1,242 research outputs found

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    Construction and Use Examples of Private Electronic Notary Service in Educational Institutions

    Get PDF
    People have many documents. For example, a variety of documents are prepared and used in public institutions. As the internet becomes widely available in recent years, paper documents are being replaced with electronic data, which are often distributed in the form of electronic data without being printed out. Similarly, in educational institutions, increasing number of documents are distributed in the form of electronic data. Such data are distributed through various routes and means, and prone to the risk of alteration in the process. Data may be protected against alteration, but it is difficult to completely prevent data alteration in the distribution process. Data can be generated with electronic signature that allows for the identification of data creator and possible alterations by third parties. This method is, however, not valid if the data becomes separated from the electronic signature, making the validation of data creator or data alterations difficult or impossible. In this paper, we describe the invention of a system that, even in cases where data is separated form the electronic signature, enables easy identification of possible data alterations by the electronic signature management. And we describe here an exploratory construction of private electronic notary service in university. We also add a review on the utilization method of private electronic notary service in universities

    CONCURRENT DIAGNOSTICS IN MULTIPROCESSOR SYSTEMS

    Get PDF
    The paper presents a survey of diagnostic methods for multiprocessor systems. The diagnostic means known so far are first summarized and evaluated from the point of view of their applicability to systems with distributed control and specifically to the multiprocessor systems. A combination of different diagnostic means is then suggested in order to achieve the maximum diagnostic coverage with minimum overhead

    The Lived Experiences of Lesbian and Gay Clients Who Terminated Counseling Prematurely

    Get PDF
    Due to a lack of understanding lesbian and gay lived experiences in counseling, the counseling field is also lacking understanding of the lesbian and gay experiences in counseling that lead to premature termination. Without the knowledge of personal understanding of these experiences, it is difficult to also understand how to retain lesbian and gay clients, provide appropriate counselor training, and even explore cultural humility. The term cultural humility represents the implicit and explicit impact that culture has on the counselor and challenges assumptions made by the practitioner as well as assumptions about client culture (Fisher-Borne et al., 2015). The experiences of the lesbian and gay population are not well documented and are lacking in the research. Utilizing Relational-Cultural Theory (RCT) and the hermeneutic phenomenology of Van Manen (2016), this research study explored insight about lesbian and gay adult lived experiences who have terminated counseling prematurely. Hand coding was used to explore the narratives of 6 participants that generated 4 major themes and 11 subordinate themes. Themes included therapeutic alliance, interpersonal interference, ethical boundaries, cultural humility/cultural misunderstanding, and cultural invalidation. The results of this study gave a voice to the participants\u27 challenges in counseling and offered awareness into what helped retain the participants and what might have implicated early termination. A better understanding of these experiences may equip counselors and counselors in training about the lesbian and gay adult population in counseling, how to retain them, and give clues to understanding ongoing cultural dissonance in counseling

    Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives

    Get PDF
    Käesolevas magistritöös vaadeldakse BDOC ja ASiC-E digitaalselt allkirjastatud dokumendikonteinerite sisu ning kirjeldatakse nende huvipakkuvaid omadusi. Teatava hulga näidiskonteinerite vaatlemise järel pakub autor välja faili päise ja faili jaluse kombinatsiooni (signatuuri), mis oluliselt parandab nimetatud failide kustutatud olekust sihitud taastamist külgnevatest klastritest NTFS vormindatud tihendamata kettal, võttes arvesse klassikalise kõvaketta geomeetriat. Ühtlasi kirjeldab autor kohtuekspertiisi koha pealt tähendust omavaid andmeid ZIP kohaliku faili päises ja keskkataloogi kirjes, XML signatuuris ja ASN.1 kodeeritud kihtides ning nende kättesaamise algoritmi. Nendele järeldustele tuginedes loob autor Phytoni skripte ja viib läbi mitmeid teste failide taastamiseks faili signatuuri järgi ning huvipakkuvate andmete väljavõtmiseks. Teste viiakse läbi teatava valiku failide üle ja tulemusi võrreldakse mitme kohtuekspertiisis laialt kasutatava peavoolu töökeskkonnaga, samuti mõningate andmetaaste tööriistadega. Lõpuks testitakse magistritöö käigus pakutud digitaalselt allkirjastatud dokumentide taastamiseks mõeldud signatuuri ja andmete väljavõtmise algoritmi suurel hulgal avalikust dokumendiregistrist pärit kehtivate dokumentidega, mis saadi kätte spetsiaalselt selleks kirjutatud veebirobotiga. Nimetatud teste viiakse läbi dokumentide üle, mille hulgas on nii digitaalselt allkirjastatud dokumente kui ka teisi, nendega struktuurilt sarnaseid dokumente.This thesis reviews the contents and observes certain properties of digitally signed documents of BDOC and ASiC-E container formats. After reviewing a set of sample containers, the author comes up with a header and footer combination (signature) significantly improving pinpointed carving-based recovery of those files from a deleted state on NTFS formatted uncompressed volumes in contiguous clusters, taking into account the geometry of classic disk drives. The author also describes forensically meaningful attributive data found in ZIP Headers and Central Directory, XML signatures as well as embedded ASN.1 encoded data of the sample files and suggests an algorithm for the extraction of such data. Based on these findings, the author creates scripts in Python and executes a series of tests for file carving and extraction of attributive data. These tests are run over the samples placed into unallocated clusters and the results are compared to several mainstream commercial forensic examination suites as well as some popular data recovery tools. Finally, the author web-scrapes a large number of real-life documents from a government agency’s public document registry. The carving signature and the data-extractive algorithm are thereafter applied on a larger scale and in an environment competitively supplemented with structurally similar containers

    Rejecting the Myth of Popular Sovereignty and Applying an Agency Model to Direct Democracy

    Get PDF
    The use of direct democracy is at its highest level in more than one hundred years.\u27 The direct initiative, which is the primary focus of this Article, allows private citizens to bypass the traditional legislative process and make binding laws, often in highly contentious areas of public policy. The 2000 elections, for example, placed directly before voters the issues of school vouchers, physician-assisted suicide, same- sex marriage and other gay and lesbian rights, gun control, campaign finance reform, bilingual education, gambling, medical use of marijuana, and sentencing for drug offenders, as well as some of the perennial favorites-tax reform and environmental policy. The prominence of direct democracy in American government is likely to increase in the foreseeable future as a result of widespread public support for the process, as well as technological innovations, like the Internet, that promise virtually instant access to voters\u27 preferences. Not surprisingly, as the use of direct democracy has come to play a more prominent role in the formulation of public policy, this type of lawmaking has also received closer scrutiny from legal scholars, governmental commissions, and the media. Although direct democracy undoubtedly has its supporters among these ranks, a number of commentators have criticized initiative lawmaking on a variety of theoretical and practical grounds. Some advocate the outright abolition of initiative lawmaking on constitutional grounds
    corecore