scholarly journals A Responsible Internet to Increase Trust in the Digital World

2020 ◽  
Vol 28 (4) ◽  
pp. 882-922
Author(s):  
Cristian Hesselman ◽  
Paola Grosso ◽  
Ralph Holz ◽  
Fernando Kuipers ◽  
Janet Hui Xue ◽  
...  

Abstract Policy makers in regions such as Europe are increasingly concerned about the trustworthiness and sovereignty of the foundations of their digital economy, because it often depends on systems operated or manufactured elsewhere. To help curb this problem, we propose the novel notion of a responsible Internet, which provides higher degrees of trust and sovereignty for critical service providers (e.g., power grids) and all kinds of other users by improving the transparency, accountability, and controllability of the Internet at the network-level. A responsible Internet accomplishes this through two new distributed and decentralized systems. The first is the Network Inspection Plane (NIP), which enables users to request measurement-based descriptions of the chains of network operators (e.g., ISPs and DNS and cloud providers) that handle their data flows or could potentially handle them, including the relationships between them and the properties of these operators. The second is the Network Control Plane (NCP), which allows users to specify how they expect the Internet infrastructure to handle their data (e.g., in terms of the security attributes that they expect chains of network operators to have) based on the insights they gained from the NIP. We discuss research directions and starting points to realize a responsible Internet by combining three currently largely disjoint research areas: large-scale measurements (for the NIP), open source-based programmable networks (for the NCP), and policy making (POL) based on the NIP and driving the NCP. We believe that a responsible Internet is the next stage in the evolution of the Internet and that the concept is useful for clean slate Internet systems as well.

Author(s):  
Dragorad Milovanović ◽  
Vladan Pantović ◽  
Gordana Gardašević

The Internet of Things (IoT) is the concept of linking various objects to the Internet that sense/acquire and transmit data in the environment to create a new application. From a standardization perspective, the IoT can be viewed as a global infrastructure, enabling advanced services by interconnecting (physical and virtual) objects based on evolving interoperable information and communication technologies (ICT). The success of the IoT will depend strongly on the existence and effective operation of global standards. The standardization initiative, research projects, national initiatives and industrial activities are outlined in this chapter. There are already many standardization activities related to the IoT, covering broad research areas: wireless and cellular technologies, networking protocols, emerging applications, media-centric IoT. What is needed, therefore, are a harmonization of standards and effective frameworks for large-scale deployment.


2017 ◽  
Vol 45 (3) ◽  
pp. 567-582 ◽  
Author(s):  
Chanuki Illushka Seresinhe ◽  
Helen Susannah Moat ◽  
Tobias Preis

For centuries, philosophers, policy-makers and urban planners have debated whether aesthetically pleasing surroundings can improve our wellbeing. To date, quantifying how scenic an area is has proved challenging, due to the difficulty of gathering large-scale measurements of scenicness. In this study we ask whether images uploaded to the website Flickr, combined with crowdsourced geographic data from OpenStreetMap, can help us estimate how scenic people consider an area to be. We validate our findings using crowdsourced data from Scenic-Or-Not, a website where users rate the scenicness of photos from all around Great Britain. We find that models including crowdsourced data from Flickr and OpenStreetMap can generate more accurate estimates of scenicness than models that consider only basic census measurements such as population density or whether an area is urban or rural. Our results provide evidence that by exploiting the vast quantity of data generated on the Internet, scientists and policy-makers may be able to develop a better understanding of people's subjective experience of the environment in which they live.


Target ◽  
2020 ◽  
Vol 32 (2) ◽  
pp. 307-326
Author(s):  
Joanna Drugan

Abstract Interpreting and translation are increasingly provided in the public sector via large-scale outsourced framework contracts (Moorkens 2017). In the UK, one of the largest recent framework agreements for interpreting and translation was introduced between 2016 and 2017 in critical contexts for justice, including the Home Office, the Ministry of Justice and the police. These agreements involve new types of collaboration between new partners and agents in the delivery of interpreting and translation, who each have different aims, expectations, standards and working methods. This contribution examines these emerging complex collaborations, and is the result of a rare type of complex collaboration between academic researchers, framework contract-holders and managers, interpreters and translators, language service providers, professional associations, and users of translation and interpreting services, within the Transnational Organised Crime and Translation (TOCAT) project. The article reports on original research conducted during the TOCAT project, and outlines and evaluates some novel, complex and ethically challenging ‘translaborations’ in police settings. The collaborations discussed are complex because of the range of parties and actors involved and because of the challenging content and settings in which the police rely on interpreting and translation. ‘Translaboration’ is used here to encompass multiple evolving collaborations between different providers and users of interpreting and translation, policy makers, trainers and researchers. Important questions of translation quality and ethics in the management of large-scale framework contexts for public service delivery are raised.


