155 resultados para anonymity
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
In the wake of the success of Peer-to-Peer (P2P) networking, security has arisen as one of its main concerns, becoming a key issue when evaluating a P2P system. Unfortunately, some systems' design focus targeted issues such as scalabil-ity or overall performance, but not security. As a result, security mechanisms must be provided at a later stage, after the system has already been designed and partially (or even fully) implemented, which may prove a cumbersome proposition. This work exposes how a security layer was provided under such circumstances for a specic Java based P2P framework: JXTA-Overlay.
Resumo:
Las redes móviles ad hoc son redes formadas por lainterconexión de terminales inalámbricos que de manera autónoma,sin ninguna administración central, establecen enlaces decomunicación entre ellos. La infraestructura de red la componenlos propios terminales de usuarios que actúan de gestores yencaminadores de paquetes. Así, un usuario cualquiera puedeconectarse con un terminal remoto a través de una conexiónmultisalto entre diferentes usuarios. En este tipo de redes tanabiertas, uno de los retos prioritarios es proteger el anonimatode los sujetos y sus localizaciones. En este artículo hacemos unrepaso de las técnicas existentes a través de los protocolos que sehan propuesto en la literatura, y exponemos los problemas queaun quedan abiertos.
Resumo:
Langattomien lähiverkkotekniikoiden yleistyessä langattomien verkkojen ja palveluiden kysyntä on kasvanut nopeasti. Varsinkin vuonna 1997 julkistettu IEEE:n 802.11b-standardi on mahdollistanut langattomien verkkotekniikoiden nopean kehityksen. Tässä työssä esitetään suunnitelma kahden verkon välisen rajapinnan rakenteesta ja to-teutuksesta. Rajapintaa kutsutaan yhdysliikennepisteeksi. Sen pääasiallisena tehtävänä on toimia solmupisteenä kaikelle verkkojen väliselle tietoliikenteelle ja hallinnoida niin sisäverkkoa käyttäjineen kuin ulkoverkon puolelle kytkettyjä operaattoreita. Yhdyslii-kennepisteen tehtävänä on tunnistaa sisäverkon käyttäjät, auktorisoida heidät yhteis-työssä operaattorien kanssa, huolehtia sisäverkon käyttäjien verkko-osoitteista ja toimia verkkoliikenteen välittäjänä. Yhdysliikennepiste kykenee reitittämään käyttäjän oikealle operaattorille ja huolehtii siitä, että käyttäjällä on pääsy palveluihin, joiden käyttämiseen tällä on valtuutus. Työssä määritellään yhdysliikennepisteen rajapinnat sekä siihen liitettäviä operaattoreita että sisäverkkoon tarjottavia peruspalveluita varten. Lisäksi määritellään yhdysliikenne-pisteen sisäiset rajapinnat. Yhdysliikennepiste ei rajoita käytettyä verkkotekniikkaa, mutta tässä työssä keskitytään IEEE 802.11b -standardin mukaisiin WLAN-verkkoihin. Yhden tai useamman operaattorin verkkoja on olemassa sekä langallisessa että langat-tomissa ympäristöissä. Näissä verkoissa jokainen Internet-operaattori huolehtii kuiten-kin vain omista asiakkaistaan. Sisäverkko on suljettu, siihen pääsevät liittymään vain operaattorin omat asiakkaat. Työn tuloksena syntynyt yhdysliikennepiste on ratkaisu, jonka avulla voidaan rakentaa monioperaattorialueverkko, joka on avoin kaikille sen käyttäjille.
Resumo:
Tutkielmassa tutkittiin innovatiivisen virtuaaliyhteisön toiminnan edellytyksiä. Teoreettinen viitekehys muodostui virtuaaliyhteisöjen, innovatiivisuuden ja luovuuden tarkastelusta. Tutkielman empiirisessä osuudessa käytettiin kvalitatiivista tutkimusotetta. Tutkimusaineisto perustui internetiin tutkimusta varten perustetun innovointiin keskittyneen keskustelufoorumin tuottamiin tuloksiin sekä ko. foorumin käyttäjien palautteeseen. Tutkimuksessa kävi ilmi, että innovatiivisuus vaatii motivoitumista käsiteltävään aiheeseen. Ideoijan täytyy kokea aihe mielenkiintoiseksi, jotta virtuaaliyhteisössä tapahtuva innovointi pystyy tarjoamaan parhaan etunsa eli välineen ajasta ja paikasta riippumattomaan ideointiin. Virtuaaliyhteisöllä tulee olla koordinaattori, joka pitää huolen tiedon kokoamisesta, yhteenvedoista ja ruokkii yhteisön aktiivisuutta. Yhteisössä innovoiminen edellyttää yhteisön ilmapiirin rakentamista otolliseksi avoimelle viestinnälle. Tämä syntyy rakentamalla luottamusta toimijoiden välille mm. kannustamalla sosiaaliseen viestintään. Virtuaaliyhteisössä passivoituminen on suuri uhka. Virtuaaliyhteisöä täytyy johtaa kannustaen ja pitäen kaikin keinoin huolta jäsenten aktiivisen keskustelun ylläpidosta. Passiivisuus aiheuttaa yleistä passiivisuutta, aktiivisuus nostaa aktiivisuutta. Toimijoiden anonyymius voi olla yhteisön voimavara, mutta tuo sitoutumattomuutta, jolloin mikä tahansa häiritsevä tekijä saa aikaan sen, että toimija voi jättää osallistumatta asian käsittelyyn ilman muualta kohdistuvia paineita. Anonyymiyden hyödyt ja haitat tulee punnita tarkoin.
