The Secret in the Information Society
In: Philosophy & technology, Band 29, Heft 3, S. 293-305
ISSN: 2210-5441
6 Ergebnisse
Sortierung:
In: Philosophy & technology, Band 29, Heft 3, S. 293-305
ISSN: 2210-5441
The growth and health of our digital economies and societies depend on the core protocols and infrastructure of the Internet. This technical and logical substructure of our digital existence is now in need of protection against unwarranted interference in order to sustain the growth and the integrity of the global Internet. The Internet's key protocols and infrastructure can be considered a global public good that provides benefits to everyone in the world. Countering the growing state interference with this 'public core of the Internet' requires a new international agenda for Internet governance that departs from the notion of a global public good. Core ingredients of this strategy are: - To establish and disseminate an international norm stipulating that the Internet's public core - its main protocols and infrastructure- should be considered a neutral zone, safeguarded against unwarranted intervention by governments. - To advocate efforts to clearly differentiate at the national and international level between Internet security (security of the Internet infrastructure) and national security (security through the Internet). - To broaden the arena for cyber diplomacy to include new coalitions of states (including the so called 'swing states') and private companies, including the large Internet companies as well as Internet intermediaries such as Internet Service Providers.
BASE
In: European journal of social theory, Band 18, Heft 1, S. 21-38
ISSN: 1461-7137
Social sorting of migrants and travellers based on data stored in information systems is at the centre of border controls and mobility management in Europe. Recent literature finds that the inclusion-exclusion distinction is insufficiently equipped to do justice to the variety of classifications that is being applied. Instead, a proliferation of refined categorizations determines the outcome of visa and permit applications. This article explores the 'administrative ecology' in between the two extremes of inclusion and exclusion. It claims information technologies encourage the emergence of an intermediary category of 'non-publics' situated between the level of groups and the level of individuals. The ontological and normative status of these 'non-publics' will be analysed by using some key notions of Actor-Network Theory.
In: WRR Policy Brief, 2017
SSRN
Though the exact nature and delineation of Big Data is still unclear, it seems likely that Big Data will have an enormous impact on our daily lives. 'Exploring the Boundaries of Big Data' serves as preparatory work for The Netherlands Scientific Council for Government Policy's advice to the Dutch government, which has asked the Council to address questions regarding Big Data, security and privacy. It is divided into five parts, each part engaging with a different perspective on Big Data: the technical, empirical, legal, regulatory and international perspective