scholarly journals Biztonság és magánélet: az alku-modell megkérdőjelezése és meghaladása, II. rész: Jogi és döntéstámogatási megközelítések

2017 ◽  
Vol 17 (1) ◽  
pp. 7
Author(s):  
Iván Székely ◽  
Bernadette Somody ◽  
Máté Dániel Szabó

Ez a tanulmány a biztonság és a magánélet sokrétegű, sokszempontú viszonyát elemzi, közelebbről a közöttük fennálló feltételezett alku-helyzet érvényességét és meghaladási lehetőségeit. A tanulmány két nagy egységre tagolódik és két részben jelenik meg, két együttműködő tudományos folyóirat egy időben megjelenő, tematikusan összehangolt lapszámaiban. Az első rész a Replika 103. lapszámában olvasható, a második rész pedig az Információs Társadalom jelen számában, mindkét esetben nyomtatott és elektronikus formában egyaránt. A tanulmány II. része a magánélet kontra biztonság döntési szituációkra koncentrál. Az emberi jogi bíróságok által követett módszertan és érvelés részletes elemzése alapján a szerzők az alkumodell meghaladását segítő új javaslatokat dolgoztak ki olyan esetekre, ahol a személyes magánszféra korlátozását biztonsági célok indokolják. Végül a szerzők az arányossági teszt logikáját és módszertanát a döntéstámogatás területére transzponálják, és részletes kérdéssort és szigorú eljárást dolgoztak ki olyan helyzetek kezelésére, ahol a magánéletet potenciálisan sértő megfigyelő rendszerek bevezetéséről kell döntést hozni. --- Security and Privacy: Questioning and superseding the trade-off model, Part II: Legal and decision-supporting approaches This study analyses the complex relationship between security and privacy, in particular the validity of the supposed trade-off relationship, and the possible ways to supersede a virtual zero-sum game in this area. The study is divided into two major parts, which are made available in simultaneously published issues of two separate scholarly journals featuring harmonized thematic blocks of articles. The separate, second part, is available in the present issue of Információs Társadalom [Information Society], while the first part is available in the connecting issue of Replika, in both printed and electronic formats. Part II of the study focuses on actual decisions in regard to situations where it is a matter of privacy versus security. After a detailed analysis of the methodology and reasoning of human rights courts the authors introduce new suggestions for superseding the trade-off model in situations where security-related purposes justify the limitation of privacy. Finally, the authors transpose the logic and methodology of the test of proportionality to decision support situations and offer a detailed set of questions and a strict procedure for testing the legitimacy of decisions on introducing surveillance measures that may infringe upon people’s privacy.

2015 ◽  
pp. 1564-1580
Author(s):  
Theodosios Tsiakis

The preponderant dilemma organisations confront currently is which way to homologate and superintend access for a broad mass of services and products and in parallel to preserve security and privacy. Information technology is rapidly changing, is inherently complex, and complexity kills security. There is an ongoing technical race to maintain security that does not take into account the human factors. The new technological infrastructure affects the degree of anonymity and confidentiality in mass-market computer-based systems and basically determines the evolution of democratic-political culture. Thus, in examining the issue of security, cryptography, privacy in the use of computers and Internet, forms the primary interest form the moral side of view, about what is the right and wrong thing to do, rather than in a legal frame, about what is legal and illegal. Security and privacy are not ethical or moral issues. They are fundamental human rights. In this societal change, the challenges of the information society are many but foremost is the protection of human rights. Addressing the critical question of how technological trends are both helping and hindering the advancement of human rights is essential in the specific digital environment. The democratic key concept is the efficient use of digital resources. We do not only need a culture of security (information), we further need to ensure the security of cultures, meaning that everyone should be able to freely exercise their constitutional rights. The role of this chapter is to bring to the surface the rights (human) implications of ICT and the information society. It enlightens the technical community, which designs, implements, and secures information and communication systems, with an understanding of human rights principles and foundational underpinnings. It highlights the role of government implications, identifies the role and relationship between the stakeholders, and indicates the balance between information security and freedom in order to understand that security, freedom, and rights (human), are not opposite concepts but coexist and progress in parallel.


