25,731 research outputs found

    Terrorism and IT: cyberterrorism and terrorist organisations online

    Get PDF

    Deep pockets, packets, and harbours

    Get PDF
    Deep Packet Inspection (DPI) is a set of methodologies used for the analysis of data flow over the Internet. It is the intention of this paper to describe technical details of this issue and to show that by using DPI technologies it is possible to understand the content of Transmission Control Protocol/Internet Protocol communications. This communications can carry public available content, private users information, legitimate copyrighted works, as well as infringing copyrighted works. Legislation in many jurisdictions regarding Internet service providers’ liability, or more generally the liability of communication intermediaries, usually contains “safe harbour” provisions. The World Intellectual Property Organization Copyright Treaty of 1996 has a short but significant provision excluding liability for suppliers of physical facilities. The provision is aimed at communication to the public and the facilitation of physical means. Its extensive interpretation to cases of contributory or vicarious liability, in absence of specific national implementation, can prove problematic. Two of the most relevant legislative interventions in the field, the Digital Millennium Copyright Act and the European Directive on Electronic Commerce, regulate extensively the field of intermediary liability. This paper looks at the relationship between existing packet inspection technologies, especially the ‘deep version,’ and the international and national legal and regulatory interventions connected with intellectual property protection and with the correlated liabilities ‘exemptions. In analyzing the referred two main statutes, we will take a comparative look at similar interventions in Australia and Canada that can offer some interesting elements of reflection

    Reality bytes: cyberterrorism and terrorist 'use' of the Internet

    Get PDF
    This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non-violent 'Use' at one end to 'Cyberterrorism' at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups' 'use' of the Internet, in particular the content of their Web sites, and their 'misuse' of the medium, as in hacking wars, for example. Terrorist groups' use of the Internet for the purpose of inter-group communication is also surveyed, partly because of its importance for the inter-networked forms of organisation apparently being adopted by these groups, but also due to the part played by the Internet in the events of September 11 and their aftermath

    An Efficient Transport Protocol for delivery of Multimedia An Efficient Transport Protocol for delivery of Multimedia Content in Wireless Grids

    Get PDF
    A grid computing system is designed for solving complicated scientific and commercial problems effectively,whereas mobile computing is a traditional distributed system having computing capability with mobility and adopting wireless communications. Media and Entertainment fields can take advantage from both paradigms by applying its usage in gaming applications and multimedia data management. Multimedia data has to be stored and retrieved in an efficient and effective manner to put it in use. In this paper, we proposed an application layer protocol for delivery of multimedia data in wireless girds i.e. multimedia grid protocol (MMGP). To make streaming efficient a new video compression algorithm called dWave is designed and embedded in the proposed protocol. This protocol will provide faster, reliable access and render an imperceptible QoS in delivering multimedia in wireless grid environment and tackles the challenging issues such as i) intermittent connectivity, ii) device heterogeneity, iii) weak security and iv) device mobility.Comment: 20 pages, 15 figures, Peer Reviewed Journa

    Innovation Policy and the Economy, Volume 1

    Get PDF

    Determinants in the on-line distribution of digital content: an exploratory analysis

    Get PDF
    This article shows the phases – and discusses the results – of an empirical analysis addressing the legal business models that are adopted online to distribute digital content

    Electronic security - risk mitigation in financial transactions : public policy issues

    Get PDF
    This paper builds on a previous series of papers (see Claessens, Glaessner, and Klingebiel, 2001, 2002) that identified electronic security as a key component to the delivery of electronic finance benefits. This paper and its technical annexes (available separately at http://www1.worldbank.org/finance/) identify and discuss seven key pillars necessary to fostering a secure electronic environment. Hence, it is intended for those formulating broad policies in the area of electronic security and those working with financial services providers (for example, executives and management). The detailed annexes of this paper are especially relevant for chief information and security officers responsible for establishing layered security. First, this paper provides definitions of electronic finance and electronic security and explains why these issues deserve attention. Next, it presents a picture of the burgeoning global electronic security industry. Then it develops a risk-management framework for understanding the risks and tradeoffs inherent in the electronic security infrastructure. It also provides examples of tradeoffs that may arise with respect to technological innovation, privacy, quality of service, and security in designing an electronic security policy framework. Finally, it outlines issues in seven interrelated areas that often need attention in building an adequate electronic security infrastructure. These are: 1) The legal framework and enforcement. 2) Electronic security of payment systems. 3) Supervision and prevention challenges. 4) The role of private insurance as an essential monitoring mechanism. 5) Certification, standards, and the role of the public and private sectors. 6) Improving the accuracy of information on electronic security incidents and creating better arrangements for sharing this information. 7) Improving overall education on these issues as a key to enhancing prevention.Knowledge Economy,Labor Policies,International Terrorism&Counterterrorism,Payment Systems&Infrastructure,Banks&Banking Reform,Education for the Knowledge Economy,Knowledge Economy,Banks&Banking Reform,International Terrorism&Counterterrorism,Governance Indicators
    • 

    corecore