Results for ' Cloud Security, Network Engineering, Encryption, IAM, VPN, Data Storage'

984 found
Order:
  1.  65
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  2.  50
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference between channel (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   62 citations  
  3.  23
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  18
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  19
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  16
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8.  45
    Lockbox: mobility, privacy and values in cloud storage[REVIEW]Luke Stark & Matt Tierney - 2014 - Ethics and Information Technology 16 (1):1-13.
    This paper examines one particular problem of values in cloud computing: how individuals can take advantage of the cloud to store data without compromising their privacy and autonomy. Through the creation of Lockbox, an encrypted cloud storage application, we explore how designers can use reflection in designing for human values to maintain both privacy and usability in the cloud.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  9.  9
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  21
    A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing.Mohd Dilshad Ansari, Ashutosh Sharma, Mudassir Khan & Li Ting - 2022 - Journal of Intelligent Systems 31 (1):221-236.
    An intelligent climate and watering agriculture system is presented that is controlled with Android application for smart water consumption considering small and medium ruler agricultural fields. Data privacy and security as a big challenge in current Internet of Things (IoT) applications, as with the increase in number of connecting devices, these devices are now more vulnerable to security threats. An intelligent fuzzy logic and blockchain technology is implemented for timely analysis and securing the network. The proposed design consists (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  27
    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment.Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu & Na Chen - 2021 - Complexity 2021:1-12.
    This article starts with the analysis of the existing electronic commerce system, summarizes its characteristics, and analyzes and solves its existing problems. Firstly, the characteristics of the relational database My Structured Query Language and the distributed database HBase are analyzed, their respective advantages and disadvantages are summarized, and the advantages and disadvantages of each are taken into account when storing data. My SQL is used to store structured business data in the system, while HBase is used to store (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  24
    When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?Awais Rashid, Sveta Milyaeva & Ola Michalec - 2022 - Big Data and Society 9 (1).
    Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption of big data technologies in critical infrastructures shapes understandings of risk management, we (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  20
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  23
    Mental Images, Memory Storage, and Composition in the High Middle Ages.Mary J. Curruthers - 2008 - Das Mittelalter 13 (1):63-79.
    This essay explores the implications of a commonly held ancient and medieval belief that human memory and invention are, if not exactly the same, the closest thing to it. In order to create, in order to think at all, human beings require both a well-provisioned stock of memory-held knowledge and some mental tool or machine, an engine which lives in the intricate networks of their own memories. In the verbal arts of the trivium students learned the basic principles of memory (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  25
    Software Engineering Ethics.Daniela Marcu, Dan Laurenţiu Milici & Mirela Danubianu - 2020 - Postmodern Openings 11 (4):248-261.
    Over the past 30 years, computer engineering has developed a lot. Currently, computer and software applications have a central role in business, medicine, security, communications, industry, education, and everyday life. Software developers, peoples who manage computer networks, data security analysts can do well, but they also have the potential to cause suffering and harm to the clients or ordinary peoples, willingly or not. For this reason, IT activities must be regulated by specific laws. From the beginning, we argue that (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  16
    Performance Optimization of Cloud Data Centers with a Dynamic Energy-Efficient Resource Management Scheme.Yu Cui, Shunfu Jin, Wuyi Yue & Yutaka Takahashi - 2021 - Complexity 2021:1-18.
    As an advanced network calculation mode, cloud computing is becoming more and more popular. However, with the proliferation of large data centers hosting cloud applications, the growth of energy consumption has been explosive. Surveys show that a remarkable part of the large energy consumed in data center results from over-provisioning of the network resource to meet requests during peak demand times. In this paper, we propose a solution to this problem by constructing a dynamic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  36
    Pitfalls in computer housekeeping by doctors and nurses in KwaZulu-Natal: No malicious intent.Caron Jack, Yashik Singh & Maurice Mars - 2013 - BMC Medical Ethics 14 (S1):S8.
    IntroductionInformation and communication technologies are becoming an integral part of medical practice, research and administration and their use will grow as telemedicine and electronic medical record use become part of routine practice. Security in maintaining patient data is important and there is a statuary obligation to do so, but few health professionals have been trained on how to achieve this. There is no information on the use of computers and email by doctors and nurses in South Africa in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  19
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  58
    Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks.Salama A. Mostafa, Bashar Ahmad Khalaf, Nafea Ali Majeed Alhammadi, Ali Mohammed Saleh Ahmed & Firas Mohammed Aswad - 2023 - Journal of Intelligent Systems 32 (1).
    With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  65
    Privacy in the clouds.Ann Cavoukian - 2008 - Identity in the Information Society 1 (1):89-108.
