382 resultados para Cyber


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Der Schwedische Kampfjet Gripen wurde von der Stimmbevölkerung gegroundet. - Die Armeefinanzierung geriet erneut ins Fadenkreuz der Bundesversammlung. - Die Weiterentwicklung der Armee geriet kurzzeitig ins Stocken und wurde inhaltlich nicht voran gebracht. - Der Zivildienst wurde nicht als Konkurrenzorganisation zur Armee angesehen. - Zum Schutz vor Cyber-Risiken wurden neue Wege beschritten. - Das revidierte Bevölkerungs- und Zivilschutzgesetz wurde per 2015 in Kraft gesetzt.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La cybersécurité représente un enjeu important pour les services en charge de la sécurité canadienne à l’ère de l’expansion des Menaces Persistantes Avancées (MSP ou cybercrimes de type 1). Ces crimes se déroulent essentiellement dans le cyberespace, ce qui implique l’adoption de mesures spécifiques adéquates à l’environnement numérique, notamment à l’épreuve de son ubiquité. Le gouvernement canadien a pour sa part publié certaines mesures de défense passive et active dont la plus connue est la stratégie canadienne de cybersécurité. Puisque le cyberespace n’est pas limité territorialement, l’autorité canadienne a conclu plusieurs partenariats internationaux d’où ressortent des mesures bilatérales et multilatérales de protection et de renforcement de la cybersécurité. Toutefois, ces diverses mesures nationales et internationales ne tracent pas de cadre légal précisant la nature et le régime juridique des MSP; précisions sans lesquelles l’adoption de règles au plan national serait improductive. Considérant que l’espace numérique est international, il appelle la mise en place de mesures applicables à l’échelle universelle. Or, au plan international, il n’existe aucun texte à valeur légale spécifique à l’espèce. Ainsi, à la question de savoir, quels textes légaux pourraient s’appliquer, il s’est avéré que le jus ad bellum et la Convention européenne contre le cybercrime (Convention de Budapest) apportaient d’incontournables éléments de réponse. D’une part, le jus ad bellum permet de définir la catégorie d’acte dans laquelle peuvent être rangées les MSP, et d’autre part, la Convention de Budapest permet de définir les infractions informatiques commises par les différents acteurs en cause, les procédures d’investigation appropriées et les mécanismes utiles à la coopération internationale. Bien que les éléments ressortis de ces ententes internationales soient utiles à l’adoption d’un corps de règles internationales uniformes, les intérêts étatiques divergents constituent des obstacles de taille.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of 3D visualisation of digital information is a recent phenomenon. It relies on users understanding 3D perspectival spaces. Questions about the universal access of such spaces has been debated since its inception in the European Renaissance. Perspective has since become a strong cultural influence in Western visual communication. Perspective imaging assists the process of experimenting by the sketching or modelling of ideas. In particular, the recent 3D modelling of an essentially non-dimensional Cyber-space raises questions of how we think about information in general. While alternate methods clearly exist they are rarely explored within the 3D paradigm (such as Chinese isometry). This paper seeks to generate further discussion on the historical background of perspective and its role in underpinning this emergent field. © 2005 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este estudo tem como objetivo a comprovação da existência de interferência dos formadores de opinião na comunicação da marca com seus consumidores (formadores de opinião, aqui neste estudo, entendemos como pessoas que geram influência em grupos de pessoas que debatem um determinado assunto). Mapeamos o impacto desta interferência supra citada e encontramos cinco grandes eventos significativos dos reflexos na marca. O quadro teórico de referência é formado por autores contemporâneos, e baseia-se na perspectiva do estudo da comunicação mercadológica, cibercultura, micropoder, maquinodependência e psicotecnologia. A forma de comprovação do estudo foi composta de metodologias que compreende estudo historiográfico, estudo de caso e grupos focais. (vem antes da metodologia). Alcançamos os objetivos iniciais e comprovamos a existência da interferência do formador de opinião na comunicação da marca com seus consumidores.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O desenvolvimento das novas tecnologias de comunicação e informação não representa apenas uma nova forma de transmitir conteúdos informacionais às pessoas. Ao se refletir nas novas possibilidades de atuação à distância, permitida pela mídia interativa on-line, percebese uma mudança significativa na postura comportamental das pessoas em suas interações nas relações sociais básicas. Há uma transformação ocorrendo no conceito de comunidade, visto que as novas e emergentes formas de comunicação, próprias do atual cenário tecnológico, passam a coabitar com as formas tradicionais de comunidade. Esta metamorfose seria produto de uma tentativa de agregação das práticas sociais realizadas nas comunidades reais dentro de um espaço virtual. Surgem assim as chamadas comunidades virtuais, que carregam consigo uma nova dinâmica de atuação a distância disjunta de contextos sociais imediatos. Através da metodologia de estudo de caso, buscou-se conhecer como as coabitações de formas tradicionais e emergent es de comunidades estão convivendo e interagindo. Além disso, procurou-se conhecer quais são os resultados obtidos das trocas informacionais e relacionais ocorridas no ciberespaço. A investigação se deu a partir do estudo de caso de um site da Igreja Adventista do Sétimo Dia, no qual foram utilizadas entrevistas, observação direta e observação participativa como fontes de evidência. Os resultados obtidos da investigação sugerem que o indivíduo corpóreo deseja viver dentro de uma nova ambiência regida pela fluidez digital, pois esta se apresenta como um meio no qual as trocas informacionais se dão de forma efetiva e responsiva, ao mesmo tempo em que relacionamentos sociais podem ser engendrados, confirmados e mantidos.(AU)

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este estudo propõe uma reflexão sobre o tratamento dado ao imaginário do herói nas campanhas da organização não governamental Greenpeace, em seu site. O corpus de análise foi composto pelos editoriais elaborados para divulgar cada uma de suas frentes de ação: Amazônia, Clima e Energia, Nuclear, Oceano e Transgênicos. Foram ao total cinco editoriais, coletados no dia 18 de abril de 2010. No contexto social, esta ONG está inserida num conflito entre a preservação dos recursos naturais e desenvolvimento industrial e econômico. Além disso, considera-se também a mudança nos paradigmas e valores das relações sociais determinada pelo avanço tecnológico e o consequente surgimento do ciberespaço. O objetivo, portanto, é buscar entender como a relação das ações do Greenpeace com o imaginário do herói beneficia a adesão ao ciberativismo. Para isso usamos a Análise do Discurso da linha francesa como eixo teórico-metodológico, tendo como principais pensadores Patrick Charaudeau e Dominique Maingueneau, cujas ideias ajudaram a examinar a maneira como a linguagem é empregada nesses editoriais, estudando o seu contexto, resultando num discurso ideológico impregnado pelo imaginário do herói. Concluiu-se, que as técnicas discursivas utilizadas nos editoriais auxiliaram na criação do ethos do herói, do bandido e da vítima e que esses elementos valorizam as ações dos Greenpeace elevando a um patamar heróico.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Very little empirical work exists on cyberstalking. The current study analysed detailed questionnaires completed by 1051 self-defined stalking victims. Almost half (47.5%) reported harassment via the Internet, but only 7.2% of the sample was judged to have been cyberstalked. Ordinal regression analyses of four groups of victims, categorized according to degree of cyber involvement in their victimization, revealed a general picture of similarity between the groups in terms of the stalking process, responses to being stalked, and the effects on victims and third parties. It was concluded that cyberstalking does not fundamentally differ from traditional, proximal stalking, that online harassment does not necessarily hold broad appeal to stalkers, and that those who target ex-intimates remain the most populous stalker type.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Much research pursues machine intelligence through better representation of semantics. What is semantics? People in different areas view semantics from different facets although it accompanies interaction through civilization. Some researchers believe that humans have some innate structure in mind for processing semantics. Then, what the structure is like? Some argue that humans evolve a structure for processing semantics through constant learning. Then, how the process is like? Humans have invented various symbol systems to represent semantics. Can semantics be accurately represented? Turing machines are good at processing symbols according to algorithms designed by humans, but they are limited in ability to process semantics and to do active interaction. Super computers and high-speed networks do not help solve this issue as they do not have any semantic worldview and cannot reflect themselves. Can future cyber-society have some semantic images that enable machines and individuals (humans and agents) to reflect themselves and interact with each other with knowing social situation through time? This paper concerns these issues in the context of studying an interactive semantics for the future cyber-society. It firstly distinguishes social semantics from natural semantics, and then explores the interactive semantics in the category of social semantics. Interactive semantics consists of an interactive system and its semantic image, which co-evolve and influence each other. The semantic worldview and interactive semantic base are proposed as the semantic basis of interaction. The process of building and explaining semantic image can be based on an evolving structure incorporating adaptive multi-dimensional classification space and self-organized semantic link network. A semantic lens is proposed to enhance the potential of the structure and help individuals build and retrieve semantic images from different facets, abstraction levels and scales through time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even simple hybrid systems like the classic bouncing ball can exhibit Zeno behaviors. The existence of this type of behavior has so far forced simulators to either ignore some events or risk looping indefinitely. This in turn forces modelers to either insert ad hoc restrictions to circumvent Zeno behavior or to abandon hybrid modeling. To address this problem, we take a fresh look at event detection and localization. A key insight that emerges from this investigation is that an enclosure for a given time interval can be valid independently of the occurrence of a given event. Such an event can then even occur an unbounded number of times, thus making it possible to handle certain types of Zeno behavior.