CompSciRN: Other Cybersecurity最新文献

筛选
英文 中文
Blockchain Technology and Intellectual Property – A Basic Introduction 区块链技术与知识产权——基本介绍
CompSciRN: Other Cybersecurity Pub Date : 2021-08-31 DOI: 10.2139/ssrn.3917801
Julia Hugendubel
{"title":"Blockchain Technology and Intellectual Property – A Basic Introduction","authors":"Julia Hugendubel","doi":"10.2139/ssrn.3917801","DOIUrl":"https://doi.org/10.2139/ssrn.3917801","url":null,"abstract":"Blockchain technology is predicted to have a major impact on the intellectual property (IP) ecosystem. More and more projects are being launched, both in the public and private sector. The World Intellectual Property Organization (WIPO) has built up a Blockchain Task Force and is preparing a new WIPO Standard to encompass all types of IP rights and the entire IP lifecycle; the German Government published a strategy paper on blockchain with a chapter on applications in the creative arts sector; a European Blockchain Service Infrastructure is being built up; the European Union Intellectual Property Office (EUIPO) established an Anti-Counterfeiting Forum as part of the broader EU strategy to create a blockchain ecosystem and now has its own blockchain for trademarks and designs in the EU. Furthermore, LVMH, with brands such as Louis Vuitton, developed its own blockchain to track luxury goods; Kodak started a blockchain initiative for image rights management; music and film streaming are offered on blockchain platforms; sports clubs discuss micro-licensing of their IP rights; digital fashion is created for distribution using blockchain. Moreover, news abounds of blockchain-based non-fungible tokens (NFTs) representing basically everything imaginable – both digital and physical – in the IP ecosystem, to track the origin of art and all manner of products. However, interestingly enough, as early as 2012 a whitepaper was published linking the idea of smart property by Nick Szabo and digital collectibles to blockchain and at the same time introducing the first kind of NFTs, coloured coins. The developments in the blockchain space, including in the area of IP, are progressing at a rapid pace, both from a technological and a value perspective. For example, the value of crypto art traded on blockchain from 2018 to 2020 was estimated at about 15 million US Dollar (with about 8.2 million US Dollar worth of crypto artwork in December 2020 ). In March 2021, the most expensive piece of artwork linked to an NFT in history was sold by Mike Winkelmann (Beeple) for 42,329.453 Ether, at the time worth 69,346,250 million US Dollar. The NFT marketplace OpenSea has set and then beat daily records several times, reaching a new peak of 322,982,301 million US Dollar of trading volume on 29 August 2021. Nevertheless, many applications for IP matters are still in their infancy. The reason for this might lay, aside from the rather complex technological details, in uncertainties about their regulation and legal standing in court, such as the recognition of a legal binding smart contract. Therefore, the article introduces the very basic features of blockchain technology and blockchain-based IP applications. The article then dives into concrete IP use cases that are currently offered and developed on the market. It also gives a general overview of opportunities and existing challenges for the IP ecosystem. The legal perspective is mainly a German and European one.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114148692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Endogenous Data Collection in Platform Markets: Privacy and Welfare 平台市场的内生数据收集:隐私与福利
CompSciRN: Other Cybersecurity Pub Date : 2021-06-15 DOI: 10.2139/ssrn.3867746
Gaurav Jakhu, Prabal Roy Chowdhury
{"title":"Endogenous Data Collection in Platform Markets: Privacy and Welfare","authors":"Gaurav Jakhu, Prabal Roy Chowdhury","doi":"10.2139/ssrn.3867746","DOIUrl":"https://doi.org/10.2139/ssrn.3867746","url":null,"abstract":"Increasingly dominant online platforms are collecting and sharing user data across multiple markets, raising red flags as regards privacy, as well as potential anti-competitive abuses. We analyse competition among two platforms that compete in prices and advertising quantities, with one platform collecting data in a related market where it is dominant. We find that data collection is socially excessive whenever market competition is at an intermediate level, whereas weak competition leads to too little data collection. We then use this framework to examine a possible regulatory approach to privacy protection, i.e. empowering users to control the amount of data that can be collected from them. Surprisingly, we find that in markets where advertising is effectively targetted, but competition is weak, user control of data can increase data collection, thus degrading privacy. In all other markets however privacy improves. We also analyse the welfare implications of such a policy.