Welcome to the Globethics.net Library!

 

  • A legal analysis of the cross border trade in telemedicine: The Singapore perspective

    LAW; KAAN SHEUNG-HUNG, TERRY; LUN KWOK CHAN; BRIAN KEITH SUGG (2010-04-08)
  • EU Armed Forces' Use of Social Media in Areas of Deployment

    Hellman, Maria; Olsson, Eva-Karin; Wagnsson, Charlotte (MISC, 2016-07-11)
    The advent of social media can be seen both as a risk and an opportunity by armed forces. Previous research has primarily examined whether or not the use of social media endangers or strengthens armed forces’ strategic narrative. We examine armed forces’ perceptions of risks and opportunities on a broad basis, with a particular focus on areas of deployment. The article is based on a survey of perceptions of social media amongst the armed forces of EU member states, thus adding to previous research through its comparative perspective. Whereas previous research has mainly
 focused on larger powers, such as the US and the UK, this article includes the views of the armed forces of 26 EU states, including several smaller nations. In analyzing the results we asked whether or not risk and opportunity perceptions were related to national ICT maturity and the existence of a social media strategy. The analysis shows that perceptions of opportunities outweigh perceptions of risks, with marketing and two-way communication as the two most prominent
 opportunities offered by the use of social media. Also, armed forces in countries with a moderate to high ICT maturity emphasize social media as a good way for marketing purposes. (author's abstract)
  • Toward a Theory of Vulnerability Disclosure Policy: A Hacker’s Game

    Canaan, Taylor J. (2020-12-08)
    By first understanding the behavioral consequences of policy changes in cyberspace, we are better able to defend and understand the increasingly connected world in which we live.
 One of the greatest drivers of human progress in the last couple of decades is the ability to access technology and the internet, but how we enforce cybersecurity is a pressing problem. Cybersecurity requires an interdisciplinary approach to solve the many problems in fields such as fintech, cyber crime, human rights violations, e-commerce, etc. How individual freedoms can be preserved while human progress can be advanced within cyberspace is the focus of the research within this initiative.
  • The Construction of Next Great Cyber Wall?

    Canann, Taylor J. (2020-12-08)
    By first understanding the behavioral consequences of policy changes in cyberspace, we are better able to defend and understand the increasingly connected world in which we live. One of the greatest drivers of human progress in the last couple of decades is the ability to access technology and the internet, but how we enforce cybersecurity is a pressing problem. Cybersecurity requires an interdisciplinary approach to solve the many problems in fields such as fintech, cyber crime, human rights violations, e-commerce, etc. How individual freedoms can be preserved while human progress can be advanced within cyberspace is the focus of the research within this initiative.
  • US Federal Policy Proposal for the Protection of Citizens’ Data

    Brockman, Emily M. (Author); Hollinger, Keith (Thesis Director); Walsh, Tatiana (Committee Member); Martin, Thomas (Committee Member); College of Integrative Sciences and Arts; Information Technology; Barrett, The Honors College (2020-05)
    abstract: This policy proposal paper is designed to address concerns about the protection of data concerning citizens of the United States. The first step is to explore the need for federal legislation because of the problems of cyberattacks, data loss and leakage, and big data. The proposal then analyses how other countries had already addressed these concerns for their citizens through legislation by looking at their regulation and the results of implementation. The paper adjacently discusses the importance of American values of privacy as a fundamental right, the free market, and protection from the private sector within a cybersecurity paradigm. From this combined research, the paper yields a proposal of how the U.S. government should address the situation through federal policy. The policy outlines cybersecurity measures to protect information from cyberattacks and data loss and leakage, rights of American citizens that organizations need to uphold, and the creation of a commission that provides resources and education to domestic and foreign organizations.

View more