scholarly journals Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology

2020 ◽  
Vol 2020 (1) ◽  
pp. 83-102 ◽  
Author(s):  
Moses Namara ◽  
Daricia Wilkinson ◽  
Kelly Caine ◽  
Bart P. Knijnenburg

AbstractVirtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about the adoption and usage of VPNs, we investigate people’s motivation to use VPNs and the barriers they encounter in adopting them. Using data from 90 technologically savvy participants, we find that while nearly all (98%; 88) of the participants have knowledge about what VPNs are, less than half (42%; 37) have ever used VPNs primarily as a privacy-enhancing technology. Of these, 18% (7) abandoned using VPNs while 81% (30) continue to use them to protect their privacy online. In a qualitative analysis of survey responses, we find that people who adopt and continue to use VPNs for privacy purposes are primarily motivated by emotional considerations, including the strong desire to protect their privacy online, wide fear of surveillance and data tracking not only from Internet service providers (ISPs) but also governments and Internet corporations such as Facebook and Google. In contrast, people who are mainly motivated by practical considerations are more likely to abandon VPNs, especially once their practical need no longer exists. These people cite their access to alternative technologies and the effort required to use a VPN as reasons for abandonment. We discuss implications of these findings and provide suggestions on how to maximize adoption of privacy-enhancing technologies such as VPNs, focusing on how to align them with people’s interests and privacy risk evaluation.

2018 ◽  
Author(s):  
Brett Burkhardt

The competition thesis states that the introduction of competition from private sector service providers will spur performance improvements in previously monopolistic public sector service providers, who fear (further) delegation of their responsibilities to the private sector. This article examines the competition thesis in the context of incarceration. Using data on U.S. adult correctional facilities in 2000 and 2005, it employs a difference-in-difference strategy to compare over-time performance changes among newly competitive facilities relative to non-competitive facilities. Prison performance is measured along four dimensions (safety, order, activity, and conditions), using survey responses from prisons. The results do not show a beneficial competition effect; prisons in newly competitive states experienced performance change in ways that were statistically indistinguishable from prisons in non-competitive states. Supplemental analyses reveal this finding to be robust to most modifications to the sample and the model. A discussion considers four reasons—constitutional safeguards, professional standards, labor opposition, and non-credible threats—incarceration may be resistant to a competition effect and the implications for public policy.


Author(s):  
Glauber Gonçalves ◽  
Alex Vieira ◽  
Jussara Almeida

Cloud Storage is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Despite the increasing interest in cloud storage, a thorough investigation on the costs and benefits of this service for providers and end users has not been conducted yet. This dissertation aims at investigating such cost-benefit tradeoffs for both providers and end users jointly. Using data collected from a real service (Dropbox), we developed new models, methodologies and tools to support providers and users in improving jointly their benefits in cloud storage.


Author(s):  
Wasim A Al-Hamdani

Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service


Author(s):  
Poorna Mysoor

This chapter deals with indexing. Indexing is typically engaged in by internet service providers of different kinds, such as search engines, content aggregators, and online content sharing platforms, including social media. Indexing is the background process that tries to achieve greater accessibility of the content on the internet. However, this process may engage the right of reproduction and the right of communication to the public, and therefore, must be considered separately. Based on the indexing capabilities and to facilitate deeper analysis, this chapter classifies the providers into search engines, content sharing platforms, news aggregators and other content aggregators. The chapter explains how courts have tried to deal with this issue and argues for a greater role of implied licences to address the issues of copyright infringement. While indexing of content that is placed on the internet by or with the copyright owner’s consent can benefit from consent-based implied licence, indexing of the content that is placed on the internet without the copyright owner’s consent may benefit from a policy-based implied licence, saving them from liability for indexing infringing content under certain circumstances.


Author(s):  
Stavroula Karapapa

Some defences are available on grounds that are extraneous to copyright and are based either on other bodies of law, such as competition law or e-commerce protection, or on general legal principles. These include, for instance, defences available to Internet service providers for infringements carried out by their users, including defences for hosting, caching, and ‘mere conduit’. Others are available on the grounds of competition law, such as refusal to license or abuse of dominant position, which could have a legal basis of application—inter alia—in certain mass digital activities of online services. Other available defences fall under general legal principles that can be invoked in cases where copyright exceptions do not cover an activity for which there is a principle-based justification for the particular conduct. Such a justification could be the public interest or the doctrine of the ‘abuse of right’. There are also a number of uses that can be permitted on grounds of benign infringement on the basis of the ‘innocuous use’ doctrine. Unlike other defences to copyright, these defensive rules represent instances where copyright may be subject to limitations as a result of its encounter with other legal orders. Such instances have either not been institutionalized within copyright law, such as speech entitlements or public policy privileges, or may have been partially included within it while offering principle-based explanations for acts of copyright infringement on the basis of legal grounds found in other areas of law or broader legal principles. These defences are an essential component to the understanding of the scope of permissible copyright use on the Internet as they can be extremely relevant in cases which involve online services and business models, such as hosting services, and online content use more broadly.


