684 resultados para Cyber-rencontre
Resumo:
The arrival of Cuba’s Information Technology (IT) and Communications Minister Ramiro Valdés to Venezuela in the Spring of 2010 to serve as a ‘consultant’ to the Venezuelan government awakened a new reality in that country. Rampant with deep economic troubles, escalating crime, a murder rate that has doubled since Chávez took over in 1999, and an opposition movement led by university students and other activists who use the Internet as their primary weapon, Venezuela has resorted to Cuba for help. In a country where in large part traditional media outlets have been censored or are government-controlled, the Internet and its online social networks have become the place to obtain, as well as disseminate, unfiltered information. As such, Internet growth and use of its social networks has skyrocketed in Venezuela, making it one of Latin America’s highest Web users. Because of its increased use to spark political debate among Venezuelans and publish information that differs with the official government line, Chávez has embarked on an initiative to bring the Internet to the poor and others who would otherwise not have access, by establishing government-sponsored Internet Info Centers throughout the country, to disseminate information to his followers. With the help of Cuban advisors, who for years have been a part of Venezuela’s defense, education, and health care initiatives, Chávez has apparently taken to adapting Cuba’s methodology for the control of information. He has begun to take special steps toward also controlling the type of information flowing through the country’s online social networks, considering the implementation of a government-controlled single Internet access point in Venezuela. Simultaneously, in adapting to Venezuela’s Internet reality, Chávez has engaged online by creating his own Twitter account in an attempt to influence public opinion, primarily of those who browse the Web. With a rapidly growing following that may soon reach one million subscribers, Chávez claims to have set up his own online trench to wage cyber space battle.
Resumo:
E-commerce is an approach to achieving business goals through information technology and is quickly changing the way hospitality business is planned, monitored, and conducted. No longer do buyers and sellers need to engage in interpersonal communications for transactions to occur. The future of transaction processing, which includes cyber cash and digital checking, are directly attributable to e-commerce which provides and efficient, reliable, secure, and effective platform for conducting hospitality business on the web.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
The future power grid will effectively utilize renewable energy resources and distributed generation to respond to energy demand while incorporating information technology and communication infrastructure for their optimum operation. This dissertation contributes to the development of real-time techniques, for wide-area monitoring and secure real-time control and operation of hybrid power systems. ^ To handle the increased level of real-time data exchange, this dissertation develops a supervisory control and data acquisition (SCADA) system that is equipped with a state estimation scheme from the real-time data. This system is verified on a specially developed laboratory-based test bed facility, as a hardware and software platform, to emulate the actual scenarios of a real hybrid power system with the highest level of similarities and capabilities to practical utility systems. It includes phasor measurements at hundreds of measurement points on the system. These measurements were obtained from especially developed laboratory based Phasor Measurement Unit (PMU) that is utilized in addition to existing commercially based PMU’s. The developed PMU was used in conjunction with the interconnected system along with the commercial PMU’s. The tested studies included a new technique for detecting the partially islanded micro grids in addition to several real-time techniques for synchronization and parameter identifications of hybrid systems. ^ Moreover, due to numerous integration of renewable energy resources through DC microgrids, this dissertation performs several practical cases for improvement of interoperability of such systems. Moreover, increased number of small and dispersed generating stations and their need to connect fast and properly into the AC grids, urged this work to explore the challenges that arise in synchronization of generators to the grid and through introduction of a Dynamic Brake system to improve the process of connecting distributed generators to the power grid.^ Real time operation and control requires data communication security. A research effort in this dissertation was developed based on Trusted Sensing Base (TSB) process for data communication security. The innovative TSB approach improves the security aspect of the power grid as a cyber-physical system. It is based on available GPS synchronization technology and provides protection against confidentiality attacks in critical power system infrastructures. ^
Resumo:
In a crescent connected and image-made society in various online social networks, each user taking pictures of him/herself and posting them on social online network, makes a self-registration that emerges in self-representation by aggregated daily practices of various themes. This research aims to study the dynamics of the relations of this photographic self-representation relations with agency, technology, affectivity, and consumption that goes beyond narcissism, composing a being integrated with the visual power and its reverberations, which I hereby call as Being -Image. The goal of this paper is an anthropological look over these practices. In this sense, I carry out the research developed in the field of image and cyber antropology with various interlocutors established in dialogues, analysis and virtual meetings. I tried, besides conversations and interviews, to analyze the profiles on the social network as well as daily posts, photo albums available on online network , sharings and mainly selfies.
Resumo:
This thesis starts from the proposition that postmodernity is the very cultural manifestation of Late Capitalism. The research was concerned with the publication of privacy that gives us news feeds of Facebook online social network. We used netnography, which is considered a construction method in action that combines study skills to immersion of the researcher in the investigated field. Netnography is an alternative methodology for the study of communication threads in cyber environments. We note that there is an exhibition of themselves in a related environment that reproduces the properties of the spectacle society, with an emphasis on the fact that this exhibition be made and want to be made by the individual himself, allegorically, window dresser and with spectacle. The subject is revealed by itself, shown and is induced to show and display at the same time. It is a large-scale exhibition of the private life events; it is more than spectacle, surpassing debordian sense, approaching the exhibitionism in the Freudian sense. It is a subject in a new way of existence. At the time of posting in public, the person violates their privacy. It is the desecration of stardom intimacy. We found that these new behavioral forms sharing of human experiences, under the mediation of typical technologies informationalism era, appear as a major brand of sociability, meshing the ongoing technological revolution.
