Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
The World Of Bits, Andrew D. Murray
The World Of Bits, Andrew D. Murray
Professor Andrew D Murray
This is Chapter One of my forthcoming book Information Technology Law: The Law and Society to be published by Oxford University Press in May 2010. It is made available as a limited preview.
An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman
An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman
Stephen P. Hoffman
I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …
Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes
Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes
Ronald Leenes
Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …
An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou
An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou
Konstantinos Stylianou
This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …