658 research outputs found

    Information Security and Cryptography-Encryption in Journalism

    Get PDF
    The purpose of this review paper is to garner knowledge about the information security and cryptography encryption practices implementation for journalistic work and its effectiveness in thwarting software security breaches in the wake of ‘Journalism After Snowden’. Systematic literature review for the ‘information security and cryptography encryption in journalism’ employed with an eye to synthesize existing practices in this field. For this, at first the existing approachable research article databases and search engines employed to download or get the abstract of relevant scientific articles which are then used for citation and summarization works in a systematic rigorous anatomization. Contingent upon them their analysis and synthesis employed to arrive at the findings. Research papers collated for the purpose of writing this review paper lighted up the vital issues related to investigative journalists’ safety practices promulgation inadequacies even after the UNESCO 2017 and 2022 guidelines for urgent instrumentalization needs of journalists on the part of its’ member States.Lattice Science Publication (LSP) © Copyright: All rights reserved

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    2011 Academic Excellence Showcase Proceedings

    Get PDF

    RFID Technology in Intelligent Tracking Systems in Construction Waste Logistics Using Optimisation Techniques

    Get PDF
    Construction waste disposal is an urgent issue for protecting our environment. This paper proposes a waste management system and illustrates the work process using plasterboard waste as an example, which creates a hazardous gas when land filled with household waste, and for which the recycling rate is less than 10% in the UK. The proposed system integrates RFID technology, Rule-Based Reasoning, Ant Colony optimization and knowledge technology for auditing and tracking plasterboard waste, guiding the operation staff, arranging vehicles, schedule planning, and also provides evidence to verify its disposal. It h relies on RFID equipment for collecting logistical data and uses digital imaging equipment to give further evidence; the reasoning core in the third layer is responsible for generating schedules and route plans and guidance, and the last layer delivers the result to inform users. The paper firstly introduces the current plasterboard disposal situation and addresses the logistical problem that is now the main barrier to a higher recycling rate, followed by discussion of the proposed system in terms of both system level structure and process structure. And finally, an example scenario will be given to illustrate the system’s utilization

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    What's That Noise? Or, a Case Against Digital Privacy as a Matter of Regulation and Control

    Get PDF
    Digital privacy is typically understood as the restriction of access to personal information and user data. This assumes regulation and control on the part of governments and corporations, realized through various laws and policies. However, there exists another realm bearing on digital privacy. This realm involves a wider network of actors carrying out practices and techniques beyond merely governmental and corporate means: users who engage and manipulate digital privacy software that is created by coders, as well as the software itself for the ways in which it mediates the relationship between users and coders. The dissertation argues that by focusing attention on this other realm of coders, users and software interacting with one another we as analysts develop alternative understandings of digital privacy, specifically by attending to each actors noisemaking: the deliberate (or even incidental) process of obfuscating, interrupting, precluding, confusing or misleading access to digital information. The dissertation analyzes how each of these three actors engage in noisemaking across three different types of encrypted Internet systems: The Onion Router web browser; the WhatsApp instant messaging service; the SpiderOak One file hosting service. These relatively taken-for-granted actors instruct the academy that digital privacy is less about regulating and controlling information as much as it is about surrendering control over information management and security. The dissertation demonstrates that digital privacy thus ought to be understood as a reflection of the variegated, contingent and incidental nature of social and political forces unfolding at the edge of and even beyond the purview of governments and corporations
    • …
    corecore