Minimising Collateral Damage

Author(s):  
Zbigniew Kwecka ◽  
William J. Buchanan

Investigators often define invasion of privacy as collateral damage. Inquiries that require gathering data from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impact the relationship between the data subject and the data controller. In this research a novel privacy-preserving approach to mitigate collateral damage during the acquisition process is presented. This approach is based on existing Private Information Retrieval (PIR) protocols, which cannot be employed in an investigative context. This paper provides analysis of the investigative data acquisition process and proposes three modifications that can enable existing PIR protocols to perform investigative enquiries on large databases, including communication traffic databases maintained by ISPs. IDAP is an efficient Symmetric PIR (SPIR) protocol optimised for the purpose of facilitating public authorities’ enquiries for evidence. It introduces a semi-trusted proxy into the PIR process in order to gain the acceptance of the general public. In addition, the dilution factor is defined as the level of anonymity required in a given investigation. This factor allows investigators to restrict the number of records processed, and therefore, minimise the processing time, while maintaining an appropriate level of privacy.

Cyber Crime ◽  
2013 ◽  
pp. 1620-1639
Author(s):  
Zbigniew Kwecka ◽  
William J. Buchanan

Investigators often define invasion of privacy as collateral damage. Inquiries that require gathering data from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impact the relationship between the data subject and the data controller. In this research a novel privacy-preserving approach to mitigate collateral damage during the acquisition process is presented. This approach is based on existing Private Information Retrieval (PIR) protocols, which cannot be employed in an investigative context. This paper provides analysis of the investigative data acquisition process and proposes three modifications that can enable existing PIR protocols to perform investigative enquiries on large databases, including communication traffic databases maintained by ISPs. IDAP is an efficient Symmetric PIR (SPIR) protocol optimised for the purpose of facilitating public authorities’ enquiries for evidence. It introduces a semi-trusted proxy into the PIR process in order to gain the acceptance of the general public. In addition, the dilution factor is defined as the level of anonymity required in a given investigation. This factor allows investigators to restrict the number of records processed, and therefore, minimise the processing time, while maintaining an appropriate level of privacy.


Author(s):  
Zbigniew Kwecka ◽  
William J. Buchanan

Investigators often define invasion of privacy as collateral damage. Inquiries that require gathering data from third parties, such as banks, Internet Service Providers (ISPs) or employers are likely to impact the relationship between the data subject and the data controller. In this research a novel privacy-preserving approach to mitigate collateral damage during the acquisition process is presented. This approach is based on existing Private Information Retrieval (PIR) protocols, which cannot be employed in an investigative context. This paper provides analysis of the investigative data acquisition process and proposes three modifications that can enable existing PIR protocols to perform investigative enquiries on large databases, including communication traffic databases maintained by ISPs. IDAP is an efficient Symmetric PIR (SPIR) protocol optimised for the purpose of facilitating public authorities’ enquiries for evidence. It introduces a semi-trusted proxy into the PIR process in order to gain the acceptance of the general public. In addition, the dilution factor is defined as the level of anonymity required in a given investigation. This factor allows investigators to restrict the number of records processed, and therefore, minimise the processing time, while maintaining an appropriate level of privacy.


2017 ◽  
Vol 12 (10) ◽  
pp. 24
Author(s):  
Mauro Sciarelli ◽  
Abdelhakim A. Nagm ◽  
Mona I. Dakrory ◽  
Mario Tani ◽  
Mohamed A. Khashan

This current study purposes to identify the relationships between service recovery strategies, service recovery satisfaction, and both dimensions of customer loyalty in regard to Internet providers using the partial least squares (PLS-SEM) approach on a sample of 430 internet customers in Egypt.This study contributes insights into how seven service recovery strategies affected customer loyalty with its both attitudinal and behavioral dimensions directly and indirectly via service recovery satisfaction. These insights are helpful for service managers faced with service failure and academicians interested in how service providers respond to service failures and customer dissatisfaction in the B2C context.The results of this study show that some SR strategies positively influence both service recovery satisfaction and customer loyalty toward internet providers. Furthermore, service recovery satisfaction positively influencing the customer loyalty. In addition, SRS plays a mediating role in the relationship between SR strategies and customer loyalty. The results highlight that internet service providers should implement SR strategies quickly and with an empathetic manner to satisfy customers and to encourage customer's loyalty. Finally, some implications and further research directions were presented.


Ingenius ◽  
2021 ◽  
pp. 30-40
Author(s):  
Roberto D. Triviño ◽  
Antonio Franco-Crespo ◽  
Leonardo Ochoa-Urrego

The Internet has become the ultimate platform for convergence, closely associated with network, technology, and media, due to its open and nondiscriminatory architecture. Convergence in telecommunications is propelled by ideas, ideologies, and policies progressively and cyclically, bringing further technological advancement, market, business, and policy changes. As a response to convergence, net neutrality seeks to regulate the relationship between Internet service providers and users to avoid discriminatory practices and ensure the openness of the Internet as a platform for innovation, economic development, and access to information for all. The objective of this work is to analyze the development of convergence in the telecommunications sector and the progress of net neutrality policies in South America, with five specific cases using a qualitative empirical approach. Within the findings, we identify different approaches for legislating net neutrality, controversies concerning the levels of commitment to the principles, ambiguity for effective enforcement of the rules, and commercial arrangements that in practice violate net neutrality.


