28,761 research outputs found

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Full text link
    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and across national borders. A number of daunting challenges survive to the progress of an efficient information sharing protocol. A secure and trusted information-sharing protocol is required to enable users to interact and share information easily and perfectly across many diverse networks and databases globally.Comment: 20 page

    Multiplex Communities and the Emergence of International Conflict

    Full text link
    Advances in community detection reveal new insights into multiplex and multilayer networks. Less work, however, investigates the relationship between these communities and outcomes in social systems. We leverage these advances to shed light on the relationship between the cooperative mesostructure of the international system and the onset of interstate conflict. We detect communities based upon weaker signals of affinity expressed in United Nations votes and speeches, as well as stronger signals observed across multiple layers of bilateral cooperation. Communities of diplomatic affinity display an expected negative relationship with conflict onset. Ties in communities based upon observed cooperation, however, display no effect under a standard model specification and a positive relationship with conflict under an alternative specification. These results align with some extant hypotheses but also point to a paucity in our understanding of the relationship between community structure and behavioral outcomes in networks.Comment: arXiv admin note: text overlap with arXiv:1802.0039

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Submarine Cables: Issues of Maritime Security, Jurisdiction, and Legalities

    Get PDF
    This paper delves into the complex issues surrounding submarine cables, vital for global communication and data exchange. These issues include maritime security, legal jurisdictions, and broader legalities. Because submarine cables are located deep in the world's oceans, they face numerous security threats such as sabotage, illegal fishing, and deep-sea mining, highlighting the need for comprehensive maritime security measures. Legal Jurisdiction over these cables, especially those outside territorial waters, is equally complicated. Different international norms and regulations contribute to a fragmented legal landscape, creating jurisdictional authority and regulatory compliance ambiguities. Moreover, international laws offer inconsistent solutions to cable damage, repair, and maintenance, adding further complexity. This paper examines these interconnected issues, analyzing the existing regulatory frameworks and their effectiveness in addressing submarine cables' security and legal challenges. We provide a nuanced understanding of this essential infrastructure's vulnerabilities and propose recommendations for enhanced legal frameworks, increased international cooperation, and improved security measures. This comprehensive study is particularly relevant in the current era of digital interconnectedness, where reliable, secure, and uninterrupted international data flows are crucial. We hope this paper will stimulate further discussion and research in this critical yet often underestimated international law and global security area

    Information reuse in dynamic spectrum access

    Get PDF
    Dynamic spectrum access (DSA), where the permission to use slices of radio spectrum is dynamically shifted (in time an in different geographical areas) across various communications services and applications, has been an area of interest from technical and public policy perspectives over the last decade. The underlying belief is that this will increase spectrum utilization, especially since many spectrum bands are relatively unused, ultimately leading to the creation of new and innovative services that exploit the increase in spectrum availability. Determining whether a slice of spectrum, allocated or licensed to a primary user, is available for use by a secondary user at a certain time and in a certain geographic area is a challenging task. This requires 'context information' which is critical to the operation of DSA. Such context information can be obtained in several ways, with different costs, and different quality/usefulness of the information. In this paper, we describe the challenges in obtaining this context information, the potential for the integration of various sources of context information, and the potential for reuse of such information for related and unrelated purposes such as localization and enforcement of spectrum sharing. Since some of the infrastructure for obtaining finegrained context information is likely to be expensive, the reuse of this infrastructure/information and integration of information from less expensive sources are likely to be essential for the economical and technological viability of DSA. © 2013 IEEE

    Towards Safer Information Sharing in the Cloud

    Get PDF
    Web interactions usually require the exchange of personal and confidential information for a variety of purposes, including enabling business transactions and the provisioning of services. A key issue affecting these interactions is the lack of trust and control on how data is going to be used and processed by the entities that receive it. In the traditional world, this problem is addressed by using contractual agreements, those are signed by the involved parties, and law enforcement. This could be done electronically as well but, in ad- dition to the trust issue, there is currently a major gap between the definition of legal contracts regulat- ing the sharing of data, and the software infrastructure required to support and enforce them. How to enable organisations to provide more automation in this pro- cess? How to ensure that legal contracts can be actually enforced by the underlying IT infrastructure? How to enable end-users to express their preferences and con- straints within these contracts? This article describes our R&D work to make progress towards addressing this gap via the usage of electronic Data Sharing Agree- ments (e-DSA). The aim is to share our vision, discuss the involved challenges and stimulate further research and development in this space. We specifically focus on a cloud scenario because it provides a rich set of?use cases involving interactions and information shar- ing among multiple stakeholders, including users and service providers.?

    Natural resources conservation management and strategies in agriculture

    Get PDF
    This paper suggests a holistic framework for assessment and improvement of management strategies for conservation of natural resources in agriculture. First, it incorporates an interdisciplinary approach (combining Economics, Organization, Law, Sociology, Ecology, Technology, Behavioral and Political Sciences) and presents a modern framework for assessing environmental management and strategies in agriculture including: specification of specific “managerial needs” and spectrum of feasible governance modes (institutional environment; private, collective, market, and public modes) of natural resources conservation at different level of decision-making (individual, farm, eco-system, local, regional, national, transnational, and global); specification of critical socio-economic, natural, technological, behavioral etc. factors of managerial choice, and feasible spectrum of (private, collective, public, international) managerial strategies; assessment of efficiency of diverse management strategies in terms of their potential to protect diverse eco-rights and investments, assure socially desirable level of environmental protection and improvement, minimize overall (implementing, third-party, transaction etc.) costs, coordinate and stimulate eco-activities, meet preferences and reconcile conflicts of individuals etc. Second, it presents evolution and assesses the efficiency of diverse management forms and strategies for conservation of natural resources in Bulgarian agriculture during post-communist transformation and EU integration (institutional, market, private, and public), and evaluates the impacts of EU CAP on environmental sustainability of farms of different juridical type, size, specialization and location. Finally, it suggests recommendations for improvement of public policies, strategies and modes of intervention, and private and collective strategies and actions for effective environmental protection

    Designing the Health-related Internet of Things: Ethical Principles and Guidelines

    Get PDF
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be rapid. However, a host of ethical concerns are also raised that must be addressed. The inherent sensitivity of health-related data being generated and latent risks of Internet-enabled devices pose serious challenges. Users, already in a vulnerable position as patients, face a seemingly impossible task to retain control over their data due to the scale, scope and complexity of systems that create, aggregate, and analyse personal health data. In response, the H-IoT must be designed to be technologically robust and scientifically reliable, while also remaining ethically responsible, trustworthy, and respectful of user rights and interests. To assist developers of the H-IoT, this paper describes nine principles and nine guidelines for ethical design of H-IoT devices and data protocols
    corecore