99 resultados para Cyber-rencontre


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Content authenticity and correctness is one of the important challenges in eLearning as there can be many solutions to one specific problem in cyber space. Therefore, the authors feel it is necessary to map problems to solutions using graph partition and weighted bipartite matching. This article proposes an efficient algorithm to partition question-answer (QA) space and explores the best possible solution to a particular problem. The approach described can be efficiently applied to social eLearning space where there are one-to-many and many-to-many relationships with a level of bonding. The main advantage of this approach is that it uses QA ranking by adjusted edge weights provided by subject-matter experts or the authors' expert database.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nick Dyer-Witheford’s Cyber-Marx was published nearly 15 years ago, but there are continuing echoes of its dire promises today. The trends that Dyer-Witheford outlined—the growth of tech-giants in the communications field at the expense of democratic media practices and the radical shedding of jobs in the traditional mass media context—are confirmed by recent events. In November 2013, Twitter launched itself on the public share register, despite having no visible means of financial support, or even much of a business plan. The Twitter IPO tells us a lot about the economy of cyber-capitalism. Aligned to the trend of ‘technological unemployment’ is the rise of what some commentators call ‘digital serfdom’. This is not just growing unemployment, but also drastic under-employment of talented media professionals and an alarming rise in the number of media outlets that want to pay contributors in ‘exposure’, rather than in corporeal, fungible dollars and cents. This articlediscusses these trends and events in the context of the political economy of digital communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile money holds great financial inclusion promise, but also poses financial integrity challenges. The Financial Action Task Force (FATF)—the intergovernmental global anti-money laundering (AML) and counter-terrorist financing (CTF) standard-setting body—expressed support for financial inclusion and mobile money as a means to decrease the use of non-transparent cash in many developing countries. In February 2012, FATF adopted a new revised set of standards. This Article considers the impact of these new standards on mobile money models in developing countries. It highlights aspects of the new standards that would facilitate innovative mobile money models, but also points to questions and challenges. The new standards are generally more facilitative of new financial services models for the unbanked and underbanked, but a number of key questions and implementation challenges remain. These include mobile money-related privacy and cyber-crime concerns.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With increasing popularity and 1.9 billion cumulative registered accounts, virtual worlds are seeing an increase in a cybercrime named Virtual Property Theft. Currently, there is no data available on victim's perception of reasons for this theft. In this study, the authors aim to identify these reasons, and fill the need for a deeper understanding of VPT. This study used a survey including questions on virtual property ownership, theft, recovery and security. This survey is the first to report the views of victims of theft and remarkably showed although users are aware of offenders and have adequate security knowledge, 23% still become victims. This highlights that cyber criminals have found loopholes in existing security systems. Finally, given the continual growth of virtual worlds, it is essential to develop new policies and effective regulations. In this paper we will discuss the most critical survey results relating to security and provide statistical analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

