scholarly journals Monuments of cyberspace: Designing the Internet beyond the network framework

Author(s):  
Paris Chrysos

In light of the challenges entailed by the (re)design of the Internet, this paper develops the concept of “monuments of cyberspace”, to address the lack of clarity in current debates and more particularly in the use of the conceptual frameworks of “networks” and “communities”. To do so, I revisit the conceptual grounds of network approaches in different disciplines and those of communities of practice, using as an entry point the debate on personal data. To illustrate the value of the concept introduced, the article reviews the design of the “datagram” and that of an online communication setting for developers.

Author(s):  
Godwin Busuttil ◽  
Felicity McMahon ◽  
Gervase de Wilde

The ascendancy of social media poses acute challenges for privacy. While Facebook, Twitter, YouTube, LinkedIn, and other similar services can confer major advantages on users in terms of access to information, ease of communication, and opportunities for network-building, the ordinary concomitant is a significant surrender of personal privacy. This is because participation generally entails the disclosure of, and the ceding of control over, one’s personal data. In order to join the community and enjoy the benefits of membership, a person must establish at a minimum an online contact point and identity (eg in the form of a Facebook account or Twitter profile), typically by transferring some version of his or her actual, real-world, identity to the internet. Many, of course, go much further than this, sharing online—arguably ‘oversharing’—any manner of private information concerning themselves, often with complete strangers. In most cases to do so will prove harmless, but from time to time individuals may make themselves a target.


2021 ◽  
pp. 1-31
Author(s):  
Sarah E. Lageson ◽  
Elizabeth Webster ◽  
Juan R. Sandoval

Digitization and the release of public records on the Internet have expanded the reach and uses of criminal record data in the United States. This study analyzes the types and volume of personally identifiable data released on the Internet via two hundred public governmental websites for law enforcement, criminal courts, corrections, and criminal record repositories in each state. We find that public disclosures often include information valuable to the personal data economy, including the full name, birthdate, home address, and physical characteristics of arrestees, detainees, and defendants. Using administrative data, we also estimate the volume of data disclosed online. Our findings highlight the mass dissemination of pre-conviction data: every year, over ten million arrests, 4.5 million mug shots, and 14.7 million criminal court proceedings are digitally released at no cost. Post-conviction, approximately 6.5 million current and former prisoners and 12.5 million people with a felony conviction have a record on the Internet. While justified through public records laws, such broad disclosures reveal an imbalance between the “transparency” of data releases that facilitate monitoring of state action and those that facilitate monitoring individual people. The results show how the criminal legal system increasingly distributes Internet privacy violations and community surveillance as part of contemporary punishment.


2019 ◽  
Vol 62 (6) ◽  
pp. 32-34 ◽  
Author(s):  
Thomas Pasquier ◽  
David Eyers ◽  
Jean Bacon

2001 ◽  
Vol 31 (2) ◽  
pp. 5-7 ◽  
Author(s):  
Richard A. Spinello ◽  
Herman T. Tavani

2021 ◽  
pp. 000332862110238
Author(s):  
Hillary Raining

In the last few years, scientists have discovered what indigenous communities have known for countless generations: that the emotional and physical lives of our ancestors will fundamentally affect our emotional and physical lives as well. Despite the increasingly evident effect that both trauma and/or gratitude can have on an individual (and by extension their offspring), there has been precious little research done on the effects of gratitude on future generations. This paper will seek to study the effect of gratitude as a deep spiritual practice that changes—not only those who practice it—but also the generations that follow. It will do so through the lenses of generational, psychological, and theological studies using the gratitude worldview and practices of the Ojibwa Native Americans as our entry point into the study of blood memory. It will also offer suggestions for church communities looking to reclaim gratitude as a spiritual practice in modern times drawing from the Church’s institutional “blood memory.”


2001 ◽  
Vol 101 (1) ◽  
pp. 19-31 ◽  
Author(s):  
Gerard Goggin ◽  
Catherine Griff

Much of the present debate about content on the internet revolves around how to control the distribution of different sorts of harmful or undesirable material. Yet there are considerable issues about whether sufficient sorts of desired cultural content will be available, such as ‘national’, ‘Australian’ content. In traditional broadcasting, regulation has been devised to encourage or mandate different types of content, where it is believed that the market will not do so by itself. At present, such regulatory arrangements are under threat in television, as the Productivity Commission Broadcasting Inquiry final report has noted. But what of the future for certain types of content on the internet? Do we need specific regulation and policy to promote the availability of content on the internet? Or is such a project simply irrelevant in the context of gradual but inexorable media convergence? Is regulating for content just as quixotic and fraught with peril as regulating of content from a censorship perspective often appears to be? In this article, we consider the case of Australian content for broadband technologies, especially in relation to film and video, and make some preliminary observations on the promotion and regulation of internet content.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Sattam Eid Almutairi