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Bitcoin: The Economics of Cryptocurrencies and Blockchain Technologies (Chapter 6: Smart Contracts and Blockchain) 超越比特币:加密货币和区块链技术的经济学(第6章:智能合约和区块链)
CompSciRN: Other Cybersecurity Pub Date : 2021-06-14 DOI: 10.2139/ssrn.3894110
Hanna Halaburda, M. Sarvary, Guillaume Haeringer
{"title":"Beyond Bitcoin: The Economics of Cryptocurrencies and Blockchain Technologies (Chapter 6: Smart Contracts and Blockchain)","authors":"Hanna Halaburda, M. Sarvary, Guillaume Haeringer","doi":"10.2139/ssrn.3894110","DOIUrl":"https://doi.org/10.2139/ssrn.3894110","url":null,"abstract":"In this chapter we discuss smart contracts and functionalities they afford, especially in combination with blockchain. 6.1. The rise of Ethereum. 6.1.1. History. 6.1.2. Ethereum is “different”. 6.2. Smart contracts. 6.2.1. Smart contracts on Ethereum. 6.2.2. What do smart contracts need a blockchain for? 6.3. Tokens. 6.3.1. What are tokens? 6.3.2. Use of tokens. 6.4. Initial coin offering. 6.5 Non-fungible tokens. 6.5.1 NFTs and Smart contracts do not solve digital art ownership problems. 6.5.2. New markets enabled by NFTs. 6.6. DAPPS. 6.7 Blockchain governance, DAPPS and smart contracts. For Chapter 1 (Introduction), see https://ssrn.com/abstract=3135021. For Chapter 2 (Means of Exchange: Ever-present Competition), see https://ssrn.com/abstract=3135028. For Chapter 3 (Platform-based Currencies), see https://ssrn.com/abstract=3135030. For Chapter 4 (Bitcoin and Emergence of Cryptocurrencies), see https://ssrn.com/abstract=3135043. For Chapter 5 (The Rich Land of Crypto), see https://ssrn.com/abstract=3135057. For Chapter 6 (Smart Contracts and Blockchain), see https://ssrn.com/abstract=3894110. For Chapter 7 (Enterprise Blockchains), see https://ssrn.com/abstract=3894117. For Chapter 8 (Conclusions: Future Full of Possibilities), see https://ssrn.com/abstract=3894118.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115297066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Privacy by Default, Abuse by Design: EU Competition Concerns About Apple's New App Tracking Policy 默认隐私,设计滥用:欧盟对苹果新应用跟踪政策的竞争担忧
CompSciRN: Other Cybersecurity Pub Date : 2021-05-26 DOI: 10.2139/ssrn.3853981
Thomas Hoppner, Philipp Westerhoff
{"title":"Privacy by Default, Abuse by Design: EU Competition Concerns About Apple's New App Tracking Policy","authors":"Thomas Hoppner, Philipp Westerhoff","doi":"10.2139/ssrn.3853981","DOIUrl":"https://doi.org/10.2139/ssrn.3853981","url":null,"abstract":"With the most recent updates of its mobile operating systems, in April 2021 Apple implemented a new global App Tracking Transparency policy. The policy obliges app developers to display an additional (Apple-designed) prompt to request permission from end users for the developer to “track” the user, even when the user has already consented to the sharing of its data through the developer’s own consent tool. Apple presents the new policy as a step to enhance privacy. Others, including the authors of this article, see it as a “bombshell for third-party mobile ad tech” that, together with Google’s disabling of third-party cookies, only entrenches the data supremacy of Apple and Google, and forecloses data-based competition and consumer choice across the entire Apple ecosystem. These concerns in fact have already triggered an investigation by the French Autorité de la concurrence and a complaint of eight media and tech associations before the German Bundeskartellamt. From the standpoint of EU law, this article describes the relevant conduct and technicalities, its impact on end users’ data privacy and on competition, and how both interests may be weighed considering the existing legislation.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptocurrency & Its Impact on Environment 加密货币及其对环境的影响
CompSciRN: Other Cybersecurity Pub Date : 2021-05-15 DOI: 10.2139/ssrn.3846774
Kamshad Mohsin