2016 ◽  
Vol 12 (1) ◽  
Author(s):  
Allan Rocha de Souza ◽  
Luca Schirru

RESUMO Este artigo tem por objetivo analisar a representação das questões sobre os direitos autorais no mundo digital conforme expostas na construção do Marco Civil da Internet. Para tal, recorre-se aos debates travados nas consultas públicas conduzidas pelo Poder Executivo Federal e no decorrer do processo legislativo. A discussão central revolve em torno da forma de retirada do ar de conteúdos alegadamente protegidos por direitos autorais e a responsabilidade do provedor. Não resolvidas por um consenso político-social mínimo, essas situações são objeto de regulamentação privada e suas discordâncias levadas ao Judiciário, privilegiando, com isso, o poder econômico dos agentes.Palavras-chave: Direitos Autorais; Regulamentação da Internet; Direitos Digitais. ABSTRACT This article aims to analyze how the issues pertaining to copyrights in the digital world are presented in the Brazilian Civil Rights Framework for the Internet. To this end, we refer to the debates in public consultations conducted by the State and throughout the legislative process. The central questions revolve around the procedures for removal of content allegedly protected by copyrights as well as internet service providers' responsibility over it. Unsolved by political and social consensus, these situations end up subject to private regulation and the disagreements are taken to the judicial system, thus favoring the economic power of agents.Keywords: Copyright Law; Internet Regulation; Digital Rights.  


Author(s):  
Theodore H.K. Clark ◽  
Karl Reiner Lang ◽  
Will W.K. Ma

This case concerns a recently launched retirement protection scheme, the Mandatory Provident Fund (MPF), in Hong Kong. Service providers, employers, employees and the government are the four main parties involved in the MPF. The service has been implemented in two versions, that is, a bricks model and a clicks model. The former is based on conventional paper-based transactions and face-to-face meetings. The focus of this case, however, is on the latter, which introduces MPF as a service in an e-environment that connects all parties electronically and conducts all transactions via the Internet or other computer networks. The case discusses the MPF e-business model, and its implementation. We analyze the differences between the old and the new model and highlight the chief characteristics and benefits of the e-business model as they arise from the emerging digital economy. We also discuss some major problems, from both managerial and technical perspectives, that have occurred during the phases of implementing and launching the new service.


2020 ◽  
pp. 1070-1095
Author(s):  
Dragorad Milovanović ◽  
Vladan Pantović ◽  
Gordana Gardašević

The Internet of Things (IoT) is the concept of linking various objects to the Internet that sense/acquire and transmit data in the environment to create a new application. From a standardization perspective, the IoT can be viewed as a global infrastructure, enabling advanced services by interconnecting (physical and virtual) objects based on evolving interoperable information and communication technologies (ICT). The success of the IoT will depend strongly on the existence and effective operation of global standards. The standardization initiative, research projects, national initiatives and industrial activities are outlined in this chapter. There are already many standardization activities related to the IoT, covering broad research areas: wireless and cellular technologies, networking protocols, emerging applications, media-centric IoT. What is needed, therefore, are a harmonization of standards and effective frameworks for large-scale deployment.


2020 ◽  
Vol 37 (3) ◽  
pp. 437-446
Author(s):  
Rudolf R. Sinkovics ◽  
Noemi Sinkovics

PurposeThe authors critically examine the paper by Samiee (2019, this issue) “International marketing and the Internet: A research overview and the path forward” and offer an appraisal of its merits as well as thoughts for further development of research on advanced information and communication technologies (ICTs) in international marketing.Design/methodology/approachThis paper approaches its purpose via a reflexive review of Samiee's paper and continues by offering a content analysis of a broader body of literature which includes internationally oriented papers in international business (IB), international marketing (IM), general management, marketing and strategy (GMS) as well as information systems (IS). The underpinning question is whether and which particular ICT concepts have successfully been adopted in the IM literature and what the inclusion or exclusion of these phenomena may imply for future research.FindingsThe Internet and internationalization implications of the technology have been studied excessively in the domain; however, newer developments such as dimensions of Industry 4.0 or advanced manufacturing, have not yet been widely considered in IB and marketing work. The ramifications for future research are significant in that the understudied modern industrial organization of the contemporary firm in the digital world needs much concerted research focus to be adequately understood.Research limitations/implicationsThis paper and the literature review is limited to “international” studies. While this is an appropriate limitation for the purposes of this IM-oriented review, some work in the GMS domain as well as the IS domain will have significant ramification for international firms and IM thinking, despite these papers limited to noninternational firms.Practical implicationsThe notion of advanced ICTs, builds on the underpinning Internet technology, and has transformative effects on the way in which (international) firms are organized, studied and performed. The pervasive shifts triggered by advanced ICTs and the reconfiguration of firms to platform providers and system integrators need to be well understood, in order to stay legitimate and as performant in contemporary markets.Originality/valueRather than looking at only IM papers, this paper reviews Internet/advanced ICT papers in multiple related fields. Significant novelty in this area comes from IS, by including this discipline in the review, the authors see real diffusion of novel thinking and potential research areas for IM scholars at the interface of ICT and IM.


