Showing 1 - 8 of 8
How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We...
Persistent link: https://www.econbiz.de/10012306908
Formal, government-driven technology standards developing organisations (SDOs) traditionally serve as platforms for compromise between existing national standards. In the past decade, the recognition of the driving role of SDOs in innovation has made them surface into the public debate. The...
Persistent link: https://www.econbiz.de/10012657635
area of public security, establishing strategic precedents that discursively focus on the "right to the city". This paper …
Persistent link: https://www.econbiz.de/10014285084
the financial sector. With policy-making ('on the books') centred on guaranteeing data privacy and data security whilst … illustrative case, our exploratory analysis reveals an implementation labyrinth, with a so-called 'privacy-security-control' nexus …
Persistent link: https://www.econbiz.de/10014490517
prevent or investigate crimes, and to protect national security. This article argues that mass untargeted surveillance of …
Persistent link: https://www.econbiz.de/10012164299
Cyber security experts have acknowledged the need to focus more attention on the attitudes, beliefs and practices of … users for security problems and sponsorship of fear-based campaigns directed at end-users. This scholarly essay argues for a … shift in research to center on fostering a 'security mindset'. Instead of just identifying safe practices, this would help …
Persistent link: https://www.econbiz.de/10012164364
In 2015, the Australian government passed the Telecommunications (Interception and Access) Amendment (Data Retention) Act, which requires ISPs to collect metadata about their users and store this metadata for two years. From its conception, Australia's data retention scheme has been...
Persistent link: https://www.econbiz.de/10012164368
This paper interrogates discourses associated with encryption in contemporary policy debates. It traces through three distinct cryptographic imaginaries – the occult, the state, and democratic values – and how each conceptualises what encryption is, what it does, and what it should do....
Persistent link: https://www.econbiz.de/10012164387