scholarly journals Reconceptualizing the Role of Security User

Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 93-107 ◽  
Author(s):  
L. Jean Camp

The Internet is not the only critical infrastructure that relies on the participation of unorganized and technically inexpert end users. Transportation, health, waste management, and disaster preparedness are other areas where cooperation between unorganized citizens who lack experience with the domain has increased resiliency, reduced social costs, and helped meet shared goals. Theories of community-based production and management of the commons explain this type of cooperation, both offline and online. This essay examines these two complementary approaches to organizing the cybercitizen for cybersecurity. Cybersecurity discourse has reasonably focused on centralized parties and network operators. From domain name registrars to network service providers, solutions are sought through incentives, regulation, and even law enforcement. However great the ability of these centralized entities to implement change, the end user plays a crucial role. The Internet must remain open to enable innovation and diffusion of innovation; thus, the end user will continue to be important. What is the role of the citizen in cybersecurity? What socio-technical characteristics might enable a system that encourages and empowers users to create a secure infrastructure?

Author(s):  
Phaedon John Kozyris

The ordinary and uncomplicated Spam menace is made possible by technological advances which enable the sender to dispatch millions if not billions of commercial messages without significant monetary cost and without wasting time. The present review will focus on fundamentals, exploring what has already been done and suggesting avenues of improvement. The chapter promotes basic approaches of handling Spam depending on the actions and choices of the receiver. The anti-Spam campaign needs effective enforcement powers and should be able to use all available technological know-how. As the vagaries of enforcement are presented, the role of the Internet Service Providers and advertisers is envisaged.


2008 ◽  
Vol 193 (4) ◽  
pp. 342-343 ◽  
Author(s):  
Mike J. Crawford ◽  
Katy Price ◽  
Deborah Rutter ◽  
Paul Moran ◽  
Peter Tyrer ◽  
...  

SummaryDedicated community-based services have been recommended for people with personality disorder, but little is known about how such services should be configured. We conducted a Delphi survey to assess opinions about this. A panel of expert authors, service providers and service users agreed on only 21 (39%) of 54 statements on the organisation and delivery of care. Consensus was not reached on important issues such as working with people with a history of violent offending, the role of community outreach and the use of compulsory treatment. Further work needs to be undertaken before the optimal organisation of dedicated personality disorder services can be agreed.


2019 ◽  
Vol 11 (4) ◽  
pp. 352-370
Author(s):  
Bernard Jemilohun

AbstractThis paper examines the role of Internet Service Providers as bridges and intermediaries between private persons, organizations even government arms and the Internet and the liabilities placed on them by the law with regard to wrongful acts of their subscribers or clients under the laws of Nigeria. It is common knowledge that actions againstISPs are commonest with defamation and infringement of copyright. The legal framework in theUSand the UKare examined to determine if there are lessons to learn for Nigeria. The Nigerian legal framework also places some responsibilities on ISPs with regard to crime prevention and prosecution. This is because private rights are not yet much of an issue in the Nigerian cyberspace. The paper points out that much of the regulation governingISPs liability in respect of civil matters do not have legislative power but are mere guidelines and suggests that theUSand UKpatterns have a lot to offer Nigeria.


2016 ◽  
Vol 3 (3) ◽  
pp. 581-637
Author(s):  
Steven Ferrey

Choice of law affects legal outcomes at the core of Anglo-American law. This Article analyzes what electricity is, how the law regards it, and concludes by examining the confusion and inconsistency created by many courts. Even finishing second among the most important inventions in history (second behind only the movable type printing press) highlights the essential role of electricity in the American economy: Among the most important inventions in human history, electricity is the only one which also is essential and irreplaceable to operate seven other of the “top 50” inventions of all time: the Internet, computers, air-conditioning, radio, television, the telephone, and semiconductors.


Author(s):  
Poorna Mysoor

This chapter deals with indexing. Indexing is typically engaged in by internet service providers of different kinds, such as search engines, content aggregators, and online content sharing platforms, including social media. Indexing is the background process that tries to achieve greater accessibility of the content on the internet. However, this process may engage the right of reproduction and the right of communication to the public, and therefore, must be considered separately. Based on the indexing capabilities and to facilitate deeper analysis, this chapter classifies the providers into search engines, content sharing platforms, news aggregators and other content aggregators. The chapter explains how courts have tried to deal with this issue and argues for a greater role of implied licences to address the issues of copyright infringement. While indexing of content that is placed on the internet by or with the copyright owner’s consent can benefit from consent-based implied licence, indexing of the content that is placed on the internet without the copyright owner’s consent may benefit from a policy-based implied licence, saving them from liability for indexing infringing content under certain circumstances.


2020 ◽  
Author(s):  
Volker Stocker

The Internet ecosystem is characterised by strong dynamics and rapid evolution. In view of the evolving range of content and applications that are to be delivered in an integrated fashion via general-purpose broadband networks, the requirements for traffic delivery and corresponding capacity allocation problems are becoming increasingly complex. The anticipated role of the Internet of things, 5G or virtual reality applications underscores how important it will be for broadband access service providers to flexibly meet these evolving demands in an economically efficient fashion. This book examines the evolution of, and competition within, the Internet ecosystem and analyses efficient capacity allocations in all-IP networks from a network economic perspective. In doing so, it critically appraises the role of network neutrality regulations.


This chapter presents an interview with Marcelo Lopes de Souza, a scholar who cooperates with social movements, and professor in the Department of Geography at the Federal University of Rio de Janeiro, Brazil. Drawing on the experiences of Latin American social movements, Marcelo discusses the implications of a commitment to radical autonomy for the funding of community-based movements and for emancipatory community development more broadly. Among the topics covered are the importance of ‘the commons’ in the life of communities; the role of ‘autonomous’ movements in community empowerment; the so-called ‘NGOisation’ of Latin American civil society and the extent to which this phenomenon has been a feature of the movements that Marcelo is familiar as well as its effects.


2010 ◽  
Vol 09 (01) ◽  
pp. 31-40 ◽  
Author(s):  
Zakaria I. Saleh ◽  
Emad Abushanab

Several variables can influence the adoption of innovation. Human Computer Interaction research has focused on ease of use as the prime determinate of user satisfaction and adoption. This study explores the issues that influence the adoption, and further examines the knowledge of perceived risk as an influence. The study examines existing theory as it pertains to the diffusion of innovation from the perspective of the Internet, and assesses the extent to which Internet technology can be used in building long-term consumer relationships. Despite the high volume of shopping done on the Internet each day, many consumers fail to make online purchases because of continued reluctance to engage in transactions with intermediaries that are not familiar and trusted. Based on the previous studies, this study posits that perceived risk for security of online transactions is one of the factors influencing online purchasing behaviour, and has an effect on the continued use.


Sign in / Sign up

Export Citation Format

Share Document