{"title":"Cryptocurrency & Its Impact on Environment","authors":"Kamshad Mohsin","doi":"10.2139/ssrn.3846774","DOIUrl":"https://doi.org/10.2139/ssrn.3846774","url":null,"abstract":"Cryptocurrencies have gone a long way since their inception. While the conventional financial sector initially dismissed digital currencies as tools for crooks and speculators, the sector has made considerable progress in establishing itself as a genuine and (possibly) world-changing arena. There are still concerns about the long-term effects of widespread cryptocurrency usage. Many skeptics and environmentalists, in particular, have expressed worry about the energy consumption of cryptocurrency mining, which may result in increasing carbon emissions and climate change. The mainstreaming of cryptocurrency, as it has been dubbed, is clearly a significant event in the world of finance. It's also a significant event in the world of, well, the globe. Whether you like cryptocurrencies or oppose them, there's no denying that bitcoin and other proof-of-work blockchains use massive amounts of energy.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Use of Blockchain Technology and Homeostatic Principles in the Monetary Policies of States 区块链技术和稳态原理在国家货币政策中的应用
CompSciRN: Other Cybersecurity Pub Date : 2021-04-10 DOI: 10.2139/ssrn.3849156
Anton Dziatkovskii, Uladzimir Hryneuski
{"title":"The Use of Blockchain Technology and Homeostatic Principles in the Monetary Policies of States","authors":"Anton Dziatkovskii, Uladzimir Hryneuski","doi":"10.2139/ssrn.3849156","DOIUrl":"https://doi.org/10.2139/ssrn.3849156","url":null,"abstract":"The article presents the main trends in the application of blockchain technology and the basic principles of homeostatics in the formation of monetary policy: theoretical approaches and a methodological basis for conducting the study are investigated. The tools used for the research include literature and statistics. In the conclusion, examples and possible scenarios of predictive implementation for the use of homeostatics and blockchain technology in monetary policy are presented.<br><br>Analyzed data allowed us to conclude that distributed ledgers leveraged by the means of blockchain represent a model ruled by the principles of homeostatics. They are characterized by a similar structure (four layers) and can increase the transparency of the financial market. Being supported by the laws of homeostatics, blockchain simplifies processes compared to centralized solutions and enables flexible settlement models. In the analytical part, we assumed that the implementation of blockchain-based digital currencies may have a serious short- and long-term impact on monetary systems and put the role of Central Banks under question.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LOS NUEVOS MÉTODOS DE VALORACIÓN DE CRIPTOACTIVOS (The New Methods of Valuation of Cryptoassets) 加密资产估值的新方法(加密资产估值的新方法)
CompSciRN: Other Cybersecurity Pub Date : 2021-04-01 DOI: 10.2139/SSRN.3817055
Ismael Santiago
{"title":"LOS NUEVOS MÉTODOS DE VALORACIÓN DE CRIPTOACTIVOS (The New Methods of Valuation of Cryptoassets)","authors":"Ismael Santiago","doi":"10.2139/SSRN.3817055","DOIUrl":"https://doi.org/10.2139/SSRN.3817055","url":null,"abstract":"Spanish abstract: El mercado de la inversion de criptoactivos necesita todavia tiempo por madurar como demuestra la importante volatilidad de precios que sufren estos, haciendo dificil todavia que criptomonedas como bitcoin se conviertan el verdaderos y generalizados medios de intercambio, capaces de competir en este aspecto con las monedas fiat (yen, euro, dolar, libra, etc.). Logicamente sin cumplirse plenamente esta funcionalidad del dinero indicada de la propiedad de unidad de cuenta (significa que es la unidad de medida que se utiliza en una economia para fijar los precios, ya que el dinero es un sistema de registro contable) ni hablamos, quizas todo llegue a su tiempo. El creciente interes inversor institucional, ademas del consolidado individual, hace necesario el contar con instrumentos y metodologias de valoracion que permitan evaluar el cambio de valor temporal que sufren los criptomonedas en los criptomercados \u0000Cada vez son mas las voces reputadas que creen que el bitcoin y otros criptoactivos como StableCoins van a forzar un nuevo patron monetario, como vemos en las recientes reacciones de los bancos centrales al proyectar la emision, mas