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resource Space Model is a kind of data model which can effectively and flexibly manage the digital resources in cyber-physical system from multidimensional and hierarchical perspectives. This paper focuses on constructing resource space automatically. We propose a framework that organizes a set of digital resources according to different semantic dimensions combining human background knowledge in WordNet and Wikipedia. The construction process includes four steps: extracting candidate keywords, building semantic graphs, detecting semantic communities and generating resource space. An unsupervised statistical language topic model (i.e., Latent Dirichlet Allocation) is applied to extract candidate keywords of the facets. To better interpret meanings of the facets found by LDA, we map the keywords to Wikipedia concepts, calculate word relatedness using WordNet's noun synsets and construct corresponding semantic graphs. Moreover, semantic communities are identified by GN algorithm. After extracting candidate axes based on Wikipedia concept hierarchy, the final axes of resource space are sorted and picked out through three different ranking strategies. The experimental results demonstrate that the proposed framework can organize resources automatically and effectively.©2013 Published by Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

People manage a spectrum of identities in cyber domains. Profiling individuals and assigning them to distinct groups or classes have potential applications in targeted services, online fraud detection, extensive social sorting, and cyber-security. This paper presents the Uncertainty of Identity Toolset, a framework for the identification and profiling of users from their social media accounts and e-mail addresses. More specifically, in this paper we discuss the design and implementation of two tools of the framework. The Twitter Geographic Profiler tool builds a map of the ethno-cultural communities of a person's friends on Twitter social media service. The E-mail Address Profiler tool identifies the probable identities of individuals from their e-mail addresses and maps their geographical distribution across the UK. To this end, this paper presents a framework for profiling the digital traces of individuals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The arrival of Cuba’s Information Technology (IT) and Communications Minister Ramiro Valdés to Venezuela in the Spring of 2010 to serve as a ‘consultant’ to the Venezuelan government awakened a new reality in that country. Rampant with deep economic troubles, escalating crime, a murder rate that has doubled since Chávez took over in 1999, and an opposition movement led by university students and other activists who use the Internet as their primary weapon, Venezuela has resorted to Cuba for help. In a country where in large part traditional media outlets have been censored or are government-controlled, the Internet and its online social networks have become the place to obtain, as well as disseminate, unfiltered information. As such, Internet growth and use of its social networks has skyrocketed in Venezuela, making it one of Latin America’s highest Web users. Because of its increased use to spark political debate among Venezuelans and publish information that differs with the official government line, Chávez has embarked on an initiative to bring the Internet to the poor and others who would otherwise not have access, by establishing government-sponsored Internet Info Centers throughout the country, to disseminate information to his followers. With the help of Cuban advisors, who for years have been a part of Venezuela’s defense, education, and health care initiatives, Chávez has apparently taken to adapting Cuba’s methodology for the control of information. He has begun to take special steps toward also controlling the type of information flowing through the country’s online social networks, considering the implementation of a government-controlled single Internet access point in Venezuela. Simultaneously, in adapting to Venezuela’s Internet reality, Chávez has engaged online by creating his own Twitter account in an attempt to influence public opinion, primarily of those who browse the Web. With a rapidly growing following that may soon reach one million subscribers, Chávez claims to have set up his own online trench to wage cyber space battle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

E-commerce is an approach to achieving business goals through information technology and is quickly changing the way hospitality business is planned, monitored, and conducted. No longer do buyers and sellers need to engage in interpersonal communications for transactions to occur. The future of transaction processing, which includes cyber cash and digital checking, are directly attributable to e-commerce which provides and efficient, reliable, secure, and effective platform for conducting hospitality business on the web.