This paper explores the economics of software vulnerabilities, evaluates three policy alternatives for vulnerability discovery and disclosure and argues that bug bounty programs, which leverage two-sided digital market platforms to connect organisations and ethical hackers, yield the highest effectiveness, legality and trustworthiness impacts.
Research articles on Privacy & Security
Over the past fifty years, surveillance practices once considered untenable due to their incompatibility with democratic rights and values have been rebranded as tolerable, neutral, or even desirable.
An analysis of the EU data protection legislation and the AI Act proposal to assess, in light of the principle of proportionality, whether or not law enforcement authorities should be prohibited from using these technologies in "real time".
The article explores the regulatory “grey zones” in the deployment of facial recognition (FRT) in policing in Brazil, and the policy and civic responses to them.
The concept of surveillance is indispensable for understanding the digital age, even as it requires constant inflection.
A “non-user,” as the name suggests, refers to an individual who does not use a given product or system. Critical work on non-use elaborates a range of applications for the term we consider here. The variations of non-use under discussion encompass both voluntary and involuntary cases of non-use.
PIMS typically employ technical, legal and organisational measures for enabling users to manage and control their data.
This systematic review explored 23 studies to establish whether the YouTube recommender system facilitates pathways to problematic content.
This glossary entry explores traceability which is an increasingly prominent research topic in decentralised technosocial systems in fields as diverse as health, sustainability, finance, and supply chain management and relates to the ability to trace something or someone.
The social appropriation of new technologies refers to technological and social processes of mediation in the interaction between social actors and technological devices.