2005 ◽  
Vol 71 (1) ◽  
pp. 19-34 ◽  
Author(s):  
Frédéric Colin

The public voucher system is a means of paying for a given public service. Vouchers are issued by the public authorities to individual users to enable them to gain access to any institution that is approved by the public authorities, for a specific purpose. The provider of the service is paid back the amount of the voucher by the public institution that provides the funding for the voucher. This system provides a means of reviewing the relationship between the user and the public service in terms of efficiency and freedom. The voucher system is designed to improve competition among public service providers and to make public service offerings more flexible. While it does offer some interesting possibilities in terms of diversification of the services on offer, nonetheless the voucher system poses certain risks. In particular, it may lead to community behaviour patterns among beneficiaries and undermine equal opportunity. In any case, as the voucher system brings closer together the practical arrangements for defraying services in the private and public sectors, it opens up some useful avenues of reflection for the modernization of public services.


2006 ◽  
Vol 1 (1) ◽  
pp. 3-20
Author(s):  
Bernt Krohn Solvang ◽  
Charlotte Kiland

The issue to be discussed in this article is to what extent does ICT create new challenges for the relationship between public service providers and users? It is important to recognize the concept of social capital because the concept is vital to the understanding of access to the information society and efficient functioning of government in its service to citizens. In this way we see social capital as a mediating “institution” between public authorities and the citizens (users).


2016 ◽  
Author(s):  
Jane Bailey

The music recording industry is suing Internet subscribers in Canada and the United States for alleged copyright infringement in unprecedented numbers. The procedure for obtaining non-party disclosure has taken on renewed significance in this context, as the industry requests disclosure of identifying and private information from Internet Service Providers (ISPs) who provide online communicators with their Internet connections. Legislative measures adopted in the U.S. expedited the disclosure process through an administrative mechanism with low threshold requirements for issuance of a subpoena against an ISP. In Canada (and after late 2004 in the U.S.), disclosure requests proceeded under federal rules of court. Comparison of the expedited administrative and the judicially interpreted rules-based processes raises important questions about the connection between procedure and substance, and procedural justice more generally. Not only are more permissive rules for disclosure often inconsistent with protecting substantive rights, such as privacy, bin they also cannot be presumed to enhance the likelihood of achieving accurate substantive legal outcomes. If non-party disclosure rules are not contextually designed and implemented to reflect the power and resource imbalance between the plaintiff music industry and the individual defendants pursued in online music sharing litigation, the public and private interest in substantive adjudication of critical questions relating to copyright law may be foreclosed for reasons wholly unrelated to substantive legal merits.


2021 ◽  
pp. 17-28
Author(s):  
Oleksiy О. Topchiy

The purpose of the article is to study the features of modelling the relationship between utilities and partners. Methodology. General scientific methods are used in the research, in particular, generalizations, comparisons – to analyse the views of scientists on modelling the relationship between utilities and partners, indicating the main forms of public-private partnership, the advantages and disadvantages of their use. Results. It is proved that the relationship between the state and business today is extremely strategically important for the state in the formation of sustainable development goals. Building effective relationships in housing and communal services will be a success for effective activities and will satisfy all participants: the state, business and the population. It is proved that in modern conditions, housing and communal services is a complex hierarchical system that combines many separate subsystems and has the characteristics of a spatial economy, i.e. regional structure and scale. The analysis of the legal and regulatory framework shows that there are only three players in the market of housing and communal services: managers, service providers and consumers. Also, there are various opportunities to establish partnerships with most existing stakeholders, including the use of public-private partnerships in housing and communal services. It is investigated that among the widespread variants of private capital raising in the communal sphere the following basic forms are identified: contract for works, contract for enterprise management, lease, concession, privatization. Thus, local public authorities have the opportunity to transfer utilities in concession or lease to private investors. However, this has not become a common practice due to the complexity of their organizational mechanism. Practical meaning. It is proved that the most effective form of public-private partnership for housing and communal services is a concession – the process of granting, in order to meet public needs by an authorized executive body or local government, concluding a contract on a paid and fixed basis, the concessionaire ) management of the concession object, on the terms of property liability by the concessionaire and possible division of business risk. Prospects for further research. The need to study the advantages and disadvantages of other forms of public-private partnership in housing and communal services.


2017 ◽  
Vol 9 (1) ◽  
pp. 21-37
Author(s):  
Justyna Kurek

Unsolicited correspondence — so called ‘spam’ — is inextricably linked to electronic communications. It is widely considered to be the scourge of the information age and a crucial problem in respect of internet security. The phenomenon is closely associated with the development of electronic communications services. Taking into account the intense legal regulation, and not only that in EU countries, it is important to put the question — what is the reasons that current regulations seems to be insufficient. Is their ineffectiveness a result of objective factors such as the evolution of the phenomenon and insufficient flexibility of legal norms? Or maybe, legal protection models are based on a prior false assumption that it is possible to cope with a global problem and to protect against spam through national or regional regulations? The aim of this article is to try to answer these questions and, on the basis of comparative studies, try to create minimum standards for national legislation in the field of protection against spam. In my opinion the effectiveness of anti-spam regulation depends on the resources of law enforcement and the scope of the competences held by public authorities. Opportunities for international cooperation and cooperation with internet service providers and organisations in the private sector play an important role in the process of applying the law. The comparative studies on national legislations, EU directives and regulations of the OECD model indicate that the effectiveness of anti-spam protection depends on definitional consistency in describing the phenomenon in the widest possible range of national legal systems and of close international cooperation between competent national authorities.


Sign in / Sign up

Export Citation Format

Share Document