2020 ◽  
pp. 66-79
Author(s):  
Marina Fedorova

The subject of this research is the religious identity of Russian youth in the conditions of modern digital society. The author analyzes the factors of transformation of identification processes, examines the characteristics of religious identity, as well as defines the specificity of religious discourse within the Internet environment. The author believes that the main cause of the changes in religious consciousness and identity becomes rapid digitalization of all spheres of social life. This problematic gains relevance during the COVID-19 pandemic, forced self-isolation and transition towards remote work using the information and communication technologies. The author assumes that religious identity should be viewed from the perspective of its inclusion into a broader phenomenon – cyberidentity. An original definition of cyberidentity is proposed. The key factors of its formation, such as social networks and messengers, computer gamed, Internet memes, etc. are determined. The article leans on the analysis of information from websites of religious organizations, different groups in social networks, messengers and video hosting. The main source form empirical data became the results of large-scale research of dynamics of value orientations of youth of Nizhny Novgorod Region that was carried out from 2006 to 2019. The author concludes that currently it may appear that secular trends are growing, while the interest of youth in religion declines. This is conferment by the data acquired from mass surveying, interviewing, and analyzing the content of social networks. However, secularization processes have contradictory, nonlinear and unpredictable character. Within the Internet space, the dialects of religion and secular not just being retained, but reflected in the categories of digital society. In the digital post-secular society, religious identity becomes a part of the more global identification processes. It sets particular goals for the traditional religions, which are forced to adapt to civilizational challenges.


Author(s):  
Theordore H.K. Clark ◽  
Karl Reiner Lang ◽  
Will Wai-Kit Ma

This case concerns a recently launched retirement protection scheme, the Mandatory Provident Fund (MPF), in Hong Kong. Service providers, employers, employees and the government are the four main parties involved in the MPF. The service has been implemented in two versions, i.e., a bricks model and a clicks model. The former is based on conventional paper-based transactions and face-to-face meetings. The focus of this case, however, is on the latter, which introduces MPF as a service in an e-environment that connects all parties electronically and conducts all transactions via the Internet or other computer networks. The case discusses the MPF e-business model, and its implementation. We analyze the differences between the old and the new model and highlight the chief characteristics and benefits of the e-business model as they arise from the emerging digital economy. We also discuss some major problems, from both managerial and technical perspectives, that have occurred during the phases of implementing and launching the new service.


Author(s):  
André Årnes

Network monitoring is becoming increasingly important, both as a security measure for corporations and organizations, and in an infrastructure protection perspective for nation-states. Governments are not only increasing their monitoring efforts, but also introducing requirements for data retention in order to be able to access traffic data for the investigation of serious crimes, including terrorism. In Europe, a resolution on data retention was passed in December 2005 (The European Parliament, 2005). However, as the level of complexity and connectivity in information systems increases, effective monitoring of computer networks is getting harder. Systems for efficient threat identification and assessment are needed in order to handle high-speed traffic and monitor data in an appropriate manner. We discuss attacks relating to critical infrastructure, specifically on the Internet. The term critical infrastructure refers to both systems in the digital domain and systems that interface with critical infrastructure in the physical world. Examples of a digital critical infrastructure are the DNS (domain name service) and the routing infrastructure on the Internet. Examples of systems that interface with the physical world are control systems for power grids and telecommunications systems. In 1988, the first Internet worm (called the Morris worm) disabled thousands of hosts and made the Internet almost unusable. In 2002, the DNS root servers were attacked by a distributed denial-of-service (DDoS) attack specifically directed at these servers, threatening to disrupt the entire Internet.1 As our critical infrastructure, including telecommunication systems and power grids, becomes more connected and dependent on digital systems, we risk the same types of attacks being used as weapons in information warfare or cyber terrorism. Any digital system or infrastructure has a number of vulnerabilities with corresponding threats. These threats can potentially exploit vulnerabilities, causing unwanted incidents. In the case of critical infrastructures, the consequences of such vulnerabilities being exploited can become catastrophic. In this chapter, we discuss methods relating to the monitoring, detection, and identification of such attacks through the use of monitoring systems. We refer to the data-capturing device or software as a sensor. The main threats considered in this chapter are information warfare and cyber terrorism. These threats can lead to several different scenarios, such as coordinated computer attacks, worm attacks, DDoS attacks, and large scale scanning and mapping efforts. In this context, the primary task of network monitoring is to detect and identify unwanted incidents associated with threats in order to initiate appropriate precautionary measures and responses.


Sign in / Sign up

Export Citation Format

Share Document