368 research outputs found
Data ethics : building trust : how digital technologies can serve humanity
Data is the magic word of the 21st century. As oil in the 20th century and electricity in the 19th century:
For citizens, data means support in daily life in almost all activities, from watch to laptop, from kitchen to car,
from mobile phone to politics. For business and politics, data means power, dominance, winning the race. Data can be used for good and bad,
for services and hacking, for medicine and arms race. How can we build trust in this complex and ambiguous data world?
How can digital technologies serve humanity? The 45 articles in this book represent a broad range of ethical reflections and recommendations
in eight sections: a) Values, Trust and Law, b) AI, Robots and Humans, c) Health and Neuroscience, d) Religions for Digital Justice, e) Farming, Business, Finance, f) Security, War, Peace, g) Data Governance, Geopolitics, h) Media, Education, Communication.
The authors and institutions come from all continents.
The book serves as reading material for teachers, students, policy makers, politicians, business, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and building trust!
The book is a continuation of the volume “Cyber Ethics 4.0” published in 2018 by the same editors
Undergraduate and Graduate Course Descriptions, 2023 Spring
Wright State University undergraduate and graduate course descriptions from Spring 2023
Optimal control analysis of malware propagation in cloud environments
Cloud computing has become a widespread technology that delivers a broad range of services across various industries globally. One of the crucial features of cloud infrastructure is virtual machine (VM) migration, which plays a pivotal role in resource allocation flexibility and reducing energy consumption, but it also provides convenience for the fast propagation of malware. To tackle the challenge of curtailing the proliferation of malware in the cloud, this paper proposes an effective strategy based on optimal dynamic immunization using a controlled dynamical model. The objective of the research is to identify the most efficient way of dynamically immunizing the cloud to minimize the spread of malware. To achieve this, we define the control strategy and loss and give the corresponding optimal control problem. The optimal control analysis of the controlled dynamical model is examined theoretically and experimentally. Finally, the theoretical and experimental results both demonstrate that the optimal strategy can minimize the incidence of infections at a reasonable loss
Transforming Large-Scale Virtualized Networks: Advancements in Latency Reduction, Availability Enhancement, and Security Fortification
In today’s digital age, the increasing demand for networks, driven by the proliferation of connected devices, data-intensive applications, and transformative technologies, necessitates robust and efficient network infrastructure. This thesis addresses the challenges posed by virtualization in 5G networking and focuses on enhancing next-generation Radio Access Networks (RANs), particularly Open-RAN (O-RAN). The objective is to transform virtualized networks into highly reliable, secure, and latency-aware systems. To achieve this, the thesis proposes novel strategies for virtual function placement, traffic steering, and virtual function security within O-RAN. These solutions utilize optimization techniques such as binary integer programming, mixed integer binary programming, column generation, and machine learning algorithms, including supervised learning and deep reinforcement learning. By implementing these contributions, network service providers can deploy O-RAN with enhanced reliability, speed, and security, specifically tailored for Ultra-Reliable and Low Latency Communications use cases. The optimized RAN virtualization achieved through this research unlocks a new era in network architecture that can confidently support URLLC applications, including Autonomous Vehicles, Industrial Automation and Robotics, Public Safety and Emergency Services, and Smart Grids
Modern trends in digital transformation of marketing & management
The monograph examines the current trends in the development of digital technologies in marketing, management and business administration. The prospects for the development of digital technologies in various sectors of the economy of Ukraine and the trends of the influence of digital technologies on global shifts in the systems of marketing management and business administration are determined. The transformations of business models in the conditions of the digital economy are analyzed, the impact of blockchain technologies on the development of promising areas of the marketing management system and business administration is analyzed. Reasonable impact of digital technologies on the transformation of management systems in social, public, legal and administrative spheres and various sectors of the economy. The contours of the formation of the digital economy in the sectors of economic activity and the social sphere have been developed
Market driven elastic secure infrastructure
In today’s Data Centers, a combination of factors leads to the static allocation of physical servers and switches into dedicated clusters such that it is difficult to add or remove hardware from these clusters for short periods of time. This silofication of the hardware leads to inefficient use of clusters. This dissertation proposes a novel architecture for improving the efficiency of clusters by enabling them to add or remove bare-metal servers for short periods of time. We demonstrate by implementing a working prototype of the architecture that such silos can be broken and it is possible to share servers between clusters that are managed by different tools, have different security requirements, and are operated by tenants of the Data Center, which may not trust each other.
Physical servers and switches in a Data Center are grouped for a combination of reasons. They are used for different purposes (staging, production, research, etc); host applications required for servicing specific workloads (HPC, Cloud, Big Data, etc); and/or configured to meet stringent security and compliance requirements. Additionally, different provisioning systems and tools such as Openstack-Ironic, MaaS, Foreman, etc that are used to manage these clusters take control of the servers making it difficult to add or remove the hardware from their control. Moreover, these clusters are typically stood up with sufficient capacity to meet anticipated peak workload.
