Nasser Mohammed Al-Fannah and Chris Mitchell
Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major…
Abstract
Purpose
Browser fingerprinting is increasingly being used for online tracking of users, and, unlike the use of cookies, is almost impossible for users to control. This has a major negative impact on online privacy. Despite the availability of a range of fingerprinting countermeasures as well as some limited attempts by browser vendors to curb its effectiveness, it remains largely uncontrolled. The paper aims to discuss this issue.
Design/methodology/approach
This paper provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting, covering both user-based and browser-based techniques.
Findings
This study discusses the limitations of counter browser fingerprinting measures and the need for browser vendor support in controlling fingerprinting. Further, a somewhat counterintuitive possible new browser identifier is proposed which could make cookies and fingerprint-based tracking redundant; the need for, and possible effect of, this feature is discussed.
Originality/value
This study provides the first comprehensive and structured discussion of measures to limit or control browser fingerprinting. Also, it proposes a new browser identifier that could make cookies and fingerprint-based tracking redundant.
Details
Keywords
Discusses hedging currency exposures that arise from foreignacquisitions. Particular emphasis is placed on the use of currency swapsand their derivatives. Argues that hedging…
Abstract
Discusses hedging currency exposures that arise from foreign acquisitions. Particular emphasis is placed on the use of currency swaps and their derivatives. Argues that hedging opportunities are now so varied that a strategy of not hedging exposures can be taken as speculative in itself.
Details
Keywords
Chris Mitchell and Janine H. Peake
Discusses the adverse effect on some types of companies whenexposed to fluctuations in interest rates. Discusses the different sortsof tools available to protect against…
Abstract
Discusses the adverse effect on some types of companies when exposed to fluctuations in interest rates. Discusses the different sorts of tools available to protect against fluctuations: forward rate agreements, interest rate swaps and interest rate options. Concludes that whatever option or combination of options is or is not taken, a purely passive approach carries the greatest risk.
Details
Keywords
Adil Alsaid and Chris J. Mitchell
Aims to address some of the problems that arise when signing digital documents that contain dynamic content.
Abstract
Purpose
Aims to address some of the problems that arise when signing digital documents that contain dynamic content.
Design/methodology/approach
Briefly introduces the problem of signing digital documents with dynamic content and discusses possible locations for signature functionality in a computer system. Outlines existing solutions to the problems and introduces a novel solution. Finally, discusses issues and unresolved problems.
Findings
The suggested solution requires all document handling applications to possess application awareness of the digital signature program in order to function properly. Every application must implement a COM interface and register itself in the Registry, in a locale specific to the digital signature program to sign the digital document.
Originality/value
Provides a new solution to the problem of digitally signing a digital document.
Details
Keywords
This chapter examines the changes proposed to the current media ethics and regulation regime in Australia following a government inquiry by former Federal Court judge Ray…
Abstract
This chapter examines the changes proposed to the current media ethics and regulation regime in Australia following a government inquiry by former Federal Court judge Ray Finkelstein. The inquiry was prompted by The News of the World phone hacking scandal in the United Kingdom, which resulted in that publication being closed down by its publisher, News International, and principal shareholder Rupert Murdoch. While finding no evidence of similar misbehaviour by journalists and proprietors in Australia, Finkelstein recommended the establishment of a statutory News Media Council, and the inclusion of online media outlets in this new regulatory regime. This chapter argues that such a regime is unlikely to come into effect, given that it will be opposed by media proprietors and working journalists alike, as well the Federal Opposition, and the taxpayer funded ABC, and that a government with low levels of political capital is unlikely to risk much of that capital in a fight with the media industries in an election year.
Details
Keywords
The theme of this keynote address is conceptual puzzles raised by empirical research on conflict management and resolution. Three types of puzzles are highlighted: those that deal…
Abstract
The theme of this keynote address is conceptual puzzles raised by empirical research on conflict management and resolution. Three types of puzzles are highlighted: those that deal with processes, identities, and situations. The process puzzles include some counter‐intuitive implications of negotiating strategies and interaction process dynamics. The identity puzzles include the ways in which identity is negotiated, perceptions of ingroups and outgroups, and the connection between loyalty to groups and collective action. The situation puzzles address attribution issues, the distinction between passive actors and active agents, and the role of history. An attempt is then made to juxtapose the puzzles toward a larger conception of a field that emphasizes change in the phenomena we analyze in research and shape through practice. A number of these ideas are found also in the research of previous IACM lifetime award recipients, with whom connections are made.