Inf. Polity最新文献

筛选
英文 中文
Erratum to papers published in Information Polity - Volume 27, issue 2 《信息政策》第27卷第2期发表的论文的勘误
Inf. Polity Pub Date : 2022-07-26 DOI: 10.3233/ip-229012
{"title":"Erratum to papers published in Information Polity - Volume 27, issue 2","authors":"","doi":"10.3233/ip-229012","DOIUrl":"https://doi.org/10.3233/ip-229012","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editorial: Are they now finally listening to us? 社论:他们现在终于听我们的了吗?
Inf. Polity Pub Date : 2022-07-21 DOI: 10.3233/ip-229011
{"title":"Editorial: Are they now finally listening to us?","authors":"","doi":"10.3233/ip-229011","DOIUrl":"https://doi.org/10.3233/ip-229011","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citizens first: A data regulator's perspective on surveillance in three cases1 公民至上:三个案例中数据监管者对监控的看法1
Inf. Polity Pub Date : 2022-07-21 DOI: 10.3233/ip-229010
E. Denham
{"title":"Citizens first: A data regulator's perspective on surveillance in three cases1","authors":"E. Denham","doi":"10.3233/ip-229010","DOIUrl":"https://doi.org/10.3233/ip-229010","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of trust in the adoption of cooperative arrangement types in e-credentials markets 信任在电子证书市场采用合作安排类型中的作用
Inf. Polity Pub Date : 2022-06-23 DOI: 10.3233/ip-211508
A. Guenduez, Tobias Mettler, K. Schedler
{"title":"The role of trust in the adoption of cooperative arrangement types in e-credentials markets","authors":"A. Guenduez, Tobias Mettler, K. Schedler","doi":"10.3233/ip-211508","DOIUrl":"https://doi.org/10.3233/ip-211508","url":null,"abstract":"The interest in digital identities has increased considerably in academia and practice in recent years. This can be seen by the many electronic identity projects worldwide and the numerous published studies that provide insightful narratives and descriptive case findings about success factors and barriers to the adoption of national authentication infrastructures. In this paper, we take a closer look to the role of trust on the design and implementation of a nation-wide e-credential market. We argue that trust in political and economic institutions can be an important factor to explain differences in the chosen cooperative arrangement which can range from monopolistic, purely state-controlled e-credential markets, to polypolistic, decentralized e-credential markets where also private vendors offer state recognized e-ID on their own or in partnership with the government. Following an inductive reasoning process, we develop three testable propositions which may inspire further empirical research and offer practitioners a new angle to rethink e-credential markets in the light of citizen trust in political and economic institutions.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foundations of information literacy, Taylor, Natalie Greene, and Paul T. Jaeger. ALA Neal-Schuman, 2022 《信息素养的基础》,Taylor, Natalie Greene和Paul T. Jaeger著。ALA Neal-Schuman, 2022
Inf. Polity Pub Date : 2022-06-16 DOI: 10.3233/ip-229008
Jennifer Campbell-Meier
{"title":"Foundations of information literacy, Taylor, Natalie Greene, and Paul T. Jaeger. ALA Neal-Schuman, 2022","authors":"Jennifer Campbell-Meier","doi":"10.3233/ip-229008","DOIUrl":"https://doi.org/10.3233/ip-229008","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue: Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies 特刊导论:质疑现代监控技术:新兴信息和通信技术的伦理和法律挑战
Inf. Polity Pub Date : 2022-05-26 DOI: 10.3233/ip-229006
J. Cas, P. Hert, M. Porcedda, C. Raab
{"title":"Introduction to the Special Issue: Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies","authors":"J. Cas, P. Hert, M. Porcedda, C. Raab","doi":"10.3233/ip-229006","DOIUrl":"https://doi.org/10.3233/ip-229006","url":null,"abstract":"Security issues have always been and will always be high on the public policy agenda. Similarly, new technologies, particularly surveillance technologies, are developed and deployed to tackle security problems. Persistent, conventionally perceived security threats such as organised crime, terrorism and public safety, are complemented by new concerns, such as the social and individual effects of technological solutions to manage the threat posed by the COVID-19 pandemic or challenges to democratic processes posed by the use of social media. Information and Communication Technologies (ICTs) often appear to offer simple, technologically based solutions to multidimensional problems relating to the safeguarding of societies, people and nations. This impression is sustained both by the activities of commercial interests, who would like to see the ongoing procurement of security and surveillance technologies, and by the stance of policy-makers, who have to deal seriously with security problems but who also search for symbolic policies and tools as a way of demonstrating proactivity against crime, terrorism and radicalisation. Conversely, technological progress can also be seen as a factor reinforcing existing securitisation trends; emerging security concerns and technical capabilities mutually fortify each other.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predatory journals and the use and abuse of special issues 掠夺性期刊和特刊的使用和滥用
Inf. Polity Pub Date : 2022-05-26 DOI: 10.3233/ip-229005
{"title":"Predatory journals and the use and abuse of special issues","authors":"","doi":"10.3233/ip-229005","DOIUrl":"https://doi.org/10.3233/ip-229005","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual and biometric surveillance in the EU. Saying 'no' to mass surveillance practices? 欧盟的视觉和生物识别监控。对大规模监控行为说“不”?