This leads to inefficient usage of the clusters. They are under-utilized during off-peak hours and in the cases where the demand exceeds capacity the clusters suffer from degraded quality of service (QoS) or may violate service level objectives (SLOs). Although today’s clouds offer huge benefits in terms of on-demand elasticity, economies of scale, and a pay-as-you-go model yet many organizations are reluctant to move their workloads to the cloud. Organizations that (i) needs total control of their hardware (ii) has custom deployment practices (iii) needs to match stringent security and compliance requirements or (iv) do not want to pay high costs incurred from running workloads in the cloud prefers to own its hardware and host it in a data center. This includes a large section of the economy including financial companies, medical institutions, and government agencies that continue to host their own clusters outside of the public cloud. Considering that all the clusters may not undergo peak demand at the same time provides an opportunity to improve the efficiency of clusters by sharing resources between them.
The dissertation describes the design and implementation of the Market Driven Elastic Secure Infrastructure (MESI) as an alternative to the public cloud and as an architecture for the lowest layer of the public cloud to improve its efficiency. It allows mutually non-trusting physically deployed services to share the physical servers of a data center efficiently. The approach proposed here is to build a system composed of a set of services each fulfilling a specific functionality. A tenant of the MESI has to trust only a minimal functionality of the tenant that offers the hardware resources. The rest of the services can be deployed by each tenant themselves
MESI is based on the idea of enabling tenants to share hardware they own with tenants they may not trust and between clusters with different security requirements. The architecture provides control and freedom of choice to the tenants whether they wish to deploy and manage these services themselves or use them from a trusted third party. MESI services fit into three layers that build on each other to provide: 1) Elastic Infrastructure, 2) Elastic Secure Infrastructure, and 3) Market-driven Elastic Secure Infrastructure.
1) Hardware Isolation Layer (HIL) – the bottommost layer of MESI is designed for moving nodes between multiple tools and schedulers used for managing the clusters. It defines HIL to control the layer 2 switches and bare-metal servers such that tenants can elastically adjust the size of the clusters in response to the changing demand of the workload. It enables the movement of nodes between clusters with minimal to no modifications required to the tools and workflow used for managing these clusters. (2) Elastic Secure Infrastructure (ESI) builds on HIL to enable sharing of servers between clusters with different security requirements and mutually non-trusting tenants of the Data Center. ESI enables the borrowing tenant to minimize its trust in the node provider and take control of trade-offs between cost, performance, and security. This enables sharing of nodes between tenants that are not only part of the same organization by can be organization tenants in a co-located Data Center. (3) The Bare-metal Marketplace is an incentive-based system that uses economic principles of the marketplace to encourage the tenants to share their servers with others not just when they do not need them but also when others need them more. It provides tenants the ability to define their own cluster objectives and sharing constraints and the freedom to decide the number of nodes they wish to share with others.
MESI is evaluated using prototype implementations at each layer of the architecture. (i) The HIL prototype implemented with only 3000 Lines of Code (LOC) is able to support many provisioning tools and schedulers with little to no modification; adds no overhead to the performance of the clusters and is in active production use at MOC managing over 150 servers and 11 switches. (ii) The ESI prototype builds on the HIL prototype and adds to it an attestation service, a provisioning service, and a deterministically built open-source firmware. Results demonstrate that it is possible to build a cluster that is secure, elastic, and fairly quick to set up. The tenant requires only minimum trust in the provider for the availability of the node. (iii) The MESI prototype demonstrates the feasibility of having a one-of-kind multi-provider marketplace for trading bare-metal servers where providers also use the nodes. The evaluation of the MESI prototype shows that all the clusters benefit from participating in the marketplace. It uses agents to trade bare-metal servers in a marketplace to meet the requirements of their clusters. Results show that compared to operating as silos individual clusters see a 50% improvement in the total work done; up to 75% improvement (reduction) in waiting for queues and up to 60% improvement in the aggregate utilization of the test bed.