pronto ya que tarde, de sus CBDCs o monedas digitales emitidos por bancos centrales de curso legal. El problema que encontramos en los tradicionales metodos de valoracion a traves del descuento de los flujos de caja no son correctamente aplicables en este caso y debemos recurrir a un nuevo enfoque alternativo en los metodos de valoracion de criptoactivos. En este trabajo de investigacion realizamos un analisis de las variables fundamentales para determinar el valor de los criptoactivos. \u0000 \u0000English abstract: The crypto-asset investment market still needs time to mature, as shown by the significant price volatility suffered by these, making it difficult for cryptocurrencies such as bitcoin to become the true and widespread means of exchange, capable of competing in this regard with fiat currencies. (yen, euro, dollar, pound, etc.). Logically, this functionality of the indicated money of the unit of account property is not fully fulfilled (it means that it is the unit of measurement that is used in an economy to set prices, since money is an accounting record system) nor do we speak, perhaps everything arrives in its time. The growing institutional investor interest, in addition to the individual consolidated, makes it necessary to have instruments and valuation methodologies that allow evaluating the change in time value suffered by cryptocurrencies in crypto markets. More and more reputable voices believe that bitcoin and other crypto assets such as StableCoins are going to force a new monetary standard, as we see in the recent reactions of central banks when projecting the issuance, sooner rather than later, of their CBDCs or digital currencies issued by legal tender central banks. The problem that we find in traditional valuation methods through discounting of cash flows are not correctly applicable","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126003641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSB Steganography Strengthen Footprint Biometric Template LSB隐写增强足迹生物识别模板
CompSciRN: Other Cybersecurity Pub Date : 2021-02-26 DOI: 10.15587/1729-4061.2021.225371
Israa Mohammed Khudher
{"title":"LSB Steganography Strengthen Footprint Biometric Template","authors":"Israa Mohammed Khudher","doi":"10.15587/1729-4061.2021.225371","DOIUrl":"https://doi.org/10.15587/1729-4061.2021.225371","url":null,"abstract":"Steganography is the science of hiding secret data inside another data type as image and text. This data is known as carrier data; it lets people interconnect secretly. This suggested paper aims to design a Steganography Biometric Imaging System (SBIS). The system is constructed in a hybridization manner between image processing, steganography, and artificial intelligence techniques. During image processing techniques the system receives RGB foot-tip images and preprocesses the images to get foot-template images. Then a chain code is illustrated for personal information within the foot-template image by Least Significant Bit (LSB). Accurate recognition operation is performed by artificial bee colony optimization (ABC). The automated system was tested on a live-took about ninety RGB foot-tip images known as the cover image and clustered to nine clusters that authorized visual database. The Least Significant Bit method transforms the foot template to a stego image and is stored on a stego visual database for further use. Features database was constructed for each stego footprint template. This step converts the image to quantities data and stored in an Excel feature database file. The quantities data was used at the recognition stage to produce either a notification of rejection or acceptance. At the acceptance choice, the corresponding stego foot-tip template occurrence was retrieved, it is corresponding individual data were extracted and cluster position on the stego template visual database. Indeed, the foot-tip template is displayed. The suggested work consequence is affected by the optimum feature selection via the artificial bee colony optimization usage and clustering, which declined the complication and subsequently raised the recognition rate to 93.65 %. This rate competes out the technique over others’ techniques in the field of biometric recognition.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122526313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Re-identification of Health Data through Machine Learning 通过机器学习重新识别健康数据