Resumo:
JXTA is a peer-to-peer (P2P) middleware whichhas undergone successive iterations through its 10 years of history, slowly incorporating a security baseline that may cater to different applications and services. However, in order to appeal to a broader set of secure scenarios, it would be interesting to take into consideration more advanced capabilities, such as anonymity.There are several proposals on anonymous protocols that can be applied in the context of a P2P network, but it is necessary to be able to choose the right one given each application¿s needs. In this paper, we provide an experimental evaluation of two relevant protocols, each one belonging to a different category of approaches to anonymity: unimessage and split message. Webase our analysis on two scenarios, with stable and non-stable peers, and three metrics: round trip-time (RTT), node processing time and reliability.
Resumo:
We expose the ubiquitous interaction between an information screen and its’ viewers mobile devices, highlights the communication vulnerabilities, suggest mitigation strategies and finally implement these strategies to secure the communication. The screen infers information preferences’ of viewers within its vicinity transparently from their mobile devices over Bluetooth. Backend processing then retrieves up-to-date versions of preferred information from content providers. Retrieved content such as sporting news, weather forecasts, advertisements, stock markets and aviation schedules, are systematically displayed on the screen. To maximise users’ benefit, experience and acceptance, the service is provided with no user interaction at the screen and securely upholding preferences privacy and viewers anonymity. Compelled by the personal nature of mobile devices, their contents privacy, preferences confidentiality, and vulnerabilities imposed by screen, the service’s security is fortified. Fortification is predominantly through efficient cryptographic algorithms inspired by elliptic curves cryptosystems, access control and anonymity mechanisms. These mechanisms are demonstrated to attain set objectives within reasonable performance.
Resumo:
Peer-reviewed
Resumo:
Peer-reviewed
Resumo:
Incident and near miss reporting is one of the proactive tools of safety management. By analyzing incidents and near misses and by corrective actions, severe accidents can potentially be avoided. Near miss and incident reporting is widely used in many riskprone industries such as aviation or chemical industry. In shipping incident and near miss reporting is required by the mandatory safety management system International Safety Management Code (ISM Code). However, in several studies the conclusion has been that incidents are reported poorly in the shipping industry. The aim of this report is to highlight the best practices for incident reporting in shipping and to support the shipping industry in the better utilization of incident reporting information. The study consists of three parts: 1) voluntary, shared reporting systems in shipping (international experiences), 2) interview study at four shipping companies in Sweden and in Finland (best practices), 3) expert workshop on incident reporting (problems and solutions). Preconditions for a functional reporting system are an existing no blame culture, commitment of the top management, feedback, good communication, training and an easy-to-use system. Although preconditions are met, problems can still appear, for example due to psychological, interpersonal or nationality-related reasons. In order to keep the reporting system functioning, the shipping company must be committed to maintain and develop the system and to tackle the problems. The whole reporting process from compiling, handling and analyzing a report, creating corrective actions and implementing them has to be handled properly in order to gain benefits from the reporting system. In addition to avoiding accidents, the functional reporting system can also offer other benefits by increasing safety awareness, by improving the overall safety and working conditions onboard, by enhancing team work and communication onboard and between ships and the land-based organization of shipping companies. Voluntary shared reporting systems are supported in the shipping industry in principle, but their development in the Baltic Sea is still in its infancy and the potential benefits of sharing the reports have not been realized. On the basis of this study we recommend that a common reporting system be developed for the Baltic Sea area which all the ships operating in the area could use regardless of their flag. Such a wider system could prevent some of the problems related to the current national systems. There would be more incident cases available in the database and this would support anonymity and thus encourage shipping companies to report to a shared database more frequently. A shared reporting system would contribute to the sharing of experiences and to the wider use of incident information in the shipping industry.
Resumo:
This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.