This dissertation makes the following contributions: (i) It defines the architecture of MESI allows mutually non-trusting tenants of the data center to share resources between clusters with different security requirements. (ii) Demonstrates that it is possible to design a service that breaks the silos of static allocation of clusters yet has a small Trusted Computing Base (TCB) and no overhead to the performance of the clusters. (iii) Provides a unique architecture that puts the tenant in control of its own security and minimizes the trust needed in the provider for sharing nodes. (iv) A working prototype of a multi-provider marketplace for bare-metal servers which is a first proof-of-concept that demonstrates that it is possible to trade real bare-metal nodes at practical time scales such that moving nodes between clusters is sufficiently fast to be able to get some useful work done. (v) Finally results show that it is possible to encourage even mutually non-trusting tenants to share their nodes with each other without any central authority making allocation decisions. Many smart, dedicated engineers and researchers have contributed to this work over the years. I have jointly led the efforts to design the HIL and the ESI layer; led the design and implementation of the bare-metal marketplace and the overall MESI architecture
2022 Global Review of Constitutional Law
When we created the Global Review of Constitutional Law in 2016, our aspiration was tomake the world smaller and more familiar, by making the high court case law of the jurisdictions of the world available in English. Seven years later, we continue to make the world smaller, and hope to make it ever more in the years ahead. This edition of the Global Review is special for two reasons. First, it marks the second year of our new relationship with our publisher, Edizioni Università di Trieste (EUT), an outstanding academic press that has partnered with us to produce this magnificent resource for constitutional scholars around the world. Second, we have a new co-editor on the team: Giulia Andrade, a scholar and attorney in Brazil. Giulia brings an abundance of academic experience, complemented by her practical experience as a lawyer. We are grateful to have her on the team, and we look forward to many years together with her in this global collaboration. As always, the principal purpose of the Global Review remains the same this year: to offer readers systemic knowledge about jurisdiction-specific constitutional law that has previously been limited mainly to local networks rather than a broader readership. The Global Review has been useful to judges, academics, elected and appointed officials, and also to laypersons and beyond
Rethinking Collective Anxieties as a Genre in Post-9/11 Hollywood Movies
Dieses Buch ruft das Genre Kino der (kollektiven) Ängste ins Leben und beschreibt und analysiert dieses Genre anhand beispielhafter Fallstudien nach dem 9/11. Es liefert vielschichtige Filmanalysen zu vier Hollywood-Filmen; Crash (2004), The Brave One (2007), The Company Men (2010) und The Purge: Election Year (2016).
Diese Forschung stellt einen Versuch dar, eine abgrenzende Definition dieses Kinos als filmisches (Sub-)Genre zu konzipieren und einen Überblick über die Eigenschaften dieses Kinos zu geben, wobei besonderes Augenmerk auf post-9/11 Filme mit der Angst-Narrativ der inneren Bedrohung gelegt wird. Dieses Genre steht an der Schnittstelle ästhetischer Erkenntnisse, historischer Entwicklungen, kultureller Phänomene und politisch-ideologischer Schattierungen, was die Hybridisierung zu einem der Hauptmerkmale dieser Filmgattung macht. Diese Studie betrachtet das kollektive Angstkino nach dem 9/11 als eine Ansammlung historischer Ängste, von denen einige aus genau dieser Zeit stammen (wie der Patriot Act und die ständigen Alarmstufen Rot), während andere auf frühere Epochen der US-Geschichte zurückgehen (wie die Ankunft der ersten europäischen Siedler in einer unbekannten feindlichen Umgebung, die Hexenjagd in Salem, der Rote Schrecken, die Bürgerrechtsbewegung und die satanische Panik). Anders gesagt, das Buch untersucht die inneren Assoziationen der Filme mit einer Reihe historischer Ängste von der Gründung Amerikas bis zur Gegenwart. Darüber hinaus geht diese Studie den Echos dieser Ängste nach und beleuchtet ihre Ausdrucksformen und ihre Echos in anderen Filmen, literarischen Werken, Genres und Mythen.
Obwohl die untersuchten Ängste oft mit relativ spezifischen Problemen verbunden sind (wie Race-Ängste und Kulturkriege, Kriminalitätsängste und Waffenkultur, Wirtschaftsängste und der Finanzcrash sowie politische Ängste und Wahlparanoia), sind sie immer noch überwiegend, nach Ansicht der Autorin, das Produkt eines halben Jahrhunderts neoliberaler Politik.This book brings 'the cinema of (collective) anxieties' to life as a genre, and it describes and analyzes this genre based on exemplary post-9/11 case studies. Thus, it provides multilayered film analyses of four Hollywood movies; Crash (2004), The Brave One (2007), The Company Men (2010), and The Purge: Election Year (2016).
This research constitutes an attempt to conceptualize a demarcating definition of this cinema as a cinematic (sub)genre and to provide an outline of the traits and characteristics of this cinema while paying special attention to the cycle of post-9/11 movies depicting the fear narrative of internal threat. This genre stands at a junction of aesthetic realizations, historical developments, cultural phenomena, and political-ideological shades, which makes hybridization one of the leading features of this cinematic genre.
This study approaches the post-9/11 collective anxiety cinema as an accumulation of historical anxieties, some of which stem from this very period (such as the Patriot Act and the constant Red Alerts), while others date back to earlier eras in US history (such as the arrival of the first European settlers in an unknown hostile environment, the Salem Witch Hunt, the Red Scare, the civil rights movement, and the Satanic panic). In other words, the book explores the films' inner associations with bundles of historical anxieties from the inception of America until the current era. Furthermore, this study traces the echoes of these anxieties and highlights their forms of expression and their echoes in other movies, literary works, genres, and myths.
Although the examined anxieties are often tied to relatively specific problems (like racial anxieties and culture wars; crime anxieties and gun culture; economic anxieties and the financial crash; political anxiety and election paranoia), they are still largely, in the author's view, the product of half a century of neoliberal policies
- …