Resumo:
Archaeologists are often considered frontrunners in employing spatial approaches within the social sciences and humanities, including geospatial technologies such as geographic information systems (GIS) that are now routinely used in archaeology. Since the late 1980s, GIS has mainly been used to support data collection and management as well as spatial analysis and modeling. While fruitful, these efforts have arguably neglected the potential contribution of advanced visualization methods to the generation of broader archaeological knowledge. This paper reviews the use of GIS in archaeology from a geographic visualization (geovisual) perspective and examines how these methods can broaden the scope of archaeological research in an era of more user-friendly cyber-infrastructures. Like most computational databases, GIS do not easily support temporal data. This limitation is particularly problematic in archaeology because processes and events are best understood in space and time. To deal with such shortcomings in existing tools, archaeologists often end up having to reduce the diversity and complexity of archaeological phenomena. Recent developments in geographic visualization begin to address some of these issues, and are pertinent in the globalized world as archaeologists amass vast new bodies of geo-referenced information and work towards integrating them with traditional archaeological data. Greater effort in developing geovisualization and geovisual analytics appropriate for archaeological data can create opportunities to visualize, navigate and assess different sources of information within the larger archaeological community, thus enhancing possibilities for collaborative research and new forms of critical inquiry.
Resumo:
Con l’avvento di Internet, il numero di utenti con un effettivo accesso alla rete e la possibilità di condividere informazioni con tutto il mondo è, negli anni, in continua crescita. Con l’introduzione dei social media, in aggiunta, gli utenti sono portati a trasferire sul web una grande quantità di informazioni personali mettendoli a disposizione delle varie aziende. Inoltre, il mondo dell’Internet Of Things, grazie al quale i sensori e le macchine risultano essere agenti sulla rete, permette di avere, per ogni utente, un numero maggiore di dispositivi, direttamente collegati tra loro e alla rete globale. Proporzionalmente a questi fattori anche la mole di dati che vengono generati e immagazzinati sta aumentando in maniera vertiginosa dando luogo alla nascita di un nuovo concetto: i Big Data. Nasce, di conseguenza, la necessità di far ricorso a nuovi strumenti che possano sfruttare la potenza di calcolo oggi offerta dalle architetture più complesse che comprendono, sotto un unico sistema, un insieme di host utili per l’analisi. A tal merito, una quantità di dati così vasta, routine se si parla di Big Data, aggiunta ad una velocità di trasmissione e trasferimento altrettanto alta, rende la memorizzazione dei dati malagevole, tanto meno se le tecniche di storage risultano essere i tradizionali DBMS. Una soluzione relazionale classica, infatti, permetterebbe di processare dati solo su richiesta, producendo ritardi, significative latenze e inevitabile perdita di frazioni di dataset. Occorre, perciò, far ricorso a nuove tecnologie e strumenti consoni a esigenze diverse dalla classica analisi batch. In particolare, è stato preso in considerazione, come argomento di questa tesi, il Data Stream Processing progettando e prototipando un sistema bastato su Apache Storm scegliendo, come campo di applicazione, la cyber security.
Resumo:
La tesi esplora la co-esistenza di computazioni embodied e disembodied nei moderni sistemi software, adottando come caso di studio il recente trend che vede sempre più coesi e integrati sistemi per l'Internet of Things e sistemi Cloud-based. Si analizzano i principali modelli di comunicazione, protocolli di comunicazione e architetture situate. Inoltre si realizza una piattaforma IoT Middleware cloud-based per mostrare come la computazione possa essere distribuita lato embodied e disembodied.
Resumo:
Gli impianti industriali moderni sono di tipo automatizzato, i processi sono cioè pilotati da un’unità di calcolo che fornisce i comandi necessari atti al corretto funzionamento dell’impianto. Queste tecnologie espongono le apparecchiature a problemi di Security, dunque attacchi volontari provenienti dall’esterno, al sistema di controllo. Esso può diventare la variabile manipolabile del terrorista informatico il quale può causare lo shut down del segnale o cambiare l’impostazione dei parametri di processo.Lo studio esposto si propone di identificare le possibili modalità di attacco e di individuare uno strumento sistematico che permetta di valutarne la vulnerabilità ad un possibile atto di sabotaggio. La procedura proposta è la PSC-SHaRP (Process System Cyber-Security Hazard Review Procedure) essa consta di due strutture chiamate rispettivamente Alpha e Beta. La metodologia è volta a individuare i potenziali pericoli posti dagli attacchi informatici piuttosto che a stimarne un profilo di rischio e/o probabilità di successo. La ShaRP Alpha, viene utilizzata per analizzare le conseguenze di deviazioni cyber su singole macchine presenti in impianto o sistemi modulari. La ShaRP Beta viene utilizzata per analizzare le conseguenze di attacchi cyber sul sistema costituito dall’impianto di processo. Essa è quindi in grado di analizzare le ripercussioni che manipolazioni su una o più apparecchiature possono avere sull’impianto nel suo complesso. Nell’ultima parte dell’elaborato sono state trattate le possibilità di accesso da parte del ‘’terrorista’’ al sistema di controllo e sicurezza, dunque i sistemi di gestione del DCS e del SIS e le barriere software e hardware che possono essere presenti.
