Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An ethnocentric look at the law and technology interface

Published: 01 January 2008 Publication History

Abstract

We often conduct ethnocentric research, observing everyday citizen end-users in their own environments to assess their access, technological and policy concerns. Our recent research has revealed that many end-user concerns are on the interface of Law and Technology. Such interface issues also have become apparent throughout our own interactions with software and the Web, as well as within our specific research into eCommerce; Link Analysis and Data Mining; and the Semantic Web applied to eGovernment and Homeland Security. Among the relevant areas we now address are information security and integrity; barriers (intentional or otherwise) to access; security-privacy trade-offs; the need for user education; and importance of cooperation among stakeholders, policymakers and experts in Technology-related Law. We illustrate that in many policy areas of evolving Law related to Technology there may be no general decision procedure; many decisions can only be made case-by-case. We strongly support ethnocentric studies by practitioners of Software Engineering, experts in Technology Law and policymakers. This can identify specific critical deployment issues that might otherwise be overlooked within traditional research venues. We believe that many end-user concerns on the Law and Technology interface, once recognized, can be alleviated by Software Engineering professionals.

References

[1]
Abecker, A., A. Sheth, G. Mentzas and L. Stojanovic (Editors), Semantic Web Meets eGovernment, Stanford University, March 2006, AAAI Press SS-06-06.
[2]
Barbaro, M. and T. Zeller, Jr., "A Face Is Exposed for AOL Searcher No. 4417749", The New York Times, Online Edition, at http://www.nytimes.com/2006/08/09/technology/09aol.html?ex=1312776000&en=f6f61949c6da4d38&ei=5090, August 9, 2006
[3]
Bishop, M. and Wagner, D., "Risks of E-voting", Communications of the ACM, Vol. 50, No. 11 (November 2007), p. 120.
[4]
Bowen, D., "California Secretary of State Voting Systems Review," at http://www.sos.ca.gov/elections/elections_vsr.htm, August 2007
[5]
Brownfield, M, "Librarian Stops Look-alike Gun Buy," The Carmel Pine Cone, Carmel CA, Vol. 85, No. 32 (August 6--12, 1999), p. 1A ff.
[6]
Carnevale, D., "Permissions Granted," The Chronicle of Higher Education, Wired Campus Newsletter, http://chronicle.com/wired campus/index.php?id=2113, June 1, 2007.
[7]
Domingos, P., "Mining Social Networks for Viral Marketing," in {33}, pp. 80--82.
[8]
Fairfax County, "E-Government Initiatives", website of Fairfax County VA, http://www.fairfaxcounty.gov/dit/publicaccess.htm, 2007.
[9]
Fass, L.F., "Small Steps and Giant Leaps toward Homeland Security," in {39}, pp. 123--126.
[10]
Fass, L.F., "Ubiquity and Common Sense for the Web," Proceedings of the Joint Conference on Information Sciences, International Symposium on Web Intelligence and Security, Salt Lake City Utah, July 2005, pp. 1433--1436.
[11]
Fass, L.F., "The Semantic Web, E-Government and the Digital Divide" in {1}, pp. 14--17.
[12]
Fass, L.F., "Fostering Web Use in Some Real Environments," ACM Software Engineering Notes, Vol. 32, No. 2 (March 2007), abstracted, p. 24 with full paper accessible via the ACM Digital Library.
[13]
Fischman, J., "Got Term Papers for Sale? Google Won't Help You Advertise It," The Chronicle of Higher Education, Online Edition, http://chronicle.com/daily/2007/05/2007052305n.htm, May 23, 2007.
[14]
Foster, A.L., "National-Security Letters Ruled Unconstitutional," The Chronicle of Higher Education, Wired Campus Newsletter, http:// chronicle.com/wiredcampus/index.php?id=2358, September 6, 2007.
[15]
Foster, A.L., "Justice Department Fights to Keep National-Security Letters," The Chronicle of Higher Education, Wired Campus Newsletter, http://chronicle.com/wiredcampus/index.php?id=2524,November 6, 2007.
[16]
Helft, M, "Google Zooms In Too Close for Some," The New York Times, Online Edition, http://www.nytimes.com/2007/ 06/01/technology /01private.html, June 1, 2007.
[17]
Hendler, J., "Counter Intelligence and the Semantic Web," in {39}, pp. 83--85.
[18]
Jensen, D. and H.G. Goldberg (Editors), Artificial Intelligence & Link Analysis, Orlando FL, October 1998, AAAI Press FS98-01.
[19]
