3,146 research outputs found
Recommended from our members
Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment). The author describes the motivation behind this approach and two application environments
Facial re-enactment, speech synthesis and the rise of the Deepfake
Emergent technologies in the fields of audio speech synthesis and video facial manipulation have the potential to drastically impact our societal patterns of multimedia consumption. At a time when social media and internet culture is plagued by misinformation, propaganda and “fake news”, their latent misuse represents a possible looming threat to fragile systems of information sharing and social democratic discourse. It has thus become increasingly recognised in both academic and mainstream journalism that the ramifications of these tools must be examined to determine what they are and how their widespread availability can be managed.
This research project seeks to examine four emerging software programs – Face2Face, FakeApp , Adobe VoCo and Lyrebird – that are designed to facilitate the synthesis of speech and manipulate facial features in videos. I will explore their positive industry applications and the potentially negative consequences of their release into the public domain. Consideration will be directed to how such consequences and risks can be ameliorated through detection, regulation and education. A final analysis of these three competing threads will then attempt to address whether the practical and commercial applications of these technologies are outweighed by the inherent unethical or illegal uses they engender, and if so; what we can do in response
Recommended from our members
The application of digital health to the assessment and treatment of substance use disorders: The past, current, and future role of the National Drug Abuse Treatment Clinical Trials Network
The application of digital technologies to better assess, understand, and treat substance use disorders (SUDs) is a particularly promising and vibrant area of scientific research. The National Drug Abuse Treatment Clinical Trials Network (CTN), launched in 1999 by the U.S. National Institute on Drug Abuse, has supported a growing line of research that leverages digital technologies to glean new insights into SUDs and provide science-based therapeutic tools to a diverse array of persons with SUDs.
This manuscript provides an overview of the breadth and impact of research conducted in the realm of digital health within the CTN. This work has included the CTN\u27s efforts to systematically embed digital screeners for SUDs into general medical settings to impact care models across the nation. This work has also included a pivotal multi-site clinical trial conducted on the CTN platform, whose data led to the very first “prescription digital therapeutic” authorized by the U.S. Food and Drug Administration (FDA) for the treatment of SUDs. Further CTN research includes the study of telehealth to increase capacity for science-based SUD treatment in rural and under-resourced communities. In addition, the CTN has supported an assessment of the feasibility of detecting cocaine-taking behavior via smartwatch sensing. And, the CTN has supported the conduct of clinical trials entirely online (including the recruitment of national and hard-to-reach/under-served participant samples online, with remote intervention delivery and data collection). Further, the CTN is supporting innovative work focused on the use of digital health technologies and data analytics to identify digital biomarkers and understand the clinical trajectories of individuals receiving medications for opioid use disorder (OUD). This manuscript concludes by outlining the many potential future opportunities to leverage the unique national CTN research network to scale-up the science on digital health to examine optimal strategies to increase the reach of science-based SUD service delivery models both within and outside of healthcare
Towards Privacy in Personal Data Management
We present a personal data management framework called Polis, which abides by the following principle: Ev-ery individual has absolute control over her personal data, which reside only at her own side. Preliminary results in-dicate that beyond the apparent advantages of such an en-vironment for users ’ privacy, everyday transactions remain both feasible and straightforward.
Citizen Science in Archaeology : Developing a Collaborative Web Service for Archaeological Finds in Finland
Peer reviewe
VISTA:an inclusive insider threat taxonomy, with mitigation strategies
Insiders have the potential to do a great deal of damage, given their legitimate access to organisational assets and the trust they enjoy. Organisations can only mitigate insider threats if they understand what the different kinds of insider threats are, and what tailored measures can be used to mitigate the threat posed by each of them. Here, we derive VISTA (inclusiVe InSider Threat tAxonomy) based on an extensive literature review and a survey with C-suite executives to ensure that the VISTA taxonomy is not only scientifically grounded, but also meets the needs of organisations and their executives. To this end, we map each VISTA category of insider threat to tailored mitigations that can be deployed to reduce the threat
Recommended from our members
"The prince of all the rookies :" remaking working class masculinity and heroism in Traffic in Souls
textThis paper seeks to explore the role evolving masculinities played in the Progressive Era's white slavery panic through one of the period's most popular films: George Loane Tucker's Traffic in Souls and its ensuing novelization by Eustace Hale Ball. In my argument, I hope to make visible the film's discussion of masculinity neglected by earlier critics, and demonstrate how the film's decision to structure police officer Burke's heroism as an internal trait and then Ball’s decision to attribute Burke's heroism to an ascribed set of classist, racist, and sexist properties anticipate the distance between two of the most iconic male characters of the age: Nick Carraway and Tom Buchanan in F. Scott Fitzgerald's The Great Gatsby.Englis
- …