Spyware - The Ethics of Covert Software
In: Ethics and Information Technology, Band 3
149515 Ergebnisse
Sortierung:
In: Ethics and Information Technology, Band 3
SSRN
In: Journal of Technology and Intellectual Property Law, Band 2
SSRN
SSRN
In: North Dakota Law Review, Band 83, S. 547
SSRN
In: COMNET-D-22-00140
SSRN
El recurso a internet como medio de difusión del hate speech plantea una serie de interrogantes a los que hay que dar una respuesta desde el derecho: ¿donde se encuentra el límite de la libertad de expresión?, ¿deben responder los servidores de internet por los contenidos publicados? ¿qué medidas se están adoptando en Europa? En este trabajo proponemos hacer un análisis crítico de las medidas de control existentes en Europa para prevenir y luchar contra el discurso de odio en el ciberespacio. Se prestará una especial atención a la posible responsabilidad de los portales de internet, así como al código de conducta seguido en el marco de la Unión europea ; The use of the Internet as a means of disseminating hate speech raises a series of questions to which an answer must be given from the law: where is the limit of freedom of expression? Should internet service providers be liable for published content? What measures are being taken in Europe? In this paper, we propose to make a critical analysis of the existing control measures in Europe to prevent and combat hate speech in cyberspace. Special attention will be paid to the possible liability of internet portals, as well as to the code of conduct followed within the framework of the European Union
BASE
Industry 4.0 is a term first introduced by the German government during the Hannover Messe fair in 2011 when it launched an initiative to support German industry in tackling future challenges. It refers to the 4th industrial revolution in which disruptive digital technologies, such as the Internet of Things (IoT), Internet of Everything (IoE), robotics, virtual reality (VR), and artificial intelligence (AI), are impacting industrial production.The new industrial paradigms of Industry 4.0 demand a socio-technical evolution of the human role in production systems, in which all working activities of the value chain will be performed with smart approaches.However, the automation of processes can have unpredictable effects.Nowadays, in a smart factory, the role of human operators is often only to control and supervise the automated processes. This new condition of workers brought forth a paradox: malfunctions or irregularities in the automated production process are rare but challenging.This article discusses the challenges and risks that the 4th industrial revolution is bringing to society.It introduces the concept of the Irony of Automation. This propounds that the more reliable an automated system, the less human operators have to do and, consequently, the less attention they pay to the system while it is operating.The authors go on to discuss the human-centered approach to automation, whose purpose is not necessarily to automate previously manual functions but, rather, to enhance user effectiveness and reduce errors.
BASE
In: http://hdl.handle.net/10272/14947
En esta investigación partimos de la inadecuación del actual sistema de derecho sucesorio en el entorno digital para llegar a realizar una crítica del abuso de la posición dominante que realizan algunos de los actores más importantes de Internet. Mediante la poblematización de la actuación de las grandes compañías, la praxis social y el propio ordenamiento jurídico se discute si la actual forma de contratación de servicios digitales para la interacción social dispuesta en base a acuerdos de adhesión es respetuosa con las garantías jurídicas de nuestro ordenamiento. De esta manera, en última instancia, presentamos una reflexión sobre la propia inserción democrática de la praxis social en la Red y el modo de explotación económica que se lleva a cabo en esta ; In this research, our starting point is the inadequacy of the current system of inheritance law respect to the digital environment to build a critic of the abuse of the dominant position held by some of the most important players of the Internet. A critical approach on corporate responsibility, social praxis and legal system, is put up for discussion in terms of contract law and digital system based upon an agreement inter partes which could contain invalid elements in the framework of legal system. In this way, we finally present a reflection on the very democratic insertion of social praxis in the Net and the way of economic exploitation that takes place in this
BASE
The aim of this essay is to describe and explain the purpose and modus operandi of three different organizations currently fighting to implement radical transparency in politics: Wikileaks, Anonymous and the Pirate Parties. Special attention is given to the ways in which these organizations utilize the Internet and other technological tools in order to spread their message and present their demands; as well as exploring the differences between these organizations when it comes to dealing with the State and the political system. It is concluded that, even though Wikileaks and Anonymous have accomplished an important media presence, the Pirate Parties are best positioned to achieve reforms in government that will lead to greater transparency. ; Este ensayo tiene como objetivo describir y explicar los fines y modos de operar de tres diferentes organizaciones que luchan por la transparencia radical en la política: Wikileaks, Anonymous y los Partidos Piratas. Se le presta especial atención a las formas en que estas tres organizaciones utilizan el Internet y otras herramientas tecnológicas para esparcir su mensaje y presentar sus demandas; al mismo tiempo que se resaltan sus diferencias a la hora de enfrentar sus relaciones con el Estado y el sistema político. Se concluye que, si bien tanto Wikileaks como Anonymous han tenido un importante impacto mediático, son los Partidos Piratas los mejor posicionados para conseguir reformas que lleven a una mayor transparencia en la función pública.
