IEEE Security & Privacy

Volume 16 Issue 3 • May/June 2018

Filter Results

Displaying Results 1 - 24 of 24
  • Front Cover

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2113 KB)
    Freely Available from IEEE
  • House Advertisement 
  • Connect on Interface

    Publication Year: 2018, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (2396 KB)
    Freely Available from IEEE
  • Table of Contents 
  • Table of contents

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2138 KB)
    Freely Available from IEEE
  • From the Editors 
  • How Many Is Too Many Candidates?

    Publication Year: 2018, Page(s):3 - 5
    Request permission for commercial reuse | PDF file iconPDF (522 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letter to the Editor 
  • Letter to the Editor

    Publication Year: 2018, Page(s):6 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (2506 KB) | HTML iconHTML
    Freely Available from IEEE
  • Masthead 
  • Masthead

    Publication Year: 2018, Page(s): 11
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Interview 
  • Silver Bullet Talks with Bruce Potter

    Publication Year: 2018, Page(s):12 - 14
    Request permission for commercial reuse | PDF file iconPDF (179 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest Editors’ Introduction 
  • Five Freedoms for the Homo Deus

    Publication Year: 2018, Page(s):15 - 17
    Request permission for commercial reuse | PDF file iconPDF (467 KB) | HTML iconHTML
    Freely Available from IEEE
  • AI Ethics 
  • When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy

    Publication Year: 2018, Page(s):18 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1668 KB) | HTML iconHTML

    The problem of algorithmic transparency is pressing. Predictive systems are transparent for consumers if they can ascertain the risks and benefits associated with the predictive systems to which they are subject. We examine three ways to meet this condition: disclosing source code, transparency without disclosing source code, and informational norms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethics and Privacy in AI and Big Data: Implementing Responsible Research and Innovation

    Publication Year: 2018, Page(s):26 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Emerging combinations of artificial intelligence, big data, and the applications these enable are receiving significant media and policy attention. Much of the attention concerns privacy and other ethical issues. In our article, we suggest that what is needed now is a way to comprehensively understand these issues and find mechanisms of addressing them that involve stakeholders, including civil so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Harm-Reduction Framework for Algorithmic Fairness

    Publication Year: 2018, Page(s):34 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2264 KB) | HTML iconHTML

    In this article, we recognize the profound effects that algorithmic decision-making can have on people's lives and propose a harm-reduction framework for algorithmic fairness. We argue that any evaluation of algorithmic fairness must consider a counterfactual analysis of the effects that algorithmic design, implementation, and use have on the well-being of individuals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enslaving the Algorithm: From a “Right to an Explanation” to a “Right to Better Decisions”?

    Publication Year: 2018, Page(s):46 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    As concerns about unfairness and discrimination in “black box” machine learning systems rise, a legal “right to an explanation” has emerged as a compellingly attractive approach for challenge and redress. We outline recent debates on the limited provisions in European data protection law, and introduce and analyze newer explanation rights in French administrative law and the draft modernized Counc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • IEEE Computer Society

    Publication Year: 2018, Page(s): 55
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • AI Ethics 
  • Proactively Protecting Against the Singularity: Ethical Decision Making in AI

    Publication Year: 2018, Page(s):56 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1621 KB) | HTML iconHTML

    This article proposes an ethical framework for the development and implementation of artificial intelligence that is based on philosophical principles and perspectives upholding human rights and well-being above potential superior machine intelligence referred to as the singularity. Illustrative cases demonstrate the framework's application and suggest guidelines for future policy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AI and the Ethics of Automating Consent

    Publication Year: 2018, Page(s):64 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1898 KB) | HTML iconHTML

    AI systems collect, process, and generate data in ways that further exacerbate many long-documented problems with online consent, most notably issues of providing adequate notice, choice, and withdrawal to users. The unpredictable and even unimaginable use of data by AI systems is considered a feature, not a bug. Yet this feature creates problems for notifying users as well as assessing when conse... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What Can Political Philosophy Teach Us about Algorithmic Fairness?

    Publication Year: 2018, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    What does it mean for an algorithmic decision-making system to be “fair” or “non-discriminatory” in terms that can be operationalized? Providing a rigorous understanding of these terms has long been a preoccupation of moral and political philosophers. This article draws on such work to elucidate emerging debates about fair algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Electronic Currency 
  • Toward Fairness of Cryptocurrency Payments

    Publication Year: 2018, Page(s):81 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (763 KB) | HTML iconHTML

    Motivated by the great success and adoption of Bitcoin, a number of cryptocurrencies such as Litecoin, Dogecoin, and Ethereum are becoming increasingly popular. Although existing blockchain-based cryptocurrency schemes can ensure reasonable security for transactions, they do not consider any notion of fairness. Fair exchange allows two players to exchange digital “items,” such as digital signature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resilient Security 
  • Making Multivariant Programming Practical and Inexpensive

    Publication Year: 2018, Page(s):90 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Since it was first proposed in 1978, n-version programming (NVP) has been a mainstay technique for obtaining fault tolerance in high-reliability software. Although subsequent research on NVP has indicated that coincident failures across different versions can be more common than initially expected, NVP remains the “gold standard” for application domains in which high reliability is of critical imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • House Advertisement 
  • Computing in Science & Engineering

    Publication Year: 2018, Page(s): 95
    Request permission for commercial reuse | PDF file iconPDF (5728 KB)
    Freely Available from IEEE
  • Education 
  • Scoping the Cyber Security Body of Knowledge

    Publication Year: 2018, Page(s):96 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    Cybersecurity is becoming an important element in curricula at all education levels. However, the foundational knowledge on which the field of cybersecurity is being developed is fragmented, and as a result, it can be difficult for both students and educators to map coherent paths of progression through the subject. The Cyber Security Body of Knowledge (CyBOK) project (www.cybok.org) aims to codif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems Attacks and Defenses 
  • Protecting against Ransomware: A New Line of Research or Restating Classic Ideas?

    Publication Year: 2018, Page(s):103 - 107
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1290 KB) | HTML iconHTML

    Ransomware is a type of extortion-based attack that locks the victim's digital resources and requests money to release them. The recent resurgence of high-profile ransomware attacks, particularly in critical sectors such as the healthcare industry, has highlighted the pressing need for effective defenses. While users are always advised to have a reliable backup strategy, the growing number of payi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Last Word 
  • Toward a National Cybersecurity Policy

    Publication Year: 2018, Page(s): 108
    Request permission for commercial reuse | PDF file iconPDF (422 KB) | HTML iconHTML
    Freely Available from IEEE
  • House Advertisement 
  • One membership. Unlimited knowledge.

    Publication Year: 2018, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • IEEE Security & Privacy

    Publication Year: 2018, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (790 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
David M. Nicol
University of Illinois at Urbana Champaign
dmnicol@illinois.edu