Resumo:
So-called sin industries are often related to harmfulness, unethical business, and unproductiveness. Nowadays, the alcohol, gambling, and tobacco industries are most often considered to be part of sin industries, which is also the context of this study. However, the definition of a sin industry is always related to time and culture. Despite the controversies of sin industries, there are studies that have shown that corporate social responsibility (CSR) engagement is even more important for sin industries than for normal industries and that CSR has a positive effect on firm value in sin industries. With CSR this study refers to an ideology where company takes mostly voluntary actions towards various groups of stakeholders and the environment. In other words, the company goes beyond the legal norms and regulations. In particular, the purpose of this thesis is to find out how companies, operating in the online gambling industry, communicate about their CSR actions to consumers at their web pages. The online environment is essential for this study as online gambling environment is a source of many controversies in comparison to the traditional gambling halls and casinos. These include, for example, greater accessibility, anonymity, and availability of the service. This study uses qualitative textual analysis as its approach, more precisely the discourse analysis. In addition, as this study focuses on large international companies and their actions, also case study approach will be presented. The cases studied are Mybet, Unibet, and Bwin.Party. In order to study the subject, elements from discourse analysis are combined with insights of essential CSR theories, and the specific characteristics of the online gambling industry. As a background for the framework, this study uses the framework of Du & Vieira (2012). After analyzing the discourses of CSR communication and CSR practices, it seems that all of the case companies still do not use all the potential that the online environment provides in terms of CSR or stakeholder communication. There are large differences between different communication tools used at different web pages (gambling pages vs. corporation pages) and between the firms’ CSR profiles. Moreover, there are large differences in the CSR practices used in the web pages of the case companies. The findings of this study are partially alarming as the case companies represent the largest companies in the industry. There are major varieties between the companies’ CSR communication and clear shortcomings in some parts of the online communication. Moreover, the trust of the consumer was broken in some places. If this is the standard that the biggest players in the industry have set with regards to CSR communication, it is probable that the smaller players are performing even worse. Moreover, the regulators are most likely concentrating on the larger companies, so the smaller companies might have fewer incentives and pressure to perform according to the regulations or exceeding the legislation. The conclusions of this thesis provide insights to managers, regulators, and scholars. Suggestions for future studies are provided as well.
Resumo:
Despite the increasing public profile of lesbian childbearing, public health resources for expectant women often bear heterosexist assumptions and create barriers to accessing information relevant to lesbian mothering experiences. This descriptive, exploratory study examined one lesbian couple's perceived educational needs for effective support, barriers to access, strategies for locating care, and the impact of childbearing on their lives, as well as their reflections on inviting ways to offer supportive practices in a public health context. A case study approach used feminist ethnographic methodology and purposeful convenience sampling. A prenatal and a postnatal open-ended interview were completed with 1 white, middle-class, able, lesbian childbearing couple, each ofwhom has birthed as coparent and biological mother in this couple relationship. Despite this couple's immense situated privilege, they struggled to locate the support they sought for childbearing in a way that offered optimal emotional and physical care from the preconceptual to postpartum stages and which maintained confidentiality or anonymity as desired. They created meaningful care through personal networks. The findings were framed using invitational and feminist theories: how people, places, programs, processes, policies, and politics contributed to educational support. A three part conceptual framework emerged which identified components of access to support: perceived safety of resources, disclosure status, situated privilege, and public or private availability of information. The consequences of lack of public access to comprehensive childbearing care for lesbian women and their communities are described. Educational possibilities addressed systemic heterosexism through the development of sensitive educators, meaningful curriculum, program planning, explicit policies, community partnerships, and political leadership with respect to both institutional and research venues.
Resumo:
This is a study exploring teenaged girls’ understanding and experiences of cyberbullying as a contemporary social phenomenon. Participants included 4 Grade 11 and 12 girls from a medium-sized independent school in southwestern Ontario, Canada. The girls participated in 9 extracurricular study sessions from January to April 2013. During the sessions, they engaged with Drama for Social Intervention (Clark, 2009; Conrad, 2004; Lepp, 2011) activities with the intended goal of producing a collective creation. Qualitative data were collected throughout the sessions using fieldnotes, participant journals, interviews, and participant artefacts. The findings are presented as an ethnodrama (Campbell & Conrad, 2006; Denzin, 2003; Saldaña, 1999) with each thematic statement forming a title of a scene in the script (Rogers, Frellick, & Babinski, 2002). The study found that girl identity online consists of many disconnected avatars. It also suggested that distancing (Eriksson, 2011) techniques, used to engender safety in Drama for Social Intervention, might have contributed to participant disengagement with the study’s content. Implications for further research included the utility of arts-based methods to promote participants’ feelings of growth and reflection, and a reevaluation of cyberbullying discourses to better reflect girls’ multiple avatar identities. Implications for teachers and administrators encompassed a need for preventative approaches to cyberbullying education, incorporating affective empathy-building (Ang & Goh, 2010) and addressing girls’ feelings of safety in perceived anonymity online.