Open Access. Powered by Scholars. Published by Universities.®
Science and Technology Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in Science and Technology Studies
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Icts For Surveillance And Suppression: The Case Of The Indian Emergency 1975-1977, Ramesh Subramanian
Journal of International Technology and Information Management
Information and Communications technologies (ICT) pervade society. The Internet, wireless communication, and social media are ubiquitous in and indispensable in society today. As they continue to grow and mushroom, there are new and increased calls from various segments of the society such as technologists, activists, sociologists, and legal experts, who issue warnings on the more nefarious and undesirable uses of ICTs, especially by governments. In fact, government control and surveillance using ICTs is not a new phenomenon. By looking at history, we are able to see several instances when ICTs have been used by governments to control, surveil, and infringe …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth
Towards Practical Privacy-Preserving Analytics For Iot And Cloud Based Healthcare Systems, Sagar Sharma, Keke Chen, Amit P. Sheth
Kno.e.sis Publications
Modern healthcare systems now rely on advanced computing methods and technologies, such as IoT devices and clouds, to collect and analyze personal health data at unprecedented scale and depth. Patients, doctors, healthcare providers, and researchers depend on analytical models derived from such data sources to remotely monitor patients, early-diagnose diseases, and find personalized treatments and medications. However, without appropriate privacy protection, conducting data analytics becomes a source of privacy nightmare. In this paper, we present the research challenges in developing practical privacy-preserving analytics in healthcare information systems. The study is based on kHealth - a personalized digital healthcare information system …
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Privacy Risks And Security Threats In Mhealth Apps, Brinda Hansraj Sampat, Bala Prabhakar
Journal of International Technology and Information Management
mHealth (Mobile Health) applications (apps) have transformed the doctor-patient relationship. They help users with varied functionalities such as monitoring their health, understanding specific health conditions, consulting doctors online and achieving fitness goals. Whilst these apps provide an option of equitable and convenient access to healthcare, a lot of personal and sensitive data about users is collected, stored and shared to achieve these functionalities. Little is known about the privacy and security concerns these apps address. Based on literature review, this paper identifies the privacy risks and security features for evaluating thirty apps in the Medical category across two app distribution …
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Privacy And The Information Age: A Longitudinal View, Charles E. Downing
Journal of International Technology and Information Management
As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
An Analysis Of Tools For Online Anonymity, Stephanie Winkler, Sherali Zeadally
Information Science Faculty Publications
Purpose
The purpose of this paper is to examine the possible explanations for the slow adoption and development of online anonymity technology. The ability to remain anonymous while engaging in different activities, online is increasingly sought after by consumers with privacy concerns. Currently, the only way to maintain online anonymity is through the use of technology. This paper reviews and analyzes the tools currently available to consumers to maintain online anonymity. There are only four tools available to consumers to ensure online anonymity: anonymous remailers, rewebbers, The Onion Router (Tor) and the Invisible Internet Project (I2P). These tools provide the …
Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles
Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles
Michael Friedewald
No abstract provided.
Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen
Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen
Kno.e.sis Publications
This paper presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Kno.e.sis Publications
Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB …
Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald
Precaution And Privacy Impact Assessment As Modes Towards Risk Governance, David Wright, RaphaëL Gellert, Serge Gutwirth, Michael Friedewald
Michael Friedewald
No abstract provided.
Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi
Privacy-By-Design In Federated Social Web Applications, Alexandre Passant, Owen Sacco, Julia Anaya, Pavan Kapanipathi
Kno.e.sis Publications
No abstract provided.
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Privacy-Aware An Scalable Content Dissemination In Distributed Social Networks, Pavan Kapanipathi, Julia Anaya, Amit P. Sheth, Brett Slatkin, Alexandre Passant
Kno.e.sis Publications
Centralized social networking websites raise scalability issues - due to the growing number of participants - and, as well as, policy concerns - such as control, privacy and ownership over the user's published data. Distributed Social Networks aim to solve this issue by enabling architecture where people own their data and share it their own way. However, the privacy and scalability challenge is still to be tackled. This paper presents a privacy-aware extension to Google's PubSubHubbub protocol, using Semantic Web technologies, solving both the scalability and the privacy issues in Distributed Social Networks. We enhanced the traditional feature of PubSubHubbub …
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
All Faculty Scholarship
In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …
Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo
Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo
Michael Friedewald
Surveillance is becoming ubiquitous in our society. We can also see the emergence of “smart” surveillance technologies and the assemblages (or combinations) of such tech- nologies, supposedly to combat crime and terrorism, but in fact used for a variety of purposes, many of which are intrusive upon the privacy of law-abiding citizens. Following the dark days of 9/11, security and surveillance became paramount. More recently, in Europe, there has been a policy commitment to restore privacy to centre stage. This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure …
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
All Faculty Scholarship
The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …