7 resultados para sicurezza IoT internet of things privacy etica
em Digital Commons at Florida International University
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. ^ This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.^
Resumo:
Should the radical Left interpret the Nolans' Interstellar as a tribute to (neo)liberal expansionism or should we view it as a cautionary tale about a future that is just around the corner, which won't be solved by worm holes or time travel? This review takes the latter position against the recent Jacobin review, which argues the former. Here, I show that Interstellar can be productively reinterpreted as a film about a series of things that will NOT save us from our-late-capitalist-selves.
Resumo:
In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.
Resumo:
This thesis explores the role of public space as an integral part of residential design to promote a sense of community, where neighbors can congregate and children can play in safety. ^ Through research and analysis of successful public spaces, I evaluated relationships between dwellings and public spaces that offer progressive levels of privacy, and between indoor and outdoor spaces. Further research of published studies on child development, human behavior and relationships with nature identified a human preference for natural environments, a need for adequate recreation space for children's development and the potential of open spaces to build a strong sense of community. ^ My project develops multiple transitional spaces between the street and the interior of dwellings that provide varying degrees of privacy closely related to the community's green spaces. The result is a community-oriented pedestrian environment that encourages family and community values and contributes to the healthy living of its residents without depriving them of their privacy. ^
Resumo:
During the last decade, the meetings and expositions industry has flourished, even as it has struggled to cope with difficult challenges. This is a taste of things to me. In the years ahead, the global population will continue to grow and change, science and technology will tighten their hold on business and society and the world will knit itself ever more tightly into a single market. As a result, both opportunities and trials will abound.
Resumo:
LOVE COMES IN AT THE EYE relates the story of Marshall Craig, a Midwesterner transplanted to South Florida who turns 35 in the course of the book. Marshall is an assistant curator for a Miami art museum, a man who has been obsessed with--as he calls it--a greed for seeing from a young age. His fascination with the surface of appearance of things is exacerbated by his precocious studies in art and its histories. Marshall views himself as marked by his red hair and freckled skin, as someone whose chances of attracting a partner into a meaningful relationship have been diminished by his looks. He is colored by his image of himself as unattractive and most importantly, convinced that his romantic life would be more successful, more vibrant, if he'd been graced with the face and figure of, say, a Velazquez. When Marshall meets a Cuban-born man from Atlanta, he is transfixed by the conviction that this is the man the universe has selected for him. The thrust of the story goes beyond boy-meets/loses/gets-boy to an exploration of said boy coming to terms with his definition of self. In a pivotal span of six months, the book explores Marshall's obsessions with seeing and how they define his vision of reality, the emphasis placed on beauty in gay culture, the tentative beginnings of a relationship as it takes root and grows, and finally, the inexplicable, magical forces that direct our romantic destinies.
Resumo:
The purpose of this dissertation was to investigate cross-cultural differences in the use of the Internet. Hofstede's model of national culture was employed as the theoretical foundation for the analysis of cross-cultural differences. Davis's technology acceptance model was employed as the theoretical foundation for the analysis of Internet use. ^ Secondary data from an on-line survey of Internet users in 22 countries conducted in April 1997 by the Georgia Tech Research Corporation measured the dependent variables of Internet use and the independent variables of attitudes toward technology. Hofstede's stream of research measured the independent variables of the five dimensions of national culture. ^ Contrary to expectations, regression analyses at the country level of analysis did not detect cultural differences. As expected, regression analyses at the individual level of analysis did detect cultural differences. The results indicated that perceived usefulness was related to the frequency of Internet shopping in the Germanic and Anglo clusters, where masculinity was high. Perceived ease of use was related to the frequency of Internet shopping in the Latin cluster, where uncertainty avoidance was high. Neither perceived usefulness nor perceived ease of use was related to the frequency of Internet shopping in the Nordic cluster, where masculinity and uncertainty avoidance were low. ^ As expected, analysis of variance at the cluster level of analysis indicated that censorship was a greater concern in Germany and Anglo countries, where masculinity was high. Government regulation of the Internet was less preferred in Germany, where power distance was low. Contrary to expectations, concern for transaction security. was lower in the Latin cluster, where uncertainty avoidance was high. Concern for privacy issues was lower in the U.S., where individualism was high. ^ In conclusion, results suggested that Internet users represented a multicultural community, not a standardized virtual community. Based on the findings, specific guidance was provided on how international managers and marketers could develop culturally sensitive strategies for training and promoting Internet services. ^