  Children’s engagement with online technologies may seem second nature, yet the impact that the internet has on their lives is shaped by a powerful public policy agenda that largely overlooks children’s interests. Australia’s digital policy framework is dominated by discourses of safety and risk on the one hand and, on the other, neoliberal arguments about the possibilities for economic growth offered by e-commerce. In the midst of such powerful discourses it is difficult for children’s voices to be heard. This paper offers a close textual analysis of the Australian public policy context for regulating cyberspace. Finding a discursive duopoly that overlooks children’s interests, the author identifies two key features of a rights-based approach to challenge the dominant narratives currently serving the interests of the private sector and the State. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anomaly detection techniques are used to find the presence of anomalous activities in a network by comparing traffic data activities against a "normal" baseline. Although it has several advantages which include detection of "zero-day" attacks, the question surrounding absolute definition of systems deviations from its "normal" behaviour is important to reduce the number of false positives in the system. This study proposes a novel multi-agent network-based framework known as Statistical model for Correlation and Detection (SCoDe), an anomaly detection framework that looks for timecorrelated anomalies by leveraging statistical properties of a large network, monitoring the rate of events occurrence based on their intensity. SCoDe is an instantaneous learning-based anomaly detector, practically shifting away from the conventional technique of having a training phase prior to detection. It does acquire its training using the improved extension of Exponential Weighted Moving Average (EWMA) which is proposed in this study. SCoDe does not require any previous knowledge of the network traffic, or network administrators chosen reference window as normal but effectively builds upon the statistical properties from different attributes of the network traffic, to correlate undesirable deviations in order to identify abnormal patterns. The approach is generic as it can be easily modified to fit particular types of problems, with a predefined attribute, and it is highly robust because of the proposed statistical approach. The proposed framework was targeted to detect attacks that increase the number of activities on the network server, examples which include Distributed Denial of Service (DDoS) and, flood and flash-crowd events. This paper provides a mathematical foundation for SCoDe, describing the specific implementation and testing of the approach based on a network log file generated from the cyber range simulation experiment of the industrial partner of this project.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In modern computing paradigms, most computing systems, e.g., cluster computing, grid computing, cloud computing, the Internet, telecommunication networks, Cyber- Physical Systems (CPS), and Machine-to-Machine communication networks (M2M), are parallel and distributed systems. While providing improved expandability, manageability, efficiency, and reliability, parallel and distributed systems increase their security weaknesses to an unprecedented scale. As the system devices are widely connected, their vulnerabilities are shared by the entire system. Because tasks are allocated to, and information is exchanged among the system devices that may belong to different users, trust, security, and privacy issues have yet to be resolved. This special issue of the IEEE Transactions on Parallel and Distributed Systems (TPDS) highlights recent advances in trust, security, and privacy for emerging parallel and distributed systems. This special issue was initiated by Dr. Xu Li, Dr. Patrick McDaniel, Dr. Radha Poovendran, and Dr. Guojun Wang. Due to a large number of submissions, Dr. Zhenfu Cao, Dr. Keqiu Li, and Dr. Yang Xiang were later invited to the editorial team. Dr. Xu Li was responsible for coordinating the paper review process. In response to the call for papers, we received 150 effective submissions, out of which 24 are included in this special issue after rigorous review and careful revision, presenting an acceptance ratio of 16 percent. The accepted papers are divided into three groups, covering issues related to trust, security, and privacy, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks. The authentication service however could be slow or unavailable due to natural disasters or various cyber attacks on communication channels. This has raised serious concerns in systems which need robust authentication in emergency situations. The contribution of this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. Compared with another generic protocol in the literature, the new proposal provides the same function with significant improvements in computation and communication. Another authentication mechanism, which we name stand-alone authentication, can authenticate users when the connection to the central server is down. We investigate several issues in stand-alone authentication and show how to add it on multi-factor authentication protocols in an efficient and generic way.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it boasts up with a highly reliable and efficient environment through effective use of its information and communication technology (ICT). Generally, the control and operation of a smart grid which integrate the distributed energy resources (DERs) such as, wind power, solar power, energy storage, etc., largely depends on a complex network of computers, softwares, and communication infrastructure superimposed on its physical grid architecture facilitated with the deployment of intelligent decision support system applications. In recent years, multi-agent system (MAS) has been well investigated for wide area power system applications and specially gained a significant attention in smart grid protection and security due to its distributed characteristics. In this chapter, a MAS framework for smart grid protection relay coordination is proposed, which consists of a number of intelligent autonomous agents each of which are embedded with the protection relays. Each agent has its own thread of control that provides it with a capability to operate the circuit breakers (CBs) using the critical clearing time (CCT) information as well as communicate with each other through high speed communication network. Besides physical failure, since smart grid highly depends on communication infrastructure, it is vulnerable to several cyber threats on its information and communication channel. An attacker who has knowledge about a certain smart grid communication framework can easily compromise its appliances and components by corrupting the information which may destabilize a system results a widespread blackout. To mitigate such risk of cyber attacks, a few innovative counter measuring techniques are discussed in this chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The public intellectual, by their very definition, aims to reach a large sector of the public or publics. This requires proficiency, or at least the capacity to communicate in a variety of forms. As a large proportion of the public, to which the public intellectual appeals, is an online or cyber public, the importance of blogs in a computer-literate public cannot be under-estimated. The immediacy of the blog and the way in which an online presence facilitates immediate communication between the public and the public intellectual through the posting of comments online allow for a broad recognition of the intellectual in the public arena. My arguments will hinge on my interviews with contemporary American public intellectuals (Noam Chomsky, Howard Zinn, Todd Gitlin, Camille Paglia and Stephen Greenblatt) and their views on communication in a society experiencing a decline in the publication of print media.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

© 2015, IGI Global. The chapter investigates the security and ethical issues relating to privacy and security. This chapter also examines the ethical issues of new forms of bullying that are being played out weekly in the media: cyber bulling, specifically on SNS such as Facebook. The traditional and direct forms of bullying are being replaced by consistent abuse via SNS due to the ease and accessibility of these new forms of communications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the development of the cyber-physical systems (CPS), the security analysis of the data therein becomes more and more important. Recently, due to the advantage of joint encryption and compression for data transmission in CPS, the emerging compressed sensing (CS)-based cryptosystem has attracted much attention, where security is of extreme importance. The existing methods only analyze the security of the plaintext under the assumption that the key is absolutely safe. However, for sparse plaintext, the prior sparsity knowledge of the plaintext could be exploited to partly retrieve the key, and then the plaintext, from the ciphertext. So, the existing methods do not provide a satisfactory security analysis. In this paper, it is conducted in the information theory frame, where the plaintext sparsity feature and the mutual information of the ciphertext, key, and plaintext are involved. In addition, the perfect secrecy criteria (Shannon-sense and Wyner-sense) are extended to measure the security. While the security level is given, the illegal access risk is also discussed. It is shown that the CS-based cryptosystem achieves the extended Wyner-sense perfect secrecy, but when the key is used repeatedly, both the plaintext and the key could be conditionally accessed.