2019 ◽  
Vol 8 (1) ◽  
pp. 38-66 ◽  
Author(s):  
G. Anthony Giannoumis ◽  
Michael Ashley Stein

Universal Design aims to ensure that everyone can equally use products, environments, programs, and services. This article examines the theoretical underpinnings and potential application of universal design by exploring its evolution through human rights and disability rights laws and policies. It is maintained that universal design arises from the complex relationship between human rights, disability rights, and access to and use of technology. Consequently, it is argued that in relation to the information society, it is most capable of promoting equal access and use of technology in three ways. First, universal design can increasingly account for human diversity. Second, universal design can progressively eliminate barriers to accessibility and usability. Third, universal design can augment broader participation in the design and development of technology. Conceptualising universal design foundations of usability and accessibility of technology as universal human rights precepts embraces social equality for everyone, and incorporates important but currently exclusive disability rights precepts.


Author(s):  
Theodosios Tsiakis

The preponderant dilemma organisations confront currently is which way to homologate and superintend access for a broad mass of services and products and in parallel to preserve security and privacy. Information technology is rapidly changing, is inherently complex, and complexity kills security. There is an ongoing technical race to maintain security that does not take into account the human factors. The new technological infrastructure affects the degree of anonymity and confidentiality in mass-market computer-based systems and basically determines the evolution of democratic-political culture. Thus, in examining the issue of security, cryptography, privacy in the use of computers and Internet, forms the primary interest form the moral side of view, about what is the right and wrong thing to do, rather than in a legal frame, about what is legal and illegal. Security and privacy are not ethical or moral issues. They are fundamental human rights. In this societal change, the challenges of the information society are many but foremost is the protection of human rights. Addressing the critical question of how technological trends are both helping and hindering the advancement of human rights is essential in the specific digital environment. The democratic key concept is the efficient use of digital resources. We do not only need a culture of security (information), we further need to ensure the security of cultures, meaning that everyone should be able to freely exercise their constitutional rights. The role of this chapter is to bring to the surface the rights (human) implications of ICT and the information society. It enlightens the technical community, which designs, implements, and secures information and communication systems, with an understanding of human rights principles and foundational underpinnings. It highlights the role of government implications, identifies the role and relationship between the stakeholders, and indicates the balance between information security and freedom in order to understand that security, freedom, and rights (human), are not opposite concepts but coexist and progress in parallel.


Author(s):  
Laszlo Z. Karvalics

To summarize and illustrate Frank Webster’s main theses and arguments on the Information Society domain, we used three pieces of his oeuvre, forming theses (T1-9) from his strong statements. Before a more detailed analysis we passionately argue against these theses. In our view the original concept of Information Society is complex and holistic, and was formulated on civilization theory level. The only methodologically acceptable approach is the multi-criteria definition. Since Webster constantly refuses to accept it, and insists on using an information density-based definition instead of it, all his main statements become false.


Author(s):  
Eka Larasati Amalia ◽  
Deasy Sandhya Elya Ikawati ◽  
Muhammad Arya Puja Laksana

Decision support system is a computer-based system that is used to solve problems by semi-structured and unstructured conditions. In this case, the best solution can be found from certain criteria and provided alternatives and is easy to use by users. In this study, researchers designed and built a website-based decision support system to select athletes in PERBASASI Malang with the provided test criteria, namely the hit test, catch test, throw test, and run test. The purpose of this study was to provide recommendations for participants who passed the selection based on test scores that have been processed using the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method. From the results of calculations, the use of the VIKOR method for this case study produced an accuracy value of 90.90%, a precision value of 93.33%, and a recall value of 93.33%. In addition, the VIKOR sensitivity test showed a consistent ranking of the calculation of the value with veto (value of v less than 0.5), by consensus (value of v is 0.5), and voting by majority rule (value of v more than 0.5). User testing that was applied by using each level of the existing account, i.e. administrator account level, selection account level, and members account level conducted on this information system concluded that the system that was built was running smoothly and was easy to use.


Author(s):  
Gerri Kimber

This chapter introduces a newly discovered play-fragment by Tennessee Williams, which comprises two separate scenes: the first, eight-page scene is called ‘The Night of the Zeppelin’ and the second, two-page scene is called ‘Armistice’. There are four characters in the play: Katharine Mansfield [sic], John Middleton Murry, D. H. Lawrence, and his wife Frieda Lawrence. The chapter offers a biographical overview of the complex relationship between the two couples, followed by a detailed analysis of the play fragment, which is published here in its entirety for the first time.


Sign in / Sign up

Export Citation Format

Share Document