Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2022
Ethical and Legal Aspects of Digital Forensics Algorithms: The Case of Digital Evidence Acquisition
ICEGOV '22: Proceedings of the 15th International Conference on Theory and Practice of Electronic GovernancePages 32–40https://doi.org/10.1145/3560107.3560114The first step that forensic examiners perform is identifying and acquiring data. Both are among the most critical segments in the forensic process since they are sine qua non for completing the examination and analysis phases. The evidence acquisition ...
- research-articleApril 2019
Smart contracts in view of the civil code
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied ComputingPages 392–399https://doi.org/10.1145/3297280.3297321Explicit legal regulation is still lacking in many countries for cryptocurrencies like Bitcoin, Ripple, Ethereum, and others. This is not unusual for a new technology. On top of such cryptocurrencies, another new technology, so-called smart contracts, ...
- posterApril 2018
On the Way to Legal Framework for AI in Public Sector
ICEGOV '18: Proceedings of the 11th International Conference on Theory and Practice of Electronic GovernancePages 682–684https://doi.org/10.1145/3209415.3209448A global tendency to use artificial intelligence (AI) technologies in many areas of our life including critical or vital infrastructure evokes debates about its use for public administration purposes. AI-based systems help to control complex systems in ...
- articleJanuary 2017
Vanishing files: protocols and regulations for immaterial documents
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 9, Issue 1Pages 45–61https://doi.org/10.1504/IJESDF.2017.081770Regulatory and technological aspects of cloud technology are showing both opportunities and gaps in the rules on security and accessibility. Our proposal aims at addressing a problem that has not yet manifested using a protocol and discussing the ...
- research-articleApril 2016
Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics
LAK '16: Proceedings of the Sixth International Conference on Learning Analytics & KnowledgePages 89–98https://doi.org/10.1145/2883851.2883893The widespread adoption of Learning Analytics (LA) and Educational Data Mining (EDM) has somewhat stagnated recently, and in some prominent cases even been reversed following concerns by governments, stakeholders and civil rights groups about privacy ...
-
- research-articleJuly 2015
A Strategic Roadmap for Navigating Academic-Industry Collaborations in Information Systems Research: Avoiding Rigor Mortis
ACM SIGMIS Database: the DATABASE for Advances in Information Systems (SIGMIS), Volume 46, Issue 3Pages 23–51https://doi.org/10.1145/2804075.2804078Research collaboration between industry and academia remains challenging despite progress being made on a number of fronts. We are not implying that all information systems researchers should be engaging in industry collaborations, nor should the value ...
- posterApril 2014
The market of internet sponsored links in the context of competition law: can modeling help?
WWW '14 Companion: Proceedings of the 23rd International Conference on World Wide WebPages 331–332https://doi.org/10.1145/2567948.2577369Internet search market of key words attracts much attention in conjunction with the legal proceedings against Google. It has been recognized that legal argumentation alone may not be sufficient to disentangle the complexity of the case. An approach that ...
- research-articleMarch 2014
Case study: legal requirements for the use of social login features for online reputation updates
SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied ComputingPages 1698–1705https://doi.org/10.1145/2554850.2554857Online users use more and more social login on third-party sites or applications. To use an existing account to login is faster than to fill in personal information forms over and over again. However, many online users, even those who frequently use ...
- keynoteOctober 2013
Privacy, accountability, and access in the age of the personalized campaign
PLEAD '13: Proceedings of the 2nd workshop on Politics, elections and dataPages 3–4https://doi.org/10.1145/2508436.2508460In the last eight years, there has been little progress made on updating our nation's outdated and ineffective privacy laws. While the cost of data has plummeted and entire new industries have been created around storing, analyzing, and sorting large ...
- keynoteOctober 2012
Big data privacy and security challenges
BADGERS '12: Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for securityPages 1–2https://doi.org/10.1145/2382416.2382418The ability to collect and organize large data sets has proven to be transformational: instead of just a linear improvement of older techniques, the ability to effectively process huge amounts of information creates radically new abilities and ...
- research-articleDecember 2011
Privacy in the cloud: going beyond the contractarian paradigm
GTIP '11: Proceedings of the 2011 Workshop on Governance of Technology, Information, and PoliciesPages 21–27https://doi.org/10.1145/2076496.2076499Human life today has become entangled in the Internet. We access e-mail, store content, and use services online without a thought as to where data reside or how data are protected. The "cloud," a conceptualization of how data reside on the Internet ...
- research-articleOctober 2011
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR), Volume 43, Issue 4Article No.: 26, Pages 1–42https://doi.org/10.1145/1978802.1978805Digital images are everywhere—from our cell phones to the pages of our online news sites. How we choose to use digital image processing raises a surprising host of legal and ethical questions that we must address. What are the ramifications of hiding ...
- research-articleSeptember 2011
Convergence of digital and traditional forensic disciplines: a first exemplary study for digital dactyloscopy
MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and securityPages 1–8https://doi.org/10.1145/2037252.2037254Traditional forensic disciplines get increasingly digitized. This allows for new investigations and often provides more details for each trace. Due to this digitalization, digital and digitized forensic disciplines have very similar courses of action ...
- research-articleSeptember 2011
e-government service development: a success story?
ICEGOV '11: Proceedings of the 5th International Conference on Theory and Practice of Electronic GovernancePages 297–300https://doi.org/10.1145/2072069.2072122This paper analyses the reform processes linked to the automation of the admission to higher education in Norway. The long development process has included many steps of technical developments, combined with changes in legislation and radical ...
- articleNovember 2010
The absence of creativity in Feist and the computational process
Journal of the American Society for Information Science and Technology (JASIST), Volume 61, Issue 11Pages 2324–2336The decision of the U.S. Supreme Court in 1991 in Feist Publications, Inc. v. Rural Tel. Service Co. affirmed originality as a constitutional requirement for copyright. Originality has a specific sense and is constituted by a minimal degree of ...
- research-articleOctober 2010
A national strategy to combat cybercrime: a case of Argentina
ICEGOV '10: Proceedings of the 4th International Conference on Theory and Practice of Electronic GovernancePages 114–120https://doi.org/10.1145/1930321.1930347The purpose of this paper is to describe the national strategy of Argentina in fighting against cybercrime, from a legal point of view. Argentina has 24 provinces with individual procedural crime code, in addition to another at the national government ...
- research-articleOctober 2010
Development of the legal framework for e-government: a case of the city of Bogotá (Colombia)
ICEGOV '10: Proceedings of the 4th International Conference on Theory and Practice of Electronic GovernancePages 109–113https://doi.org/10.1145/1930321.1930346This case study describes the current state of the process for defining the juridical framework to support the electronic government strategy of the City of Bogotá, Capital of Colombia. This process began in 2007, through District Decree 619 of 2007. ...
- ArticleJuly 2010
Ethical and Legal Aspects in Biomedical Research Involving Human Beings
AT-EQUAL '10: Proceedings of the 2010 Advanced Technologies for Enhancing Quality of LifePages 79–82https://doi.org/10.1109/ATEQUAL.2010.29The observation of the ethical and juridical standards is the premise without which the applications of biomedical research involving human beings are forbidden. Taking this into consideration, the ethical aspects of biomedical research, are evaluated ...
- research-articleJune 2010
Threat analysis of online health information system
PETRA '10: Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive EnvironmentsArticle No.: 31, Pages 1–7https://doi.org/10.1145/1839294.1839331Electronic health records are increasingly used to enhance availability, recovery, and transfer of health records. Newly developed online health systems such as Google-Health create new security and privacy risks. In this paper, we elucidate a clear ...