AbstractThe phenomenon of mass surveillance has confronted legal systems throughout the world with significant challenges to their fundamental norms and values. These dilemmas have been most extensively studied and discussed in relation to the kind of privacy cultures that exist in Europe and North America. Although mass surveillance creates the same kinds of challenges in Muslim countries, the phenomenon has rarely been discussed from the perspective of Shari’a. This article seeks to demonstrate that this neglect of mass surveillance and other similar phenomena by Shari’a scholars is unjustified. Firstly, the article will address objections that Shari’a does not contain legal norms that are relevant to the modern practice of state surveillance and that, if these exist, they are not binding on rulers and will also seek to show that, whatever terminology is employed, significant aspects of the protection of privacy and personal data that exists in other legal systems is also be found deeply-rooted in Shari’a. Secondly, it will assess the specific requirements that it makes in relation to such intrusion on private spaces and private conduct and how far it can benefit from an exception to the general prohibition on spying. Finally, it is concluded that mass surveillance is unlikely to meet these Shari’a requirements and that only targeted surveillance can generally do so.


2010 ◽  
Vol 15 (2) ◽  
pp. 116-132 ◽  
Author(s):  
Madeleine Akrich

This paper describes the emergence of new activist groups in the health sector, spinning off from internet discussion groups. In the first part, it shows how self-help discussion groups can be considered as communities of practice in which, partly thanks to the Internet media, collective learning activities result in the constitution of experiencial knowledge, the appropriation of exogenous sources of knowledge, including medical knoweldge and the articulation of these different sources of knowledge in some lay expertise. In the second part, it describes how activist groups might emerge from these discussion groups and develop specific modes of action drawing upon the forms of expertise constituted through the Internet groups. Activists groups together with self-help groups might form epistemic communities ( HAAS 1992 ), i.e. groups of experts engaged in a policy enterprise in which knowledge plays a major role : in the confrontation of health activists with professionals, the capacity to translate political claims into the langage of science appears as a condition to be (even) heard and be taken into consideration.


2008 ◽  
Vol 67 (1) ◽  
pp. 69-91 ◽  
Author(s):  
Arthur Chaskalson

There are two themes that recur in previous Sir David Williams lectures. First, that it is a considerable honour to be invited to give the lecture. Secondly, that it is a daunting task to do so in the presence of Sir David, particularly in a field in which he has expertise. Since that covers most of the law there is no escape from this dilemma. Let me then acknowledge the privilege of having been asked to give this year's lecture, and confess that it is with some trepidation that I do so. The subject, terrorism and human rights, is not exactly uncharted territory. When I looked into the internet for some guidance on what might be relevant to terrorism and human rights, the response to my Google search informed me that in .03 seconds 32,900,000 references had been found. This seemed to indicate that it was unlikely that I would be able to say anything that has not already been said. But there are some subjects that are of such importance that there is value in reminding ourselves of the issues that are at stake, and if necessary for that purpose, repeating what others have said. And it is with that in mind that I approach my chosen topic.


10.23856/4325 ◽  
2021 ◽  
Vol 43 (6) ◽  
pp. 198-203
Author(s):  
Oleksii Kostenko

The scale, speed and multi-vector development of science and technology are extremely effective in influencing legal, economic, political, spiritual, professional and other social relations. The development of information and communication technologies, the use of the Internet, the creation, storage, transmission, processing and management of information became the driving forces of the new scientific and technological revolution. This facilitates the introduction of technologies for the transmission and use of information in digital form in almost all spheres of public life, namely text data, photo, audio, video images, which are transmitted in various ways via the Internet and other systems and means of communication. One of the key elements of data transmission technologies and systems is the availability of information by which it is possible to identify their subjects and objects by their inherent identification attributes. In Ukrainian legislation, in particular in the Law of Ukraine «On Personal Data Protection», information or a set of information about an individual who is or can be identified specifically is defined as personal data. However, despite its modernity, this law still contains a number of shortcomings and uncertainties, both in terminology and in the legal mechanisms for working with data by which a person can be identified, i.e. identification data.


Sign in / Sign up

Export Citation Format

Share Document