Resumo:
Este estudo tem como objetivo a comprovação da existência de interferência dos formadores de opinião na comunicação da marca com seus consumidores (formadores de opinião, aqui neste estudo, entendemos como pessoas que geram influência em grupos de pessoas que debatem um determinado assunto). Mapeamos o impacto desta interferência supra citada e encontramos cinco grandes eventos significativos dos reflexos na marca. O quadro teórico de referência é formado por autores contemporâneos, e baseia-se na perspectiva do estudo da comunicação mercadológica, cibercultura, micropoder, maquinodependência e psicotecnologia. A forma de comprovação do estudo foi composta de metodologias que compreende estudo historiográfico, estudo de caso e grupos focais. (vem antes da metodologia). Alcançamos os objetivos iniciais e comprovamos a existência da interferência do formador de opinião na comunicação da marca com seus consumidores.
Resumo:
Bien que les technologies d’imagerie soient un acquis réel de la médecine moderne, leur introduction ne semble pas avoir été précédée d’une démarche réflexive suffisante qui aurait permis d’anticiper les multiples enjeux que rencontre la pratique radiologique actuelle. En effet, à force de se focaliser sur les acquis techniques et scientifiques, le cadre de radioprotection en place semble ne pas avoir suffisamment considéré l’apport essentiel que représente la connaissance des aspects sociaux, éthiques et humains que peuvent amener des domaines comme la bioéthique. Cette insuffisance fait en sorte que l’on se retrouve aujourd’hui face à des enjeux importants relatifs à la radioprotection du patient comme la surutilisation des examens radiologiques ou encore le manque d’information des acteurs du milieu face aux risques des rayonnements. Après un état des lieux des enjeux éthiques en radiologie diagnostique ayant un impact sur la radioprotection médicale des patients, un enjeu majeur de la pratique actuelle, qui est la justification inadéquate des prescriptions d’examens radiologiques, sera analysé selon une approche par principes. De cet exercice, visant à démontrer comment l’éthique peut concrètement contribuer à la radioprotection, découle l’impératif d’une vision nouvelle et globale permettant de proposer des pistes de solution aux controverses liées à l’utilisation actuelle de l’imagerie. Dans une perspective de santé des populations, il est important de contribuer à la diminution de la banalisation du recours au rayonnement ionisant dans la pratique médicale diagnostique en alliant bioéthique et radioprotection. Ce projet de recherche se veut être une étape limitée, mais nécessaire dans l’établissement de ce dialogue interdisciplinaire.
Resumo:
Ce mémoire traite des parcours de musiciens migrants d’origine arabe à Montréal. Il s’intéresse à la manière dont ces derniers construisent leurs carrières musicales dans ce contexte et acquièrent la reconnaissance des différents acteurs qu’ils côtoient – pairs, intervenants culturels, public. La méthodologie adoptée est de nature qualitative et correspond à une perspective ethnosociologique, le contexte musical de l’étude inscrivant la démarche dans le domaine de la sociomusicologie. Cinq musiciens ayant migré d’un pays arabe avec une pratique musicale préalable ont été rencontrés, ainsi que cinq acteurs du milieu musical qui interagissent avec eux. Ce corpus d’entretiens a été complété par de l’observation et l’étude de traces (ex. : disques, cv). La démarche d’enquête a permis d’élaborer un ensemble de propositions visant à comprendre les phénomènes sociaux observés. Il apparaît que ces musiciens construisent leurs carrières montréalaises grâce à une actualisation et réappropriation originale des sources et influences musicales accumulées au fil de leur vie, processus néanmoins tributaire des rouages du milieu musical. Celui-ci est constitué de multiples acteurs ayant chacun leurs objectifs, intérêts, contraintes vis-à-vis desquels les musiciens doivent s’ajuster, négocier, faire des compromis. Puis, l’ethnicité arabe qui est construite et mise en scène par les performances musicales peut vraisemblablement agir comme outil pour se démarquer dans le contexte montréalais. Cependant, les dynamiques qui sous-tendent les rapports sociaux que ces artistes entretiennent dans la métropole font en sorte qu’ils ont ultimement peu d’emprise sur la manière dont se manifeste la reconnaissance à leur égard et vis-à-vis de leurs pratiques musicales.
Resumo:
Éditoral / Editorial
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.