991 resultados para internet filtering
Resumo:
The following report considers a number of key challenges the Australian Federal Government faces in designing the regulatory framework and the reach of its planned mandatory internet filter. Previous reports on the mandatory filtering scheme have concentrated on the filtering technologies, their efficacy, their cost and their likely impact on the broadband environment. This report focuses on the scope and the nature of content that is likely to be caught by the proposed filter and on identifying associated public policy implications.
Resumo:
This entry discusses the origins and history of media content regulation, the reasons for content regulations, and their application to different media platforms. It discusses online content regulations and the concerns that have motivated such policies with particular reference to debates about internet filtering. It is noted that, as there is growing convergence of media content, platforms, devices, and services, the debates can be expected to shift from free speech and censorship on the internet and the social protection of internet users, to wider issues of media policy reform that include cultural policy and industry development in the digital economy.
Resumo:
Resource, Poster and Reference for the coursework
Resumo:
Is it possible to say something positive about Internet filtering in libraries and not have everyone, including your mother, call you a wild-eyed, hidebound, neo-Nazi bashi-bazouk? No, of course not, but I'm going to try to anyway.
Resumo:
Communication technologies shape how political activist networks are produced and maintain themselves. In Cuba, despite ideologically and physically oppressive practices by the state, a severe lack of Internet access, and extensive government surveillance, a small network of bloggers and cyberactivists has achieved international visibility and recognition for its critiques of the Cuban government. This qualitative study examines the blogger collective known as Voces Cubanas in Havana, Cuba in 2012, advancing a new approach to the study of transnational activism and the role of technology in the construction of political narrative. Voces Cubanas is analyzed as a network of connections between human and non-human actors that produces and sustains powerful political alliances. Voces Cubanas and its allies work collectively to co-produce contentious political discourses, confronting the dominant ideologies and knowledges produced by the Cuban state. Transnational alliances, the act of translation, and a host of unexpected and improvised technologies play central roles in the production of these narratives, indicating new breed of cyborg sociopolitical action reliant upon fluid and flexible networks and the act of writing.
Resumo:
La tesi propone una soluzione middleware per scenari in cui i sensori producono un numero elevato di dati che è necessario gestire ed elaborare attraverso operazioni di preprocessing, filtering e buffering al fine di migliorare l'efficienza di comunicazione e del consumo di banda nel rispetto di vincoli energetici e computazionali. E'possibile effettuare l'ottimizzazione di questi componenti attraverso operazioni di tuning remoto.
Resumo:
O tema da dissertação é o direito humano de acesso à internet. O primeiro capítulo busca afirmar a existência desse direito e seu caráter essencial. Para isso, são apresentados fundamentos de quatro espécies. O primeiro é de direito internacional dos direitos humanos e baseia-se na análise de três documentos da Organização das Nações Unidas. O segundo é material e procura demonstrar que a internet tornou-se um instrumento indispensável à realização de diversos deveres e direitos, muitos deles humanos. Dessa forma, o acesso deve ser considerado um direito em si, dotado do mesmo status jurídico dos direitos dele dependentes. O terceiro fundamento é filosófico. Ressalta-se o aspecto comunitário da internet e demonstra-se que há um cidadão virtual que é titular de direitos e deveres na rede. Nesse momento, com base na lição de Hannah Arendt, é afirmado que se há uma dimensão digital da cidadania, deve haver um direito a adquiri-la, o que se dá pelo direito de acesso à internet. O quarto fundamento é positivo e direciona-se especificamente ao reconhecimento de um direito fundamental de acesso à internet na ordem constitucional brasileira, decorrente e não escrito. Após, é feito um estudo de direito comparado, analisando-se como a questão tem sido tratada pela lei e pela jurisprudência de diversos países. Ao final do primeiro capítulo, são apresentadas e refutadas as objeções mais comuns ao reconhecimento do direito humano de acesso à internet, incluindo a questão dos custos do direito. Afirmada a existência do direito, o segundo capítulo analisa seu conteúdo e seus limites jurídicos. Inicialmente, o direito é subdividido em uma dimensão de acesso à infraestrutura física e uma dimensão de acesso ao conteúdo. São apresentadas as principais políticas públicas brasileiras que visam a concretizar ambas as dimensões. Em um segundo momento, são estudadas hipóteses de violação do direito. Uma hipótese de lesão é a ausência do serviço em certas localidades. Outra hipótese é a censura virtual, que é dividida em função do método utilizado, se pelo hardware ou pelo software, e em função do agente que a realiza, se estatal ou privado. É analisada a constitucionalidade de penas de desconexão, perpétuas ou temporárias, e de medidas de interrupção total do serviço, em conjunto com a Lei 12.737/2012. São apresentados requisitos para que as filtragens de conteúdo na rede sejam lícitas. Coteja-se o estudado com o Projeto de Lei 2.126/2011, o chamado marco civil da internet. Por fim, é estudada a exigibilidade do direito com relação às duas dimensões.
