2,022 research outputs found

    Recommendations for Applying Security-Centric Technology Utilizing a Layered Approach in the Era of Ubiquitous Computing: (A Guide for the Small Business Enterprise).

    Get PDF
    The purpose of this work is to advise and assist Small Business in applying security centric technology to better manage and secure their information assets. Computer Crimes and Incursions are growing exponentially, in complexity, and in their sinister application. In the face of this onslaught small businesses, indeed organizations everywhere, need to accept this as a business constant or reality, identify the threats, acknowledge the vulnerabilities, and make plans to meet these challenges

    Security Issues of Virtualization Techniques & Challenges in the Cloud Computing Environments

    Get PDF
    Cloud computing environment is a modern that is relating the present time  developing and based on the current news information Technology methods that is increase application quality that obsolete be developed  and to make better changesin terms of functioning, and able to an original resource management and collaborative execution approach. In the middle of part of cloud computing is virtualization which enables industry or products using machines or academic Information Technology resources into one side other side on demand allocation are always or changing energy or emotion. The resources having not the same kinds forms such as network, virtualization, server, storage capacity, application and client.  This article attention is focused as on how virtualization helps to improve and upgrade adaptable of the resources in cloud computing environment.  The act or processing of joining to, this paper gives particular facts and the review of source virtualization techniques, challenges and future research direction and instructions

    The Order Machine – The Ontology of Information Security

    Get PDF
    Traditionally, information security has been approached in terms of how to achieve the confidentiality, integrity, and availability of information. In this paper, we seek to ontologically examine information security by using Gilles Deleuze and Félix Guattari’s philosophical concepts of machine, coupling, interruption, and territory. Through these concepts, we conceptualize information security as an order-seeking, connection-based, territorial security machine that attempts to subject and harness other actors – from technical devices and physical barriers to employees and various combinations of these actors – to carry out the security machine’s protective tasks. The goal of the security machine is to block or interrupt the chaotic forces of the outside and, thus, to maintain the fragile order of information. However, the process of interrupting the outside requires interruption of the inside as well: users and organizations are interrupted daily by the security machine and its practices. Yet this aspect of information security has remained largely unexamined. We argue that the question of what information security does to its subjects – what its effects are – in the protected system should be examined more thoroughly

    A First Amendment for Second Life: What Virtual Worlds Mean for the Law of Video Games

    Get PDF
    In the first decade of the twenty-first century, video games have finally taken their place alongside movies, comic books, and drawings as a form of protected First Amendment speech. Since the Seventh Circuit\u27s 2001 decision in American Amusement Machine Association v. Kendrick, court after court has struck down ordinances and statutes aimed at restricting violent video games--on the grounds that such violate game designers\u27 and players\u27 First Amendment speech rights. This series of rulings marks a stark change from courts\u27 previous stance on video games, which consigned them to the same realm of unprotected non-speech conduct as games like tennis, chess, or checkers. Video games were able to escape from this unprotected realm--and become First Amendment expression--largely because advances in computer graphics and design made them more and more like interactive movies and television shows, and less and less like digitized board games and pinball machines. But instead of simply forging ahead in this jurisprudential evolution, as video games evolve from personal forms of recreation to virtual worlds, this Article suggests that virtual worlds should make us rethink the First Amendment theory that got us to this point. This is because, while video games may have become First Amendment speech by becoming intricate movie-like stories, many virtual worlds are decidedly not scripted stories. They are rather stages for a multitude of expressive activity, some of which is an electronic analogue of the chess-playing, tennis-playing, car racing, or aimless lounging and wandering, that the courts excluded from the realm of First Amendment speech in an earlier era. This Article argues that this exclusion was a mistake. Virtual worlds are realms of First Amendment expression not because of the stories and role play they make possible, but rather because they provide a setting for giving form to imagination in sounds and imagery, a setting that can be walled off from the business of civil government and thus reserved for more unconstrained exercises of individual freedom. Stories and messages are an optional part of this setting and are not a necessary ingredient of First Amendment speech. This is not to say that government has no role to play in regulating virtual worlds: where individuals bring harm-threatening activity into virtual worlds involving acts that abuse others\u27 money or reputation, for example, government might have to regulate such worlds. But such regulation must take place alongside of, and not simply displace, the First Amendment\u27s application to virtual worlds

    Final Report: Section 6. Smart Growth Case Study – Easton

    Get PDF

    The Challenge of Protecting Transit and Passenger Rail: Understanding How Security Works Against Terrorism

    Get PDF
    Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness. Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little or no security suggests that security influences their choice of targets. Increased security does not reduce terrorism overall, but appears to push terrorists toward softer targets. These indirect effects are visible only over long periods of time. Public surface transportation poses unique challenges. It is not easy to increase security without causing inconvenience, unreasonably slowing travel times, adding significant costs, and creating vulnerable queues of people waiting to pass through security checkpoints. This has compelled rail operators to explore other options: enlisting passengers and staff in alerting authorities to suspicious objects or behavior, random passenger screening, designing new stations to facilitate surveillance and reduce potential casualties from explosions or fire, and ensuring rapid intervention

    COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing

    Get PDF
    Abstract The way people access services in indoor environments has dramatically changed in the last year. The countermeasures to the COVID-19 pandemic imposed a disruptive requirement, namely preserving social distance among people in indoor environments. We explore in this work the possibility of adopting the indoor localization technologies to measure the distance among users in indoor environments. We discuss how information about people's contacts collected can be exploited during three stages: before, during, and after people access a service. We present a reference architecture for an Indoor Localization System (ILS), and we illustrate three representative use-cases. We derive some architectural requirements, and we discuss some issues that concretely cope with the real installation of an ILS in real-world settings. In particular, we explore the privacy and trust reputation of an ILS, the discovery phase, and the deployment of the ILS in real-world settings. We finally present an evaluation framework for assessing the performance of the architecture proposed

    Analysis of the Natura 2000 Networks in Sweden and Spain

    Get PDF
    In this paper the main differences between Natura 2000 Network in Sweden and Spain are analyzed. Comparing different documents at different levels: European, national and regional, the author aims to understand which strategies have been taken in both countries regarding the implementation, management, funding and social reactions of Natura 2000 Network and verify whether in a common Europe the differences in the understanding of environmental common policy are decisive and define the implementation process. The results can clearly show that such differences occur in practically the total issues analyzed. Sweden could be characterized by its orderly and homogeneous implementation process with a close communication between public administration and stakeholders that have influenced all the process. As a result its Natura 2000 Network has marked differences on distribution and size in its Natura sites. Spain, however, shows a heterogeneous and complicated process characterized for both the disinformation due to the lack of communication with the stakeholders and controversial legislative measures which caused social reactions against this network. In contrast it seems that the criteria followed for the sites selection were less influenced by stakeholders. As a conclusion environmental Directives transpositions are being fulfilled with different criteria having as a result significant differences in their final objective
    • …
    corecore