
Data protection of internet of things for edge computing and deep learning and governance of cyberspace
International Journal of Grid and Utility Computing (IJGUC), Volume 14, Issue 2-3Pages 191–204https://doi.org/10.1504/ijguc.2023.131004The purpose is to deal with the network security problems in the background of the high information age, ensure the popularisation of Internet of things (IoT) technology based on Internet technology, and protect the information, life and property security ...
- abstractApril 2020
Will Punishing Robots Become Imperative in the Future?
CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing SystemsPages 1–8https://doi.org/10.1145/3334480.3383006The possibility of extending legal personhood to artificial intelligence (AI) and robots has raised many questions on how these agents could be held liable given existing legal doctrines. Intending to promote a broader discussion, we conducted a survey (...
- articleJanuary 2017
Forensically ready digital identity management systems, issues of digital identity life cycle and context of usage
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 9, Issue 1Pages 62–83https://doi.org/10.1504/IJESDF.2017.081781Collecting necessary digital and network forensics to prove the identity of an individual who is responsible for a crime, or suspected of a malicious attack, or has used a device during an incident, with minimum doubt to the court or other legitimate ...
- research-articleDecember 2016
The public will vs. the public trust: Early american radio as a public information resource
Proceedings of the Association for Information Science and Technology (PRA2), Volume 53, Issue 1Pages 1–10https://doi.org/10.1002/pra2.2016.14505301080ABSTRACTOver the century that has transpired since the first public broadcasts aired in the US, radio programming has become a staunchly commercial enterprise. The earliest radio broadcasts, by contrast, were seen as public goods to be protected in the ...
- research-articleOctober 2016
The public will vs. the public trust: early american radio as a public information resource
ASIST '16: Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & TechnologyArticle No.: 80, Pages 1–10Over the century that has transpired since the first public broadcasts aired in the US, radio programming has become a staunchly commercial enterprise. The earliest radio broadcasts, by contrast, were seen as public goods to be protected in the interest ...
-
- short-paperMay 2016
A manifesto for data sharing in social media research
WebSci '16: Proceedings of the 8th ACM Conference on Web SciencePages 166–172https://doi.org/10.1145/2908131.2908172More and more researchers want to share research data collected from social media to allow for reproducibility and comparability of results. With this paper we want to encourage them to pursue this aim -- despite initial obstacles that they may face. ...
- ArticleAugust 2015
Deploying Honeypots and Honeynets: Issue of Privacy
ARES '15: Proceedings of the 2015 10th International Conference on Availability, Reliability and SecurityPages 397–403https://doi.org/10.1109/ARES.2015.91Honey pots and honey nets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to be carefully considered together. In this ...
- ArticleDecember 2013
Big Data and NSA Surveillance -- Survey of Technology and Legal Issues
ISM '13: Proceedings of the 2013 IEEE International Symposium on MultimediaPages 516–517https://doi.org/10.1109/ISM.2013.103As technology for data storage and computing enhances on a new dimension, real world evidence based decision has become possible, and a new concept called "Big Data" has emerged. Leaders for Big Data technology development are mainly national security ...
- articleOctober 2013
A Framework for the E-Discovery of Social Media Content in the United States
Information Systems Management (TFISM), Volume 30, Issue 4Pages 352–358https://doi.org/10.1080/10580530.2013.832965People are using social networking sites SNS for day-to-day communications, outpacing email and texts. SNS are evidence gold mines subject to discovery in investigations, audits, and litigation. This paper examines the Federal Rules of Civil Procedure ...
- ArticleJuly 2013
Prêt à voter providing everlasting privacy
Vote-ID'13: Proceedings of the 4th international conference on E-Voting and IdentityPages 156–175https://doi.org/10.1007/978-3-642-39185-9_10This paper shows how Prêt à Voter can be adjusted in order to provide everlasting privacy. This is achieved by adapting the ballot generation and anonymisation process, such that only unconditional hiding commitments and zero knowledge proofs are ...
- posterMarch 2013
Nifty computing in society case studies (abstract only)
SIGCSE '13: Proceeding of the 44th ACM technical symposium on Computer science educationPage 746https://doi.org/10.1145/2445196.2445466This session is being organized by ACM SIGCAS (Computers and Society) for those with an interest in addressing the social and ethical consequences of computing in our society within their curricula. This year we will share case studies as a means to ...
- ArticleMay 2012
The Study of Legal Issues of Cyber War
ICEE '12: Proceedings of the 2012 3rd International Conference on E-Business and E-Government - Volume 05Pages 1350–1353Offensive cyber operations (cyber attack and cyber exploitation) have made a great challenge to right to wage a war and Charter of the United Nations. The opposition in cyberspace is not avoided in future's conflict, the decision makers are better to ...
- articleApril 2011
Safeguards in a world of ambient intelligence: A social, economic, legal, and ethical perspective
The book “Safeguards in a world of ambient intelligence” is unique in its kind. It discusses social, economic, legal, technological and ethical issues related to identity, privacy and security in Ambient Intelligence (AmI). It introduces AmI and, ...
- ArticleMay 2010
The Preliminary Settlement of Crowdsourcing Legal Issues
ICEE '10: Proceedings of the 2010 International Conference on E-Business and E-GovernmentPages 4898–4900https://doi.org/10.1109/ICEE.2010.1230Crowdsourcing was defined as the act of taking tasks traditionally performed by an employee or contractor, and outsourcing them to a group (crowd) of people or community in the form of an open call. The legal issues of crowdsourcing is mainly manifested ...
- research-articleJanuary 2010
The Next Chapter at Google
IEEE Micro (IMIC), Volume 30, Issue 1Pages 4–7https://doi.org/10.1109/MM.2010.27After its first dozen years, Google possesses some economic similarities to Microsoft at age 15, as well as a few key differences.
- research-articleJuly 2008
E-Discovery: Identifying and Mitigating Security Risks during Litigation
IT Professional (IEEECS_ITPRO), Volume 10, Issue 4Pages 20–25https://doi.org/10.1109/MITP.2008.67When producing electronically stored information (ESI) in response to lawsuits, businesses face several security risks as well as legal requirements they must satisfy. Customized document management programs and e-discovery policies are key tools in ...
- ArticleMarch 2008
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies
ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and SecurityPages 363–368https://doi.org/10.1109/ARES.2008.146Recently researchers are being encouraged to address security and privacy requirements for location information. This work contributes to this area by presenting CERTILOC, a prototype of a spatialtemporal certification service that is interoperable with ...
- ArticleFebruary 2008
Legal Issues Concerning Composite Software
ICCBSS '08: Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008)Pages 204–214https://doi.org/10.1109/ICCBSS.2008.21An examination is done about the concepts related to the legal issues that concern the computer software developments when using free software and free software components. Also, an analysis is done regarding the different types of free software ...
- ArticleMarch 2007
Honeypots: concepts, approaches, and challenges
ACMSE '07: Proceedings of the 45th annual ACM Southeast ConferencePages 321–326https://doi.org/10.1145/1233341.1233399Information security is a growing concern today for organizations and individuals alike. This has led to growing interest in more aggressive forms of defense to supplement the existing methods. One of these methods involves the use of honeypots. A ...