Resumo:
The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using proprietary and closed communication protocols. There is the common belief that only if we can solve the interoperability problem we can have a real Internet of Things. After a deep analysis of the IoT protocols, we identified a set of primitives for IoT applications. We argue that each IoT protocol can be expressed in term of those primitives, thus solving the interoperability problem at the application protocol level. Moreover, the primitives are network and transport independent and make no assumption in that regard. This dissertation presents our implementation of an IoT platform: the Ponte project. Privacy issues follows the rise of the Internet of Things: it is clear that the IoT must ensure resilience to attacks, data authentication, access control and client privacy. We argue that it is not possible to solve the privacy issue without solving the interoperability problem: enforcing privacy rules implies the need to limit and filter the data delivery process. However, filtering data require knowledge of how the format and the semantics of the data: after an analysis of the possible data formats and representations for the IoT, we identify JSON-LD and the Semantic Web as the best solution for IoT applications. Then, this dissertation present our approach to increase the throughput of filtering semantic data by a factor of ten.
Resumo:
While there are reports of developing sexual relationships on the Internet (I) among MSM, there are few reports that have examined the process of developing sexual relationships on the I and comparing to that in real life (IRL). This study examines the process to provide insight into how MSM make decisions about courtship, engages in negotiations for sex, and choose sexual partners and examines the comparative sexual risks taken between I vs. IRL negotiation. This self-selected convenience sample at a national level (n=1001) of MSM recruited through the I, systematically explored the different steps, the process of courtship in a flow chart of I and IRL dating to portray the process of filtering, courtship and/or negotiation for sex. Risk behaviors in both environments are presented along with interactions that create predictable sequences or "scripts". These sequences constitute 'filtering' and 'sexual positioning'. Differences between I & IRL suggest discussion of HIV/STD status to have consistent differences for all variables except 'unprotected sex' meaning no condom use. There was more communication on the I in regards to self revealing information or variables relating to reducing risks which enable 'filtering' (including serosorting). Data indicate more steps in the I process, providing more complex, multiple steps to filter and position with regard not only to HIV/STD risk but also to negotiate position for complementary sexual interest. The study established a pattern of MSM's courtships or negotiation for sex and a pattern of acquisition, and more I negotiation. Data suggest negotiation opportunities which could lend to intervention to advise people how to negotiate safely. ^ Previous studies have reviewed MSM and drug use. This is a study to review the process of drug use associated with sexual behavior regarding the Internet (I) and in real life (IRL) using a self-selected, convenience sample of MSM (n=1001) recruited nation-wide through the Internet. Data on MSM and drugs illustrate the Internet being used as a tool to filter for drug use among MSM. MSM's drug use in both environments highlights the use of sexual performance drugs with an IRL pursuit of intimacy or negotiation for sex. IRL encounters were more likely to involve drug use (both recreational and sexual performance-enhancing) than Internet encounters. This may be due to more IRL meetings occurring at bars, clubs or parties where drug use is a norm. Compared with IRL, the Internet may provide a venue for persons who do not want to use drugs to select partners with similar attitudes. This suggests that filtering may be occurring as part of the internet negotiation. Data indicated that IRL persons get drunk/high before having sex in past 60 days significantly more often than Internet participants. Age did not alter the pattern of results. Thus drug filtering is really not recreational drug filtering or selecting for PNP, but appears to be situationally-based. Thus, it should perhaps be seen as another form of filtering to select drug-free partners, rather than using the Internet to specifically recruit and interact with other recreational drug users. ^
Resumo:
Collaborative filtering recommender systems contribute to alleviating the problem of information overload that exists on the Internet as a result of the mass use of Web 2.0 applications. The use of an adequate similarity measure becomes a determining factor in the quality of the prediction and recommendation results of the recommender system, as well as in its performance. In this paper, we present a memory-based collaborative filtering similarity measure that provides extremely high-quality and balanced results; these results are complemented with a low processing time (high performance), similar to the one required to execute traditional similarity metrics. The experiments have been carried out on the MovieLens and Netflix databases, using a representative set of information retrieval quality measures.
Resumo:
Transportation Department, Office of University Research, Washington, D.C.
Resumo:
Thesis (M. S.)--University of Illinois at Urbana-Champaign.
Resumo:
"*This work was supported in part by the U.S. Atomic Energy Commission under Contract No. AT911-1)-1018."
Resumo:
cover-title