Inf. PolityPub Date : 2022-07-26DOI: 10.3233/ip-229012
{"title":"Erratum to papers published in Information Polity - Volume 27, issue 2","authors":"","doi":"10.3233/ip-229012","DOIUrl":"https://doi.org/10.3233/ip-229012","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-07-21DOI: 10.3233/ip-229011
{"title":"Editorial: Are they now finally listening to us?","authors":"","doi":"10.3233/ip-229011","DOIUrl":"https://doi.org/10.3233/ip-229011","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-07-21DOI: 10.3233/ip-229010
E. Denham
{"title":"Citizens first: A data regulator's perspective on surveillance in three cases1","authors":"E. Denham","doi":"10.3233/ip-229010","DOIUrl":"https://doi.org/10.3233/ip-229010","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-06-23DOI: 10.3233/ip-211508
A. Guenduez, Tobias Mettler, K. Schedler
{"title":"The role of trust in the adoption of cooperative arrangement types in e-credentials markets","authors":"A. Guenduez, Tobias Mettler, K. Schedler","doi":"10.3233/ip-211508","DOIUrl":"https://doi.org/10.3233/ip-211508","url":null,"abstract":"The interest in digital identities has increased considerably in academia and practice in recent years. This can be seen by the many electronic identity projects worldwide and the numerous published studies that provide insightful narratives and descriptive case findings about success factors and barriers to the adoption of national authentication infrastructures. In this paper, we take a closer look to the role of trust on the design and implementation of a nation-wide e-credential market. We argue that trust in political and economic institutions can be an important factor to explain differences in the chosen cooperative arrangement which can range from monopolistic, purely state-controlled e-credential markets, to polypolistic, decentralized e-credential markets where also private vendors offer state recognized e-ID on their own or in partnership with the government. Following an inductive reasoning process, we develop three testable propositions which may inspire further empirical research and offer practitioners a new angle to rethink e-credential markets in the light of citizen trust in political and economic institutions.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-06-16DOI: 10.3233/ip-229008
Jennifer Campbell-Meier
{"title":"Foundations of information literacy, Taylor, Natalie Greene, and Paul T. Jaeger. ALA Neal-Schuman, 2022","authors":"Jennifer Campbell-Meier","doi":"10.3233/ip-229008","DOIUrl":"https://doi.org/10.3233/ip-229008","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-05-26DOI: 10.3233/ip-229006
J. Cas, P. Hert, M. Porcedda, C. Raab
{"title":"Introduction to the Special Issue: Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies","authors":"J. Cas, P. Hert, M. Porcedda, C. Raab","doi":"10.3233/ip-229006","DOIUrl":"https://doi.org/10.3233/ip-229006","url":null,"abstract":"Security issues have always been and will always be high on the public policy agenda. Similarly, new technologies, particularly surveillance technologies, are developed and deployed to tackle security problems. Persistent, conventionally perceived security threats such as organised crime, terrorism and public safety, are complemented by new concerns, such as the social and individual effects of technological solutions to manage the threat posed by the COVID-19 pandemic or challenges to democratic processes posed by the use of social media. Information and Communication Technologies (ICTs) often appear to offer simple, technologically based solutions to multidimensional problems relating to the safeguarding of societies, people and nations. This impression is sustained both by the activities of commercial interests, who would like to see the ongoing procurement of security and surveillance technologies, and by the stance of policy-makers, who have to deal seriously with security problems but who also search for symbolic policies and tools as a way of demonstrating proactivity against crime, terrorism and radicalisation. Conversely, technological progress can also be seen as a factor reinforcing existing securitisation trends; emerging security concerns and technical capabilities mutually fortify each other.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-05-26DOI: 10.3233/ip-229005
{"title":"Predatory journals and the use and abuse of special issues","authors":"","doi":"10.3233/ip-229005","DOIUrl":"https://doi.org/10.3233/ip-229005","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-05-13DOI: 10.3233/ip-211525
P. Hert, Georgios Bouchagiar
{"title":"Visual and biometric surveillance in the EU. Saying 'no' to mass surveillance practices?","authors":"P. Hert, Georgios Bouchagiar","doi":"10.3233/ip-211525","DOIUrl":"https://doi.org/10.3233/ip-211525","url":null,"abstract":"Earlier this year, the European Commission (EC) registered the ‘Civil society initiative for a ban on biometric mass surveillance practices’, a European Citizens’ Initiative. Citizens are thus given the opportunity to authorize the EC to suggest the adoption of legislative instruments to permanently ban biometric mass surveillance practices. This contribution finds the above initiative particularly promising, as part of a new development of bans in the European Union (EU). It analyses the EU’s approach to facial, visual and biometric surveillance,2 with the objective of submitting some ideas that the European legislator could consider when strictly regulating such practices.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-05-13DOI: 10.3233/ip-211541
Lachlan D. Urquhart, Diana Miranda, Lena Podoletz
{"title":"Policing the smart home: The internet of things as 'invisible witnesses'","authors":"Lachlan D. Urquhart, Diana Miranda, Lena Podoletz","doi":"10.3233/ip-211541","DOIUrl":"https://doi.org/10.3233/ip-211541","url":null,"abstract":"In this paper, we develop the concept of smart home devices as ‘invisible witnesses’ in everyday life. We explore contemporary examples that highlight how smart devices have been used by the police and unpack the socio-technical implications of using these devices in criminal investigations. We draw on several sociological, computing and forensics concepts to develop our argument. We consider the challenges of obtaining and interpreting trace evidence from smart devices; unpack the ways in which these devices are designed to be ‘invisible in use’; and consider the processes by which they become domesticated into everyday life. We also analyse the differentiated levels of control occupants have over home devices, and the surveillance impacts of making everyday life visible to third parties, particularly the police.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Inf. PolityPub Date : 2022-04-28DOI: 10.3233/ip-211531
Elisa Orrù
{"title":"The European PNR Directive as an instance of pre-emptive, risk-based algorithmic security and its implications for the regulatory framework","authors":"Elisa Orrù","doi":"10.3233/ip-211531","DOIUrl":"https://doi.org/10.3233/ip-211531","url":null,"abstract":"The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives rise to a paradoxical normativity directly dependent on empirical states. Its ‘securitisation move’ is moreover characterised by an inherent tendence to expand. As a result, the PNR Directive poses challenges for existing check and balance mechanisms and for human autonomy. These challenges could be partially addressed by strengthening ex-post control procedures and independent auditing. Yet in the decision to adopt a risk-based security model, something more fundamental seems to be at stake, namely, the preservation of the idea of human beings as moral agents able to direct and modify their behaviour in accordance with an intelligible, reliable and predictable normative order.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}