2015 ◽  
Vol 14 (2) ◽  
pp. 167-182 ◽  
Author(s):  
Laura A. Reese

This article details the extent and import of the stray and feral dog problem in the City of Detroit in the context of regime and network theories of governance. Using data drawn from a survey of animal welfare service providers, this article provides a description of the complex and essentially grass roots service provision network currently in place to address the problem. The primary cause of the roaming dog problem in the city is the poor economy and the problem is worse in the most distressed neighborhoods. Several factors serve as barriers to addressing the issue. First, the actual number of roaming dogs is a question of contention in the city. Second, weaknesses in the city governing system and scarce resources have limited the public response to the problem. As a result, services are provided by an unstable and fragmented network of nonprofit organizations largely located outside the city of Detroit itself.


2020 ◽  
pp. 1-27
Author(s):  
Ifeoma E. Nwafor ◽  
Ndubuisi Nwafor ◽  
Josiah Alozie

Abstract Revenge pornography is the online distribution of sexually uncensored images or videos of another person without consent and to cause embarrassment or torment. Victims of revenge pornography suffer significant harm, including losing jobs and, in extreme cases, committing suicide. The public blames the victim for the role they played. Rather than victim-blaming, victims deserve a takedown order and criminal liability for uploaders of such images. This study adopts a doctrinal approach; it examines key statutes and their interpretation by Nigerian courts while juxtaposing it with the law and practice in the United Kingdom. The United Kingdom was undertaken as a case study because it has a developed jurisprudence which can provide lessons for Nigeria. This study found that the current state of laws in Nigeria is ill-equipped to tackle the menace of revenge pornography. The objective of this study is to offer insights on the prevalence of revenge pornography in Nigeria and suggest legal solutions to address this phenomenon. It canvasses for a non-consensual pornography provision that would criminalise the act of revenge pornography in Nigeria. It also makes a case for cyber-censorship of contents by internet service providers and the need for third-party liability.


2009 ◽  
Vol 3;12 (3;5) ◽  
pp. 659-664
Author(s):  
Jeffrey Segal

Historically, if a patient was dissatisfied with care, he or she could tell his or her friends and family. The criticism was limited to a small circle of people. If the patient was injured negligently, he or she could hire an attorney to prosecute a lawsuit. The threshold for finding an attorney and prevailing posed a significant barrier for the patient achieving redress. With the Internet, if a patient is unhappy he or she needs do little more than access a growing number of Internet physician rating sites. Such criticism can be rendered anonymously. The posts are disseminated worldwide, and once posted, the criticism rarely comes down. While transparency is a laudable goal, such sites often lack accountability. More formal sites run by authoritative bodies, such as medical licensing boards, also provide data about physicians, but such data is often unfiltered, making it difficult for the public to properly interpret. Given how important reputation is to physicians, the traditional remedy of suing for defamation because of libelous posts is ordinarily ineffective. First, many patients who post libelous comments, do so anonymously. Next, the Internet Service Providers (ISPs) hosting such sites are generally immune from liability for defamation. Finally, the law has a very formal definition for libel, and a negative rating does not necessarily equate to “defamation.” A novel method of addressing un-policed physician rating sites in the Internet age is described. The system embraces the use of mutual privacy contracts to provide physicians a viable remedy to anonymous posts. In exchange, patients receive additional privacy protections above and beyond that mandated by law. Key words: Defamation, libel, Internet, physician, rating sites, Section 230, Communication Decency Act, anonymous


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2019 ◽  
Vol 10 (2) ◽  
pp. 168-177
Author(s):  
Haerdiansyah Syahnur ◽  
Jafar Basalamah

This study aimed to analyze the customer experience seen from the level of actual performance and the level of importance of services provided by internet service providers PT. XYZ in Makassar City. Variables and attributes issued by TM Forum GB 912 consisting of Customer Management, Fulfillment, Assurance, and Billing, are used to analyze the performance provided by customer service in the field. The analysis technique will be carried out using the Importance Performance Analysis and Customer Satisfaction Index consisting of quadrant analysis and gap analysis used to investigate customer satisfaction and identify variables whose performance is deemed to need improvement. Data were collected using a platform-based questionnaire application from 100 respondents selected using random sampling techniques. The results showed that customers were satisfied with the performance and quality of services provided. The customer satisfaction index value obtained by CSI analysis shows a value of 82.006%. In conclusion, that the Fulfillment variable is a service variable that is considered the most important customer and requires improvement because its performance is still relatively low. While the variables considered good and need to be maintained are the Billing variable. Other service variables are sorted based on priority of improvement in a row, namely Fulfillment, Customer Management, and Assurance.


Sign in / Sign up

Export Citation Format

Share Document