    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by others. The basis of modern privacy laws and practices around the world, informational privacy has become a challenging concept to protect and promote in a world of ubiquitous and unlimited data sharing and storage among organizations. The paper advocates a “user-centric” approach to managing personal data online. However, user-centricity can be problematic (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  23
    Data politics.Didier Bigo, Engin Isin & Evelyn Ruppert - 2017 - Big Data and Society 4 (2).
    The commentary raises political questions about the ways in which data has been constituted as an object vested with certain powers, influence, and rationalities. We place the emergence and transformation of professional practices such as ‘data science’, ‘data journalism’, ‘data brokerage’, ‘data mining’, ‘data storage’, and ‘data analysis’ as part of the reconfiguration of a series of fields of power and knowledge in the public and private accumulation of data. Data (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  22.  14
    Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications.Mohammad Kamrul Hasan, Muhammad Shafiq, Shayla Islam, Bishwajeet Pandey, Yousef A. Baker El-Ebiary, Nazmus Shaker Nafi, R. Ciro Rodriguez & Doris Esenarro Vargas - 2021 - Complexity 2021:1-13.
    As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things has been introduced that revolves around smart devicesʼ conception. These smart devices using IoT can communicate with each other through a network to attain particular objectives, i.e., automation and intelligent decision making. IoT has enabled the users to divide their household burden with machines as these complex machines look after the environment variables (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  54
    Knowledge and practice of confidential data handling in the Welsh Deanery: a brief report.L. E. Jackson & M. W. Lim - 2011 - Journal of Medical Ethics 37 (1):58-60.
    Recent large-scale personal data loss incidents highlighted the need for public bodies to more securely handle confidential data. We surveyed trainees from all specialties in the Welsh Deanery for their knowledge and practice. All registered trainees were invited to participate in an online anonymised survey. There were 880 completed and non-duplicated responses (52.9% response rate). Responses were analysed using Microsoft Access. Over 40% (388/880 (44.1%)) did not use formal guidelines on storage or disposal of confidential data. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  24. An Intelligent Tutoring System for Learning Computer Network CCNA.Izzeddin A. Alshawwa, Mohammed Al-Shawwa & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (2):28-36.
    Abstract: Networking is one of the most important areas currently used for data transfer and enterprise management. It also includes the security aspect that enables us to protect our network to prevent hackers from accessing the organization's data. In this paper, we would like to learn what the network is and how it works. And what are the basics of the network since its emergence and know the mechanism of action components. After reading this paper (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  50
    Cryptography, data retention, and the panopticon society (abstract).Jean-François Blanchette & Deborah G. Johnson - 1998 - Acm Sigcas Computers and Society 28 (2):1-2.
    As we move our social institutions from paper and ink based operations to the electronic medium, we invisibly create a type of surveillance society, a panopticon society. It is not the traditional surveillance society in which government officials follow citizens around because they are concerned about threats to the political order. Instead it is piecemeal surveillance by public and private organizations. Piecemeal though it is, It creates the potential for the old kind of surveillance on an even grander scale. The (...)
    No categories
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  38
    The emergence of ethical issues in the provision of online sexual health outreach for gay, bisexual, two-spirit and other men who have sex with men: perspectives of online outreach workers.Sophia Fantus, Rusty Souleymanov, Nathan J. Lachowsky & David J. Brennan - 2017 - BMC Medical Ethics 18 (1):59.
    Mobile applications and socio-sexual networking websites are used by outreach workers to respond synchronously to questions and provide information, resources, and referrals on sexual health and STI/HIV prevention, testing, and care to gay, bisexual and other men who have sex with men. This exploratory study examined ethical issues identified by online outreach workers who conduct online sexual health outreach for GB2M. Semi-structured individual interviews were conducted between November 2013 and April 2014 with online providers and managers to explore the benefits, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  27.  15
    Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television.Youwen Ma & Yi Wan - 2021 - Complexity 2021:1-10.
    Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. The method selects Hadoop open source cloud platform as the basis, combines the MapReduce distributed programming model and HDFS distributed file storage system and other key cloud computing technologies. In order to cope with different data processing needs of film and television industry, association analysis, cluster analysis, factor analysis, and K-mean + association analysis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  36
    Genetic Data, Two-Sided Markets and Dynamic Consent: United States Versus France.Henri-Corto Stoeklé, Mauro Turrini, Philipe Charlier, Jean-François Deleuze, Christian Hervé & Guillaume Vogt - 2019 - Science and Engineering Ethics 25 (5):1597-1602.
    Networks for the exchange and/or sharing of genetic data are developing in many countries. We focus here on the situations in the US and France. We highlight some recent and remarkable differences between these two countries concerning the mode of access to, and the storage and use of genetic data, particularly as concerns two-sided markets and dynamic consent or dynamic electronic informed consent. This brief overview suggests that, even though the organization and function of these two-sided markets (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  83
    Anticipatory Ethics for a Future Internet: Analyzing Values During the Design of an Internet Infrastructure.Katie Shilton - 2015 - Science and Engineering Ethics 21 (1):1-18.