CompSciRN: Other Cybersecurity Pub Date : 2020-11-30 DOI: 10.2139/ssrn.3794927
Jayanth Kancherla
{"title":"Re-identification of Health Data through Machine Learning","authors":"Jayanth Kancherla","doi":"10.2139/ssrn.3794927","DOIUrl":"https://doi.org/10.2139/ssrn.3794927","url":null,"abstract":"Startups and large technology companies are working with companies in healthcare to research, create, and deploy machine learning healthcare solutions. The growth of machine learning healthcare solutions is increasing the risk of re-identification of health data, raising concerns for individual privacy. Differential privacy is one of the latest and most popular anonymization techniques used on machine learning data to guarantee data privacy but is presenting challenges when applied to health data. The Health Insurance Portability and Accountability Act (HIPAA) has loopholes and does not address the use of machine learning on health data. This paper will explain why HIPAA needs to be amended to reduce the risk of re-identification due to the growth of machine learning in healthcare and the challenges presented in applying differential privacy. The paper will also discuss three possible proposals to amend HIPAA to reduce the risk of re-identification.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Business Data Ethics: Emerging Trends in the Governance of Advanced Analytics and AI 商业数据伦理:高级分析和人工智能管理的新趋势
CompSciRN: Other Cybersecurity Pub Date : 2020-10-02 DOI: 10.2139/ssrn.3828239
D. Hirsch, Tim Bartley, Aravind Chandrasekaran, Davon Norris, Srinivasan Parthasarathy, Piers Norris Turner
{"title":"Business Data Ethics: Emerging Trends in the Governance of Advanced Analytics and AI","authors":"D. Hirsch, Tim Bartley, Aravind Chandrasekaran, Davon Norris, Srinivasan Parthasarathy, Piers Norris Turner","doi":"10.2139/ssrn.3828239","DOIUrl":"https://doi.org/10.2139/ssrn.3828239","url":null,"abstract":"Advanced analytics and artificial intelligence are powerful technologies that, along with their benefits, create new threats to privacy, equality, fairness and transparency. Existing law does not yet protect sufficiently against these threats. This has led some organizations to pursue what they call “data ethics” or “AI ethics” in an attempt to bring advanced analytics and AI more into line with societal values and so legitimate their growing use of these technologies.<br><br>To date, much of the scholarship on data ethics has sought either to define the ethical principles to which organization should aspire, or to map out the laws and regulations needed to push organizations towards these ethical goals. While these two lines of inquiry are important, the literature is missing a critical third dimension: empirical work on how organizations are actually governing the threats that their use of advanced analytics and AI can generate. Good regulatory design requires such knowledge. Yet, while there have been important studies of how organizations manage privacy “on the ground” (Bamberger and Mulligan 2015), there has been little such work on the governance of advanced analytics and AI.<br><br>This report begins to fill this gap. Focusing on private sector organizations, the authors interviewed corporate privacy managers deemed by their peers to be leaders in the governance of advanced analytics and AI, as well as the lawyers, consultants and thought leaders who advise them on this topic. They also surveyed a wider range of privacy mangers. The study sought to answer three, fundamental questions about business data ethics management: (1) How do leading companies conceptualize the threats that their use of advanced analytics and AI pose for individuals, groups and the broader society? (2) If it is true that the law does not yet require companies to reduce these risks, then why are they pursuing data ethics? and (3) How are companies pursuing data ethics? What substantive benchmarks, management processes and technological solutions do they use towards this end?<br><br>The authors previously shared on SSRN their preliminary findings. This final report provides a much fuller picture. The report should provide legislators and policymakers with an empirical foundation for their efforts to regulate advanced analytics and AI, at the same time as it gives interested organizations ideas on how to improve their data ethics management.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信