Inf. Polity Pub Date : 2022-05-13 DOI: 10.3233/ip-211525
P. Hert, Georgios Bouchagiar
{"title":"Visual and biometric surveillance in the EU. Saying 'no' to mass surveillance practices?","authors":"P. Hert, Georgios Bouchagiar","doi":"10.3233/ip-211525","DOIUrl":"https://doi.org/10.3233/ip-211525","url":null,"abstract":"Earlier this year, the European Commission (EC) registered the ‘Civil society initiative for a ban on biometric mass surveillance practices’, a European Citizens’ Initiative. Citizens are thus given the opportunity to authorize the EC to suggest the adoption of legislative instruments to permanently ban biometric mass surveillance practices. This contribution finds the above initiative particularly promising, as part of a new development of bans in the European Union (EU). It analyses the EU’s approach to facial, visual and biometric surveillance,2 with the objective of submitting some ideas that the European legislator could consider when strictly regulating such practices.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policing the smart home: The internet of things as 'invisible witnesses' 监管智能家居:物联网是“看不见的证人”
Inf. Polity Pub Date : 2022-05-13 DOI: 10.3233/ip-211541
Lachlan D. Urquhart, Diana Miranda, Lena Podoletz
{"title":"Policing the smart home: The internet of things as 'invisible witnesses'","authors":"Lachlan D. Urquhart, Diana Miranda, Lena Podoletz","doi":"10.3233/ip-211541","DOIUrl":"https://doi.org/10.3233/ip-211541","url":null,"abstract":"In this paper, we develop the concept of smart home devices as ‘invisible witnesses’ in everyday life. We explore contemporary examples that highlight how smart devices have been used by the police and unpack the socio-technical implications of using these devices in criminal investigations. We draw on several sociological, computing and forensics concepts to develop our argument. We consider the challenges of obtaining and interpreting trace evidence from smart devices; unpack the ways in which these devices are designed to be ‘invisible in use’; and consider the processes by which they become domesticated into everyday life. We also analyse the differentiated levels of control occupants have over home devices, and the surveillance impacts of making everyday life visible to third parties, particularly the police.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The European PNR Directive as an instance of pre-emptive, risk-based algorithmic security and its implications for the regulatory framework 欧洲PNR指令作为先发制人、基于风险的算法安全的实例及其对监管框架的影响
Inf. Polity Pub Date : 2022-04-28 DOI: 10.3233/ip-211531
Elisa Orrù
{"title":"The European PNR Directive as an instance of pre-emptive, risk-based algorithmic security and its implications for the regulatory framework","authors":"Elisa Orrù","doi":"10.3233/ip-211531","DOIUrl":"https://doi.org/10.3233/ip-211531","url":null,"abstract":"The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives rise to a paradoxical normativity directly dependent on empirical states. Its ‘securitisation move’ is moreover characterised by an inherent tendence to expand. As a result, the PNR Directive poses challenges for existing check and balance mechanisms and for human autonomy. These challenges could be partially addressed by strengthening ex-post control procedures and independent auditing. Yet in the decision to adopt a risk-based security model, something more fundamental seems to be at stake, namely, the preservation of the idea of human beings as moral agents able to direct and modify their behaviour in accordance with an intelligible, reliable and predictable normative order.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信