2,853 research outputs found

    Teaching as a Reflective Practice: Orgasmial Theory and its Refutation

    Get PDF
    An interdisciplinary study examining teaching as a reflective practice with special emphasis on expanding the underlying factors of constructing and maintaining an empowering learning environment, as well as the need for and development of “transformative integrity” as part of a proactive teaching praxis

    Wide spectrum attribution: Using deception for attribution intelligence in cyber attacks

    Get PDF
    Modern cyber attacks have evolved considerably. The skill level required to conduct a cyber attack is low. Computing power is cheap, targets are diverse and plentiful. Point-and-click crimeware kits are widely circulated in the underground economy, while source code for sophisticated malware such as Stuxnet is available for all to download and repurpose. Despite decades of research into defensive techniques, such as firewalls, intrusion detection systems, anti-virus, code auditing, etc, the quantity of successful cyber attacks continues to increase, as does the number of vulnerabilities identified. Measures to identify perpetrators, known as attribution, have existed for as long as there have been cyber attacks. The most actively researched technical attribution techniques involve the marking and logging of network packets. These techniques are performed by network devices along the packet journey, which most often requires modification of existing router hardware and/or software, or the inclusion of additional devices. These modifications require wide-scale infrastructure changes that are not only complex and costly, but invoke legal, ethical and governance issues. The usefulness of these techniques is also often questioned, as attack actors use multiple stepping stones, often innocent systems that have been compromised, to mask the true source. As such, this thesis identifies that no publicly known previous work has been deployed on a wide-scale basis in the Internet infrastructure. This research investigates the use of an often overlooked tool for attribution: cyber de- ception. The main contribution of this work is a significant advancement in the field of deception and honeypots as technical attribution techniques. Specifically, the design and implementation of two novel honeypot approaches; i) Deception Inside Credential Engine (DICE), that uses policy and honeytokens to identify adversaries returning from different origins and ii) Adaptive Honeynet Framework (AHFW), an introspection and adaptive honeynet framework that uses actor-dependent triggers to modify the honeynet envi- ronment, to engage the adversary, increasing the quantity and diversity of interactions. The two approaches are based on a systematic review of the technical attribution litera- ture that was used to derive a set of requirements for honeypots as technical attribution techniques. Both approaches lead the way for further research in this field

    Interactive Art and the Action of Behavioral Aesthetics in Embodied Philosophy

    Get PDF
    https://digitalmaine.com/academic/1004/thumbnail.jp

    Philosophical foundations of the Death and Anti-Death discussion

    Get PDF
    Perhaps there has been no greater opportunity than in this “VOLUME FIFTEEN of our Death And Anti-Death set of anthologies” to write about how might think about life and how to avoid death. There are two reasons to discuss “life”, the first being enhancing our understanding of who we are and why we may be here in the Universe. The second is more practical: how humans meet the physical challenges brought about by the way they have interacted with their environment. Many persons discussing “life” beg the question about what “life” is. Surely, when one discusses how to overcome its opposite, death, they are not referring to another “living” thing such as a plant. There seems to be a commonality, though, and it is this commonality is one needing elaboration. It ostensibly seems to be the boundary condition separating what is completely passive (inert) from what attempts to maintain its integrity, as well as fulfilling other conditions we think “life” has. In our present discussion, there will be a reminder that it by no means has been unequivocally established what life really is by placing quotes around the word, namely, “life”. Consider it a tag representing a bundle of philosophical ideas that will be unpacked in this paper

    Introduction

    Get PDF

    To Imagine a Future: A Social Entrepreneurship Program for Youth in High Risk Environments in Carpinteria, California

    Full text link
    This research project seeks to examine the opportunity gaps facing the adolescents of Carpinteria for the purpose of suggesting a program that intends to address these challenges, in fitting with the mission statement to create pathways for children and youth to flourish, for the Pro Deo Foundation to fund and operate. Section One examines the problem that this dissertation seeks to address, specifically describing the difficult realities that teenagers in Carpinteria face in their everyday lives. Through research with human participants, including community members, leaders and administrators, this section gives the context of the subject matter, its history and the current opportunity gaps that exist for adolescents. Carpinteria is a unique small town with a complex biracial history. Section Two details the ways in which various leaders and institutions have been seeking to address the opportunity gaps in Carpinteria. From government-funded after school programs, to non-profits and faith communities, this section describes the needs that are currently being addressed. This research reveals where gaps continue to be present, posing a new opportunity for the community. Section Three uses socio-cultural and developmental theory as dialogue partners for practical theology. In light of the insights gained from local research, this section proposes a thesis that integrates place identity, discovery of passion, and development of vocation as a pathway for teenagers in high risk environments to imagine a positive future for themselves. This thesis calls for a new Christian social entrepreneurship program for adolescents, in the heart of the community. Section Four describes this program as the artifact, including the vision, values, design, budget, and all components of the program. The program includes mentoring, micro-business, financial education, product-making, and family services

    Hybrid Museum Experiences

    Get PDF
    "So you’re the one getting this gift? Lucky you! Someone who knows you has visited the museum. They searched out things they thought you would care about, and they took photos and left messages for you.” This is the welcoming message for the Gift app, designed to create a very personal museum visit. Hybrid Museum Experiences use new technologies to augment, expand or alter the physical experience of visiting the museum. They are designed to be experienced in close relation to the physical space and exhibit. In this book we discuss three forms of hybridity in museum experiences: incorporating the digital and the physical, creating social, yet personal and intimate experiences, and exploring ways to balance visitor participation and museum curation. The book reports on a three-year cross-disciplinary research project in which artists, design researchers and museum professionals have collaborated to create technology-mediated experiences that merge with the museum environment
    • …
    corecore