    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team—the Named Data Networking project—based on data gathered from publications and internal documents. Networking engineers making technical choices (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  51
    Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.Yuval Elovici, Michael Fire, Amir Herzberg & Haya Shulman - 2014 - Science and Engineering Ethics 20 (4):1027-1043.
    Online social networks have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important—and popular—subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded by users and connections among users. This raises significant ethical problems. Currently, there are no clear ethical guidelines, and researchers may end up performing (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  32
    Self-Managed 5G Networks 1.Jorge Martín-Pérez, Lina Magoula, Kiril Antevski, Carlos Guimarães, Jorge Baranda, Carla Fabiana Chiasserini, Andrea Sgambelluri, Chrysa Papagianni, Andrés García-Saavedra, Ricardo Martínez, Francesco Paolucci, Sokratis Barmpounakis, Luca Valcarenghi, Claudio EttoreCasetti, Xi Li, Carlos J. Bernardos, Danny De Vleeschauwer, Koen De Schepper, Panagiotis Kontopoulos, Nikolaos Koursioumpas, Corrado Puligheddu, Josep Mangues-Bafalluy & Engin Zeydan - 2021 - In Ahmad Alnafessah, Gabriele Russo Russo, Valeria Cardellini, Giuliano Casale & Francesco Lo Presti, Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning. Wiley. pp. 69-100.
    Meeting 5G high bandwidth rates, ultra-low latencies, and high reliabilities requires of network infrastructures that automatically increase/decrease the resources based on their customers’ demand. An autonomous and dynamic management of a 5G network infrastructure represents a challenge, as any solution must account for the radio access network, data plane traffic, wavelength allocation, network slicing, and network functions’ orchestration. Furthermore, federation among administrative domains (ADs) must be considered in the network management. Given the increased (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  35
    Hybrid Real-Time Protection System for Online Social Networks.Muneer Bani Yassein, Shadi Aljawarneh & Yarub Wahsheh - 2020 - Foundations of Science 25 (4):1095-1124.
    The impact of Online Social Networks on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their ideas, photos, daily life events, feelings and news. Since OSNs’ security and privacy challenges are more potential than ever before, it is necessary to enhance the protection and filtering approaches of OSNs contents. This paper explores OSNs’ threats and challenges, and categorize them into: account-based, URL-based and content-based threats. In addition, we analyze the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  24
    Fuzzy Neural Network-Based Evaluation Algorithm for Ice and Snow Tourism Competitiveness.Ying Zhao, Qinghua Zhu & Jiujun Bai - 2021 - Complexity 2021:1-11.
    This paper researches and analyzes the evaluation of the competitiveness of ice and snow tourism, uses the improved fuzzy neural network algorithm to process the system flow diagram of ice and snow tourism development through the function and characteristics of the power system of ice and snow tourism, and finally selects more than 40 indicators of the three subsystems of resources, economy, and culture. Based on the construction of cloud fuzzy neural network model, the above method is (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  86
    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices.Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli & Kim Smith - 2021 - Complexity 2021:1-15.
    Coordination of a power system with the phasor measurement devices in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  69
    Crossing the Olentangy River: The Figure of the Earth and the Military-Industrial-Academic-Complex, 1947–1972.John Cloud - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):371-404.
    This paper explores the history of a unique assemblage of researchers in the geodetic and allied sciences organised at Ohio State University (OSU) in 1947 at the beginning of the Cold War. From about 1950 to 1970, the OSU geodetic sciences group was the most significant group of geodetic researchers in the world. Funded almost entirely by military and intelligence agencies, they pioneered the technologies, organised the research initiatives, ordered the data sets, and trained the generation of geodesists who (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  14
    New Technology, Big Data and the Law.Marcelo Corrales Compagnucci, Mark Fenwick & Nikolaus Forgó (eds.) - 2017 - Singapore: Imprint: Springer.
    This edited collection brings together a series of interdisciplinary contributions in the field of Information Technology Law. The topics addressed in this book cover a wide range of theoretical and practical legal issues that have been created by cutting-edge Internet technologies, primarily Big Data, the Internet of Things, and Cloud computing. Consideration is also given to more recent technological breakthroughs that are now used to assist, and - at times - substitute for, human work, such as automation, robots, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different machine (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  25
    Decentralising the Self – Ethical Considerations in Utilizing Decentralised Web Technology for Direct Brain Interfaces.David M. Lyreskog, Hazem Zohny, Sebastian Porsdam Mann, Ilina Singh & Julian Savulescu - 2024 - Science and Engineering Ethics 30 (4):1-14.
