In his article, The Internet and Democratic Discourse: Exploring The Prospects of Online Deliberative Forums Extending the Public Sphere, Lincoln Dahlberg explores through a case study how a deliberative model of democracy can overcome economic, structural, and social challenges in order to extend the public sphere using a criteria established by Jurgen Habermas....continue
Taddeo, Mariarosaria. 2017. “Data Philanthropy and Individual Rights.” Minds and Machines 27(1):1–5.
In her article Data Philanthropy and Individual Rights, Mariarosario Taddeo argues that data philanthropy could contribute to morally positive social outcomes if operational challenges are overcome....continue
A free and neutral internet is now a necessary precondition for democracy. To recognize and appreciate the responsibility we’ve entrusted to a continuously evolving global network we look closely at how has fused with with our social, economic, and political institutions. Jürgen Habermas concept of the public sphere gives us the opportunity to untangle why a free and neutral internet is essential component of guaranteeing civil rights, liberties, and a successful democracy. Although the term ...continue
Originally written for Software Secured and published here. Vulnerability scanning aims to reveal security weaknesses in an application by using automated tools to assess its code, design, and functionality. Design flaws which lead to vulnerabilities like Cross Site Scripting (XSS), SQL Injection, path disclosure, and other vulnerabilities found in the OWASP Top 10. The Vulnerability Landscape Understanding what vulnerabilities exist and identifying those relevant to your application will be the first step in implementing vulnerability ...continue
Originally written for Software Secured and published here. Security code review is a process which systematically applies a collection of security audit methodologies capable of ensuring that both environments and coding practices contribute to the development of an application resilient to operational and environmental threats. In practice, code reviews can take on numerous forms including lightweight code discussions or more involved processes such as pair programming, over the shoulder programming, and tool assisted practices. More ...continue
Originally written for Software Secured and published here. Successfully implementing strong application security is one of the most challenging non-functional tasks Scrum teams face.Traditional application security practices which carefully integrate security throughout the Software Development Lifecycle (SDLC) are often at odds with Scrum methodology which favors responsive development cycles that quickly produce working code. To unite the strengths offered by Scrum with the necessity of security, professors from the Munich IT Security Research Group modified ...continue
Originally written for Software Secured and published here. In June of 2016 it was revealed that a database maintained by a large data brokerage company was hacked exposing 154 million US voter records and personal details like gun ownership, positions on gay marriage, and email addresses were retrieved. Database misconfiguration was the cause, the CouchDB database which stored the information was not configured to require authentication in order to access the voter records it held. ...continue