BASE
To untangle some of the issues involved in the current digital signature/encryption technology debate, this article will first discuss the relevant technologies and their applications in the online environment. This discussion will demonstrate that while digital signature technology utilizes encryption as part of its process, in most instances, its primary purpose is not the confidentiality of a particular Internet transmission, but the ability to authenticate and verify the participants in an online communication. This article will further explore the competing interests involved in the encryption/digital signature debate by analyzing recent case authority and administrative policies that address the government's ability to regulate encryption, as well as the potential impact on national security if the current encryption export controls are relaxed or removed. Then, current efforts to draft and implement digital signature laws will be examined to demonstrate how potential threats to national security are negligible when dealing with digital signatures in the global Internet economy. Finally, this article will argue that congressional debate and legislation in the areas of digital signatures and encryption can and should draw a distinction between encryption used primarily for purposes of confidentiality and encryption used as part of the digital signature authentication and verification process. Such separate consideration will allow a clearer understanding of the benign nature and purposes of digital signature technology, and will likely serve as a springboard for enacting uniform federal legislation in the area of digital signatures.
BASE
To untangle some of the issues involved in the current digital signature/encryption technology debate, this article will first discuss the relevant technologies and their applications in the online environment. This discussion will demonstrate that while digital signature technology utilizes encryption as part of its process, in most instances, its primary purpose is not the confidentiality of a particular Internet transmission, but the ability to authenticate and verify the participants in an online communication. This article will further explore the competing interests involved in the encryption/digital signature debate by analyzing recent case authority and administrative policies that address the government's ability to regulate encryption, as well as the potential impact on national security if the current encryption export controls are relaxed or removed. Then, current efforts to draft and implement digital signature laws will be examined to demonstrate how potential threats to national security are negligible when dealing with digital signatures in the global Internet economy. Finally, this article will argue that congressional debate and legislation in the areas of digital signatures and encryption can and should draw a distinction between encryption used primarily for purposes of confidentiality and encryption used as part of the digital signature authentication and verification process. Such separate consideration will allow a clearer understanding of the benign nature and purposes of digital signature technology, and will likely serve as a springboard for enacting uniform federal legislation in the area of digital signatures.