Kazman, R., L. Bass and B. John (Editors), Bridging the Gaps Between Software Engineering and Human-Computer Interaction, Proceedings of the International Conference on Software Engineering IFIP Workshop W1L, Edinburgh Scotland, May 2004, The IEE.
[20]
Lichtblau, E. and J. Risen, "Spy Agency Mined Vast Data Trove, Officials Report," The New York Times, Online Edition, http://www.nytimes.com/2005/12/24/politics/24spy.html, December 24, 2005.
[21]
Liptak, A., "Web Sites Listing Informants Concern Justice Dept," The New York Times, Online Edition, http://www.nytimes.com/ 2007/05/22/washington/22plea.html, May 22, 2007.
[22]
Menn, J., "Thieves target Monster.com users: Thieves cull data from Monster.com, then aim for users' bank accounts," Los Angeles Times, Online Edition, at http://www.latimes.com/ business/, August 23, 2007.
[23]
Mladenic, D., Milic-Frayling, N. and M. Grobelnik (Editors), Link Analysis, Pittsburgh PA, July 2005, AAAI Press WS-05-07.
[24]
Neumann, P.G. (Editor), Special Section on the Problems and Potentials of Voting Systems, Communications of the ACM, Vol. 47, No. 10 (October 2004), pp. 28--70.
[25]
Neville, J., Simsek, O., Jensen, D., Komoroske, J., Palmer, K. and H. Goldberg, "Using relational knowledge discovery to prevent securities fraud," Proceedings of 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago IL, August 2005, pp. 449--458.
[26]
Picarelli, J.T., "Transnational Threat Indications and Warning: The Utility of Network Analysis," in {18}, pp. 88--93.
[27]
Pogue, D., "Following the Money Trail Online," The New York Times, Online "Circuits" Feature, www.nytimes.com/circuits, emailed May 24, 2007, and accessible at http://pogue.blogs.nytimes.com/2007/05/24/ following-the-money-trail-online/
[28]
Popp, R., Armour, T., Senator, T. and K. Numrych, "Countering Terrorism through Information Technology," in {38}, pp. 36--43.
[29]
Popp, R., Sweeney, L., Lunt, T. and G. Cybenko, "Privacy Panel," held in connection with AAAI Spring Symposium on AI Technologies for Homeland Security (symposium proceedings appear as {39}), Stanford University, March 2005.
[30]
Read, B., "MySpace Misidentifies a Student as a Sex Offender," The Chronicle of Higher Education, Wired Campus Newsletter, http://chronicle.com/wiredcampus/index.php?id= 2102, May 29, 2007.
[31]
Read, B., "Tracking Wikipedia's Not-So-Neutral Editors," The Chronicle of Higher Education, Wired Campus Newsletter, http:// chronicle.com/wiredcampus/index.php?id=2302, August 14, 2007.
[32]
Sommerville, I., "Making Ethnography Accessible: Bringing Real-World Experience to HCI Designers and Software Engineers," in {19}, pp. 36--38.
[33]
Staab, S. (Editor), "Social Networks Applied," Trends & Controversies Section, IEEE Intelligent Systems, Vol. 20, No. 1 (January/February 2005), pp. 80--93.
[34]
Stone, B., "MySpace to Share Data With States on Offenders," The New York Times, Online Edition, http://www.nytimes.com/ 2007/05/22/ technology/22myspace.html?th&emc=th, May 22, 2007.
[35]
Story, L., "Tracking of Web Use by Marketers Gains Favor," The New York Times, Online Edition, http://www.nytimes.com/2007/11/05/ technology/05myspace.html, November 5, 2007.
[36]
Sullivan, B., "Online job listing an ID theft scam," http://www.msnbc.msn.com/id/3078533/, November 4, 2002.
[37]
Sweeney, L. and R. Gross, "Mining Images in Publicly-Available Cameras for Homeland Security," in {39}, pp. 161--163.
[38]
Yen, J. (Editor), Special Section on Emerging Technologies for Homeland Security, Communications of the ACM, Vol. 47, No. 3, (March 2004), pp. 32--68.
[39]
Yen, J. and R Popp (Editors), AI Technologies for Homeland Security, Stanford University, March 2005, AAAI Press SS-05-01.
[40]
Zdanowicz, J.S., "Detecting Money Laundering and Terrorist Financing via Data Mining," Communications of the ACM, Vol. 47, No. 5, (May 2004), pp. 53--55.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 33, Issue 1
January 2008
54 pages
ISSN:0163-5948
DOI:10.1145/1344452
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 January 2008
Published in SIGSOFT Volume 33, Issue 1

Check for updates

Author Tags

  1. Technology policy
  2. barriers to access
  3. computing environments
  4. engineering ethics
  5. ethnocentric software engineering
  6. human-web interaction
  7. information integrity
  8. privacy
  9. security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Oct 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media