Proceedings of the 2017 on Workshop on Privacy in the Electronic Society 2017
DOI: 10.1145/3139550.3139565
|View full text |Cite
|
Sign up to set email alerts
|

Public Accountability vs. Secret Laws: Can They Coexist?

Abstract: "Our Laws are not generally known; they are kept secret by the small group of nobles who rule us. We are convinced that these ancient laws are scrupulously administered; nevertheless it is an extremely painful thing to be ruled by laws that one does not know. "-Franz Kafka, Parables and Paradoxes. Post 9/11, journalists, scholars and activists have pointed out that secret laws-a body of law whose details and sometime mere existence is classified as top secret-were on the rise in all three branches of the US go… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…On the other hand, the interpretative turn in anthropology, particularly from a feminist orientation, turned the spyglass around to interrogate the researcher and the powers she serves (Behar, 1995), and the powerful, e.g. “studying up” (Gusterson, 1997; Nader, 1972). Barabas et al (2020) recommend that if data scientists also seek to lend their talent and skills to the social good, then powerful actors and the field's culture must come under scrutiny.…”
Section: Feminist Methodologymentioning
confidence: 99%
“…On the other hand, the interpretative turn in anthropology, particularly from a feminist orientation, turned the spyglass around to interrogate the researcher and the powers she serves (Behar, 1995), and the powerful, e.g. “studying up” (Gusterson, 1997; Nader, 1972). Barabas et al (2020) recommend that if data scientists also seek to lend their talent and skills to the social good, then powerful actors and the field's culture must come under scrutiny.…”
Section: Feminist Methodologymentioning
confidence: 99%
“…Hardware that supports trusted execution environments and cryptographic tools that can be used to verify computations [51] can be applied to verify the execution of the assurance software can be applied in cases where the threat model requires it and to permit public verifiability. For example, methods of providing the public with cryptographic proofs that certain processes have followed have been proposed, based on zero-knowledge proofs and secure multiparty computation [26,24]. Although the outputs of these systems can be verified, their inputs cannot.…”
Section: Compliance Based Auditingmentioning
confidence: 99%
“…Goldwasser et al [26] describe a cryptographic system for allowing accountability of secret laws related to the Foreign Intelligence Surveillance Act (FISA). Their solution uses zero-knowledge proofs to provide public auditing of (secret) data collection and surveillance procedures.…”
Section: Related Workmentioning
confidence: 99%