26 resultados para Usable privacy and security

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes an online survey that was conducted to explore typical Internet users' awareness and knowledge of specific technologies that relate to their security and privacy when using a Web browser to access the Internet. The survey was conducted using an anonymous, online questionnaire. Over a four month period, 237 individuals completed the questionnaire. Respondents were predominately Canadian, with substantial numbers from the United Kingdom and the United States. Important findings include evidence that users have tried to educate themselves regarding their online security and privacy, but with limited success; different interpretations of the term "secure Web site" can lead to very different levels of trust in a site; respondents strongly expressed their skepticism about privacy policies, but nevertheless believe that sites can be trusted to respect their stated policies; and users may confuse browser cookies with other types of data stored locally by browsers, leading to inappropriate conclusions about the risks they present.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Only recently the Sino-Taiwanese issue has again been in the headlines of the international media. On Saturday, 3 August 2002, Taiwan's President Chen Shui-bian insisted in a passionate speech that there is 'one country on each side' of the Taiwan Strait. He went even further by calling for new legislation that would allow a referendum to be held on changing the island's current international status, saying that this would be a 'basic human right'. Chen's remarks resulted in a furious response from the mainland. Although the conflict between Beijing and Taipei can be interpreted as a legacy of the Chinese Civil War, the tensions intensified during the 1990s. The following article suggests that the linkages and dynamics between the globalization process and international security are increasingly important for a better understanding of the development of relations at the international level in general and in the China-Taiwan conflict in particular.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper looks at the issue of privacy and anonymity through the prism of Scott's concept of legibility i.e. the desire of the state to obtain an ever more accurate mapping of its domain and the actors in its domain. We argue that privacy was absent in village life in the past, and it has arisen as a temporary phenomenon arising from the lack of appropriate technology to make all life in the city legible. Cities have been the loci of creativity for the major part of human civilisation. There is something specific about the illegibility of cities which facilitates creativity and innovation. By providing the technology to catalogue and classify all objects and ideas around us, this leads to a consideration of semantic web technologies, Linked Data and the Internet of Things as unwittingly furthering this ever greater legibility. There is a danger that the over description of a domain will lead to a loss in creativity and innovation. We conclude by arguing that our prime concern must be to preserve illegibility because the survival of some form, any form, of civilisation depends upon it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this special issue is to widen the existing debates on security privatization by looking at how and why an increasing number of private actors beyond private military and/or security companies (PMSCs) have come to perform various security related functions. While PMSCs produce security for profit, most other private sector actors make profit by selling goods and services that were originally not connected with security in the traditional understanding of the term. However, due to the continuous introduction of new legal and technical regulations by public authorities, many non- security related private businesses nowadays have to perform at least some security functions. Little research, however, has been done thus far, both in terms of security practices of non- security related private businesses and their impact on security governance. This introduction explains how this special issue contributes to closing this glaring gap by 1) extending the conceptual and theoretical arguments in the existing body of literature; and 2) offering a range of original case studies on the specific roles of non- security related private companies of all sizes, areas of businesses, and geographic origin.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis addresses the problem of information hiding in low dimensional digital data focussing on issues of privacy and security in Electronic Patient Health Records (EPHRs). The thesis proposes a new security protocol based on data hiding techniques for EPHRs. This thesis contends that embedding of sensitive patient information inside the EPHR is the most appropriate solution currently available to resolve the issues of security in EPHRs. Watermarking techniques are applied to one-dimensional time series data such as the electroencephalogram (EEG) to show that they add a level of confidence (in terms of privacy and security) in an individual’s diverse bio-profile (the digital fingerprint of an individual’s medical history), ensure belief that the data being analysed does indeed belong to the correct person, and also that it is not being accessed by unauthorised personnel. Embedding information inside single channel biomedical time series data is more difficult than the standard application for images due to the reduced redundancy. A data hiding approach which has an in built capability to protect against illegal data snooping is developed. The capability of this secure method is enhanced by embedding not just a single message but multiple messages into an example one-dimensional EEG signal. Embedding multiple messages of similar characteristics, for example identities of clinicians accessing the medical record helps in creating a log of access while embedding multiple messages of dissimilar characteristics into an EPHR enhances confidence in the use of the EPHR. The novel method of embedding multiple messages of both similar and dissimilar characteristics into a single channel EEG demonstrated in this thesis shows how this embedding of data boosts the implementation and use of the EPHR securely.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

New media platforms have changed the media landscape forever, as they have altered our perceptions of the limits of communication, and reception of information. Platforms such as Facebook, Twitter and WhatsApp enable individuals to circumvent the traditional mass media, converging audience and producer to create millions of ‘citizen journalists’. This new breed of journalist uses these platforms as a way of, not only receiving news, but of instantaneously, and often spontaneously, expressing opinions and venting and sharing emotions, thoughts and feelings. They are liberated from cultural and physical restraints, such as time, space and location, and they are not constrained by factors that impact upon the traditional media, such as editorial control, owner or political bias or the pressures of generating commercial revenue. A consequence of the way in which these platforms have become ingrained within our social culture is that habits, conventions and social norms, that were once informal and transitory manifestations of social life, are now infused within their use. What were casual and ephemeral actions and/or acts of expression, such as conversing with friends or colleagues or swapping/displaying pictures, or exchanging thoughts that were once kept private, or maybe shared with a select few, have now become formalised and potentially permanent, on view for the world to see. Incidentally, ‘traditional’ journalists and media outlets are also utilising new media, as it allows them to react, and disseminate news, instantaneously, within a hyper-competitive marketplace. However, in a world where we are saturated, not only by citizen journalists, but by traditional media outlets, offering access to news and opinion twenty-four hours a day, via multiple new media platforms, there is increased pressure to ‘break’ news fast and first. This paper will argue that new media, and the culture and environment it has created, for citizen journalists, traditional journalists and the media generally, has altered our perceptions of the limits and boundaries of freedom of expression dramatically, and that the corollary to this seismic shift is the impact on the notion of privacy and private life. Consequently, this paper will examine what a reasonable expectation of privacy may now mean, in a new media world.