BASE
Dissertação de Mestrado Integrado em Engenharia Electrotécnica e de Computadores apresentada à Faculdade de Ciências e Tecnologia ; Redes de Internet das Coisas em que existe recolha de energia do ambiente são o alicerce de uma série de conceitos de alta conectividade contemporâneos nos quais é necessário extrair cada vez mais informação do ambiente, ao mesmo tempo que se mantém a perpetuidade operacional dos mesmos.Maximizar a recolha de dados do meio envolvente usando uma rede deste tipo com conectividade multi-etapa enquanto se mantém uma operação energética neutra é uma tarefa complexa pois é necessário equilibrar a utilidade global da rede e a escassez de recursos energéticos.Para concretizar uma operação óptima de uma rede de Internet das Coisas com recolha de energia do ambiente recorre-se à construção de um modelo de optimização baseado em Programação Linear Inteira Mista, em que são considerados dois aspectos adicionais: aquisição obrigatória de ocorrências notáveis ao longo do tempo e do espaço, denominadas de eventos; e a transmissão de dados deve utilizar um mecanismo de agregação de dados, de forma a tornar a comunicação mais eficiente.Para que o modelo proposto seja validado e analisado adequadamente, é desenvolvida uma plataforma que permite efectuar simulações com o modelo, as quais têm como parâmetros de entrada dados que refletem condições operacionais estudadas. Com base nos resultados das simulações realizadas, constata-se que o modelo apresentado é bem sucedido nos vários cenários experimentais considerados.Os resultados obtidos confirmam a validade do modelo proposto. Os dados recolhidos permitem identificar padrões no comportamento da rede que possibilitam a construção de uma heurística distribuída sub-óptima que atinja um desempenho semelhante em tempo real. ; Energy Harvesting Internet of Things Networks serve nowadays as the backbone of a myriad of high-connectivity concepts in where it is necessary to extract more and more information from the environment while maintaining a perpetual operational state. Maximizing the collection of environmental data employing a multi-hop Energy Harvesting IoT Network while maintaining an Energy Neutral Operation is a challenging task because it is necessary to balance overall network utility with the scarcity of energy resources, typical of Energy Harvesting techniques. A Mixed-Integer Linear Programming optimization model is constructed to achieve an optimal operation in an Energy Harvesting IoT Network. Two additional aspects are considered: enforced acquisition of spatio-temporal notable occurrences labeled as events; and the use of a data aggregation mechanism when performing data communication.A framework is developed which can perform simulations with the proposed model so it can be validated and appropriately analyzed. The model simulations are supplied with input data that mirrors a studied operational setting. Based on the simulations results, the effectiveness of the presented network model is derived under different operational schemes. The obtained results confirm the validity of the proposed model. The gathered data facilitates the identification of patterns in the network behavior, which enable the formulation of a distributed real-time sub-optimal heuristic that achieves a similar performance. ; Outro - The work presented in this dissertation was partially carried out in the scope of the MobiWise project: From mobile sensing to mobility advising (P2020 SAICTPAC/0011/2015), co-financed by COMPETE 2020, Portugal 2020 - Operational Program for Competitiveness and Internationalization (POCI), European Union's ERDF (European Regional Development Fund), and the Portuguese Foundation for Science and Technology (FCT).
BASE
In: Vlastʹ: obščenacionalʹnyj naučno-političeskij žurnal, Heft 8, S. 38-43
ISSN: 2071-5358
Nach Ansicht der Verfasserin hat das Internet in Rußland zu einer Veränderung der politischen Kommunikation und einer Demokratisierung des politischen Prozesses geführt. Insbesondere im Wahlkampf wurde dieses Instrument interaktiv eingesetzt. Auch die Regierungsorgane sind in zunehmendem Maße im Internet repräsentiert. Abschließend geht die Verfasserin auf einige Aspekte des internationalen "Informationskriegs" ein. (BIOst-Mrk)
World Affairs Online
In: Il politico: rivista italiana di scienze politiche ; rivista quardrimestrale, Band 63, S. 143-156
ISSN: 0032-325X
Discusses the risk that representative democracy in Europe and other parts of the world may be replaced by a democracy based on the opinion of the majority, in light of the emergence of information and telecommunication networks dominated by the media. Summary in Italian. Topics include the virtual marketplace that exists in the form of the Internet and the possible emergence of virtual local communities to which citizens will turn for information and the opportunity to engage in discussions and decision-making; role of the state in ensuring reliability of data and universal access.
In: Journal of developmental entrepreneurship: JDE, Band 14, Heft 1, S. 89-101
ISSN: 1084-9467
Pure plays use the Internet as a market entry strategy, and brick and clicks use the Internet as an alternate channel of distribution. Theoretical frameworks from entrepreneurship, marketing, and electronic commerce are used to explore performance differences between these business models. This study uses a geographically diverse sample of 240 small enterprises engaged in Internet-based consumer marketing. Results suggest brick and clicks enjoy performance advantages over pure plays in international revenue growth. Higher Internet promotional expenditures positively impact revenue growth. Firms using the Internet for sales transactions experience negative profit expectations and revenue growth. Firms using the Internet for product distribution experience significant international sales growth. Product depth influences profit expectations and domestic revenue growth. These results should provide a basis for building theory relative to performance implications of Internet-based commerce for small enterprises.