    The rapidly advancing field of brain-computer (BCI) and brain-to-brain interfaces (BBI) is stimulating interest across various sectors including medicine, entertainment, research, and military. The developers of large-scale brain-computer networks, sometimes dubbed ‘Mindplexes’ or ‘Cloudminds’, aim to enhance cognitive functions by distributing them across expansive networks. A key technical challenge is the efficient transmission and storage of information. One proposed solution is employing blockchain technology over Web 3.0 to create decentralised cognitive entities. This paper explores the potential of a decentralised (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  42
    Synergistic Information Processing Encrypts Strategic Reasoning in Poker.Seth Frey, Dominic K. Albino & Paul L. Williams - 2018 - Cognitive Science 42 (5):1457-1476.
    There is a tendency in decision‐making research to treat uncertainty only as a problem to be overcome. But it is also a feature that can be leveraged, particularly in social interaction. Comparing the behavior of profitable and unprofitable poker players, we reveal a strategic use of information processing that keeps decision makers unpredictable. To win at poker, a player must exploit public signals from others. But using public inputs makes it easier for an observer to reconstruct that player's strategy and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  29
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  25
    The art of molecular computing: Whence and whither.Sahana Gangadharan & Karthik Raman - 2021 - Bioessays 43 (8):2100051.
    An astonishingly diverse biomolecular circuitry orchestrates the functioning machinery underlying every living cell. These biomolecules and their circuits have been engineered not only for various industrial applications but also to perform other atypical functions that they were not evolved for—including computation. Various kinds of computational challenges, such as solving NP‐complete problems with many variables, logical computation, neural network operations, and cryptography, have all been attempted through this unconventional computing paradigm. In this review, we highlight key experiments across three different (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  31
    Student reflections on the value of a professionalism module.Lynda Holland - 2013 - Journal of Information, Communication and Ethics in Society 11 (1):19-30.
    PurposeThe purpose of this paper is to analyze written reflections of final year computing students taking a professionalism module that covered the social, legal, professional and ethical aspects of computing. Society's dependence on computers makes it essential that computing students, whose future work may involve the analysis, storage and security of private data, are capable of identifying ethical issues and of making reflective moral judgements. The capacity to make moral judgements has been linked to an ability to reflect, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  24
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  26
    Encryption of graphic information by means of transformation matrixes for protection against decofing by neural algorithms.Yunak O. M., Stryxaluk B. M. & Yunak O. P. - 2020 - Artificial Intelligence Scientific Journal 25 (2):15-20.
    The article deals with the algorithm of encrypting graphic information using transformation matrixes. It presents the actions that can be done with the image. The article also gives algorithms for forming matrixes that are created with the use of random processes. Examples of matrixes and encryption results are shown. Calculations of the analysis of combinations and conclusions to them are carried out. The article shows the possibilities and advantages of this image encryption algorithm. The proposed algorithm will allow to transmit (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  13
    Hadoop-Based Painting Resource Storage and Retrieval Platform Construction and Testing.Chenhua Zu - 2021 - Complexity 2021:1-11.
    This paper adopts Hadoop to build and test the storage and retrieval platform for painting resources. This paper adopts Hadoop as the platform and MapReduce as the computing framework and uses Hadoop Distributed Filesystem distributed file system to store massive log data, which solves the storage problem of massive data. According to the business requirements of the system, this paper designs the system according to the process of web text mining, mainly divided into log data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  52
    Touching at a Distance: Digital Intimacies, Haptic Platforms, and the Ethics of Consent.Madelaine Ley & Nathan Rambukkana - 2021 - Science and Engineering Ethics 27 (5):1-17.
    The last decade has seen rise in technologies that allow humans to send and receive intimate touch across long distances. Drawing together platform studies, digital intimacy studies, phenomenology of touch, and ethics of technology, we argue that these new haptic communication devices require specific ethical consideration of consent. The paper describes several technologies, including Kiiroo teledildonics, the Kissenger, the Apple Watch, and Hey Bracelet, highlighting how the sense of touch is used in marketing to evoke a feeling of connection within (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  11
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  19
    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map.Adel R. Alharbi, Jawad Ahmad, Undefined Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis & William J. Buchanan - 2022 - Complexity 2022:1-15.
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  59
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual Organizations. (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  50.  15
    Implementation of network information security monitoring system based on adaptive deep detection.Lavish Kansal, Abdullah M. Baqasah, Roobaea Alroobaea & Jing Niu - 2022 - Journal of Intelligent Systems 31 (1):454-465.
    For a better detection in Network information security monitoring system, the author proposes a method based on adaptive depth detection. A deep belief network was designed and implemented, and the intrusion detection system model was combined with a support vector machine. The data set adopts the NSL-KDD network communication data set, and this data set is authoritative in the security field. Redundant cleaning, data type conversion, normalization, and other processing operations are performed on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984