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper, drawing on our own research findings data, explores the embodiment and embedment of sleeping in children's everyday/night lives. Key themes here include children's attitudes and feelings toward the dormant body, the processes, routines and rituals associated with going to bed and going to sleep, issues associated with bedrooms and privacy, and finally the relationship between dormancy and domicile. This in turn provides the basis, in the remainder of the paper, for a further series of reflections on the mutually informing relations between the sociology of sleep and the sociology of childhood. Remaining questions and challenges involved in researching children's sleep are also considered. Sleep, it is concluded, is not simply a rich and fascinating sociological topic in its own right it also has the potential to shed valuable new light on a significant yet hitherto under-researched part of children's lives, contributing important new insights in doing so.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Why is the public presentation of the war on terror suffused with sexualised racism? What does this tell us about ideas of gender, sexuality, religious and political identity and the role of the state in the Western powers? Can we diffuse inter-ethnic conflicts and change the way the West pursues its security agenda by understanding the role of sexualised racism in the war on terror? In asking such questions, Gargi Bhattacharyya considers how the concepts of imperialism, feminism, terror and security can be applied, in order to build on the influential debates about the sexualised character of colonialism. She examines the way in which western imperial violence has been associated with the rhetoric of rights and democracy - a project of bombing for freedom that has called into question the validity of western conceptions of democracy, rights and feminism. Such rhetoric has given rise to actions that go beyond simply protecting western interests or securing access to scarce resources and appear to be beyond instrumental reason. The articulations of racism that appear with the war on terror are animated by fears and sexual fantasies inexplicable by rational interest alone. There can be no resolution to this seemingly endless conflict without understanding the highly sexualised racism that animates it. Such an understanding threatens to pierce the heart of imperial relations, revealing their intense contradictions and uncovering attempts to normalise violent expropriation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the profitability that the widely published momentum strategy achieves following bull and bear markets. Investors can gain stronger momentum profits by adopting the continuation strategy after poor lagged market returns. The longer the duration used to describe the bear state, the stronger the momentum returns that are realised. The results contradict the theoretical findings of the investors' overconfidence model of Daniel et al. (`Investor Psychology and Security Market Under- and Over-Reactions', Journal of Finance, 53, 1839-85, 1998) and the follow-the-trend model of Kim (`Long-term Momentum Hypothesis: Contrarian and Momentum Strategies', Working Paper, 2002), but concur with the theoretical results of the traders' hesitation model of Du (`Heterogeneity in Investor Confidence and Asset Market Under- and Overreaction', Working Paper, 2002).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dementia is one of the greatest contemporary health and social care challenges, and novel approaches to the care of its sufferers are needed. New information and communication technologies (ICT) have the potential to assist those caring for people with dementia, through access to networked information and support, tracking and surveillance. This article reports the views about such new technologies of 34 carers of people with dementia. We also held a group discussion with nine carers for respondent validation. The carers' actual use of new ICT was limited, although they thought a gradual increase in the use of networked technology in dementia care was inevitable but would bypass some carers who saw themselves as too old. Carers expressed a general enthusiasm for the benefits of ICT, but usually not for themselves, and they identified several key challenges including: establishing an appropriate balance between, on the one hand, privacy and autonomy and, on the other: maximising safety; establishing responsibility for and ownership of the equipment and who bears the costs; the possibility that technological help would mean a loss of valued personal contact; and the possibility that technology would substitute for existing services rather than be complementary. For carers and dementia sufferers to be supported, the expanding use of these technologies should be accompanied by intensive debate of the associated issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is growing interest in the role of corporate governance systems within the strategy-making process of firms. Using a 'strategy as practice' perspective, we conceptualize the governance system as a contested space in which management and security analysts mutually adapt/transform and enact corporate strategies vis-à-vis argumentation. Synthesizing this micropractice perspective within corporate governance research, the supple role of securities analysts' arguments in shaping corporate strategies assumes a new significance. It also provides a basis for observing and understanding the contested nature of the retail internationalization process. The implications and opportunities for management studies and economic geography are considered. © The Author (2007). Published by Oxford Press. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Combined Heat and Power (CHP) is the simultaneous generation of usable heat and power in a single process. Despite its obvious advantages in terms of increased efficiency when compared to a single heat or power generation unit, there are a number of technical and economic reasons that have limited their selection. Biomass resources can be, and actually are used as fuel in CHP installations; however several hurdles have to be sorted beforehand, among the most important is the fact that biomass energy sources are not as energy intense as conventional CHP fuels. The ultimate outcome is a limited number of CHP units making use of biomass as fuel. Even fewer CHP units use bioliquids (e.g.: fast pyrolysis biomass liquids, biodiesel and vegetable oil). The Bioliquid-CHP project is carried out by a consortium of seven European and Russian complementary partners, funded by the EU and by the Federal Agency for Science and Innovation of the Russian Federation. The project aim is to develop microturbine and internal combustion engine adaptations in order to adjust these prime movers to bioliquids for CHP applications. This paper will show a summary of the current biomass CHP installations in the UK and the Netherlands, making reference to number of units, capacity, fuel used, the conversion technology involved and the preferred prime movers. The information will give an insight of the current market, with probable future trends and areas where growth could be expected. A similar paper describing the biomass CHP situation in Italy and Russia will be prepared in the near future.