Guest editorial: research framework for AIS grand vision of the bright ICT initiative

The Internet has become a minefield of crime, fakes, and terror perpetuated by anonymous users on a global scale. The security burden of protecting organizations is becoming increasingly difficult and costly, and this burden cannot be lessened under the current Internet protocol. In order to fundamentally solve these side effects, the Council of the Association for Information Systems (AIS) has adopted a grand vision of an ICT-Enabled Bright Society (in short, the Bright ICT Initiative). With the goal of preventing undesirable activities on the Internet, diverse issues can be investigated using a bottom-up perspective. Scholars are beginning to examine the concept and various approaches with the support of the AIS conferences and the information system journals. However, a unique approach and fundamental solution must be identified in order to drastically eliminate the negative side effects of these adverse online activities. In order to achieve this, four principles are proposed that will provide the foundation of the framework for a new and safer Internet platform, the Bright Internet, while protecting users' privacy at an appropriate level. The proposed principles are origin responsibility, deliverer responsibility, rule-based digital search warrants, and traceable anonymity. This endeavor requires the investigation of technologies, policies, and international agreements on which new business models can be created.

[1]  Nicholas Hopper,et al.  Selectively Traceable Anonymity , 2006, Privacy Enhancing Technologies.

[2]  Saul Levmore,et al.  The Offensive Internet: Speech, Privacy, and Reputation , 2011 .

[3]  Shigeyuki Matsuda,et al.  Tracing Network Attacks to Their Sources , 2002, IEEE Internet Comput..

[4]  Chey Cobb Network Security For Dummies , 2002 .

[5]  David H. Reiley,et al.  The Economics of Spam , 2012 .

[6]  P. W. Singer,et al.  Cybersecurity and Cyberwar: What Everyone Needs to Know® , 2013 .

[7]  Robert O'Harrow,et al.  No place to hide , 1997, Science.

[8]  Terence Craig,et al.  Privacy and Big Data , 2011 .

[9]  Chae Sub Lee,et al.  Realization of the next-generation network , 2005, IEEE Communications Magazine.

[10]  Rik Farrow Interview with Stefan Savage: On the Spam Payment Trail , 2011, login Usenix Mag..

[11]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[12]  Adam Stotz,et al.  INformation fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking , 2007, 2007 10th International Conference on Information Fusion.

[13]  Wookeun Bae,et al.  A Comparative Study on the Waste Electrical and Electronic Equipment (WEEE) Recycling Policies of the European Union and the Republic of Korea , 2015 .

[14]  Christopher Krügel,et al.  A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.

[15]  S. Perren,et al.  Is Cyberbullying Worse than Traditional Bullying? Examining the Differential Roles of Medium, Publicity, and Anonymity for the Perceived Severity of Bullying , 2012, Journal of Youth and Adolescence.