Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it? View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2017-12

AUTHORS

Brian L. Owsley

ABSTRACT

The world has become less secure and less private with the advent of technology. Law enforcement agencies, such as the FBI, have sophisticated technology that would amaze J. Edgar Hoover. In response to this increasing surveillance capabilities, telecommunications providers like Apple are seeking to keep pace with technological advances of their own to protect the personal privacy of their consumers and subscribers. In the background of this factual situation, the article explores the vagaries of security in our technological world in light of the dispute between the FBI and Apple regarding the iPhone at issue is the San Bernadino shooting. The current law poses challenges for both the FBI and telecommunications providers like Apple. Moreover, legislative solutions are also difficult to envision. Ultimately, the government should be cautious about preventing software manufacturers from seeking to create impenetrable operating systems. Indeed, the prevention of development of better software and operating systems comes at the expense of the loss of privacy in financial and health records. More... »

PAGES

369-376

Journal

TITLE

Health and Technology

ISSUE

4

VOLUME

7

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s12553-017-0192-4

DOI

http://dx.doi.org/10.1007/s12553-017-0192-4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1085909135


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Law", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/18", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Law and Legal Studies", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of North Texas at Dallas", 
          "id": "https://www.grid.ac/institutes/grid.462968.7", 
          "name": [
            "UNT Dallas College of Law, 1901 Main Street, 75201, Dallas, TX, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Owsley", 
        "givenName": "Brian L.", 
        "id": "sg:person.014002035106.54", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014002035106.54"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2017-12", 
    "datePublishedReg": "2017-12-01", 
    "description": "The world has become less secure and less private with the advent of technology. Law enforcement agencies, such as the FBI, have sophisticated technology that would amaze J. Edgar Hoover. In response to this increasing surveillance capabilities, telecommunications providers like Apple are seeking to keep pace with technological advances of their own to protect the personal privacy of their consumers and subscribers. In the background of this factual situation, the article explores the vagaries of security in our technological world in light of the dispute between the FBI and Apple regarding the iPhone at issue is the San Bernadino shooting. The current law poses challenges for both the FBI and telecommunications providers like Apple. Moreover, legislative solutions are also difficult to envision. Ultimately, the government should be cautious about preventing software manufacturers from seeking to create impenetrable operating systems. Indeed, the prevention of development of better software and operating systems comes at the expense of the loss of privacy in financial and health records.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s12553-017-0192-4", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1044824", 
        "issn": [
          "2190-7188", 
          "2190-7196"
        ], 
        "name": "Health and Technology", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "4", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "7"
      }
    ], 
    "name": "Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it?", 
    "pagination": "369-376", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "625eb23e4ae99717c406673086431ae992fc21ba9138f9022c09e5fb1fe0cc47"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s12553-017-0192-4"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1085909135"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s12553-017-0192-4", 
      "https://app.dimensions.ai/details/publication/pub.1085909135"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T09:32", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99806_00000004.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1007%2Fs12553-017-0192-4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s12553-017-0192-4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s12553-017-0192-4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s12553-017-0192-4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s12553-017-0192-4'


 

This table displays all metadata directly associated to this object as RDF triples.

61 TRIPLES      20 PREDICATES      27 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s12553-017-0192-4 schema:about anzsrc-for:18
2 anzsrc-for:1801
3 schema:author N0925509d1e63415e8c3834a86f577dc1
4 schema:datePublished 2017-12
5 schema:datePublishedReg 2017-12-01
6 schema:description The world has become less secure and less private with the advent of technology. Law enforcement agencies, such as the FBI, have sophisticated technology that would amaze J. Edgar Hoover. In response to this increasing surveillance capabilities, telecommunications providers like Apple are seeking to keep pace with technological advances of their own to protect the personal privacy of their consumers and subscribers. In the background of this factual situation, the article explores the vagaries of security in our technological world in light of the dispute between the FBI and Apple regarding the iPhone at issue is the San Bernadino shooting. The current law poses challenges for both the FBI and telecommunications providers like Apple. Moreover, legislative solutions are also difficult to envision. Ultimately, the government should be cautious about preventing software manufacturers from seeking to create impenetrable operating systems. Indeed, the prevention of development of better software and operating systems comes at the expense of the loss of privacy in financial and health records.
7 schema:genre research_article
8 schema:inLanguage en
9 schema:isAccessibleForFree true
10 schema:isPartOf N1025d54b8e714e2ebd6ec7f2b003247d
11 N84d0a0352aa74489ab0ab989a8d752c9
12 sg:journal.1044824
13 schema:name Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it?
14 schema:pagination 369-376
15 schema:productId N3fc1db71aecc48e381959ed312109b4d
16 Nc7003c0dd9764da587b327013f965448
17 Ndfe7802fdd484498afb4fd61881f8267
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085909135
19 https://doi.org/10.1007/s12553-017-0192-4
20 schema:sdDatePublished 2019-04-11T09:32
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher N51855248920a49b0b7a5db41451af959
23 schema:url https://link.springer.com/10.1007%2Fs12553-017-0192-4
24 sgo:license sg:explorer/license/
25 sgo:sdDataset articles
26 rdf:type schema:ScholarlyArticle
27 N0925509d1e63415e8c3834a86f577dc1 rdf:first sg:person.014002035106.54
28 rdf:rest rdf:nil
29 N1025d54b8e714e2ebd6ec7f2b003247d schema:issueNumber 4
30 rdf:type schema:PublicationIssue
31 N3fc1db71aecc48e381959ed312109b4d schema:name readcube_id
32 schema:value 625eb23e4ae99717c406673086431ae992fc21ba9138f9022c09e5fb1fe0cc47
33 rdf:type schema:PropertyValue
34 N51855248920a49b0b7a5db41451af959 schema:name Springer Nature - SN SciGraph project
35 rdf:type schema:Organization
36 N84d0a0352aa74489ab0ab989a8d752c9 schema:volumeNumber 7
37 rdf:type schema:PublicationVolume
38 Nc7003c0dd9764da587b327013f965448 schema:name doi
39 schema:value 10.1007/s12553-017-0192-4
40 rdf:type schema:PropertyValue
41 Ndfe7802fdd484498afb4fd61881f8267 schema:name dimensions_id
42 schema:value pub.1085909135
43 rdf:type schema:PropertyValue
44 anzsrc-for:18 schema:inDefinedTermSet anzsrc-for:
45 schema:name Law and Legal Studies
46 rdf:type schema:DefinedTerm
47 anzsrc-for:1801 schema:inDefinedTermSet anzsrc-for:
48 schema:name Law
49 rdf:type schema:DefinedTerm
50 sg:journal.1044824 schema:issn 2190-7188
51 2190-7196
52 schema:name Health and Technology
53 rdf:type schema:Periodical
54 sg:person.014002035106.54 schema:affiliation https://www.grid.ac/institutes/grid.462968.7
55 schema:familyName Owsley
56 schema:givenName Brian L.
57 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014002035106.54
58 rdf:type schema:Person
59 https://www.grid.ac/institutes/grid.462968.7 schema:alternateName University of North Texas at Dallas
60 schema:name UNT Dallas College of Law, 1901 Main Street, 75201, Dallas, TX, USA
61 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...