87,956 research outputs found

    The Undisclosed Dangers of Parental Sharing on Social Media: A Content Analysis of Sharenting Images on Instagram

    Get PDF
    Sharenting is a new term used to define the action of parents posting about their children online. Social media provides parents with an easy to use outlet for image distribution to all family and friends that simultaneously archives the images into a digital baby book. While convenient, once publicly posted anyone can gain access to the images of the children. Instagram is a favorable social media channel for sharenting. A popular hashtag on Instagram, #letthembelittle, contains 8 million posts dedicated to child imagery. A set of 300 randomly selected images under the hashtag were coded. Images tended to contain personal information such as the child’s name, age, and location. Communication Privacy Management and Uses and Gratifications theories provided the theoretical frameworks for this study. The results suggested a possibly dangerous pattern of parental oversharing that could negatively impact the child and the child’s safety

    On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

    Full text link
    Millimeter wave (mmWave) vehicular communica tion systems have the potential to improve traffic efficiency and safety. Lack of secure communication links, however, may lead to a formidable set of abuses and attacks. To secure communication links, a physical layer precoding technique for mmWave vehicular communication systems is proposed in this paper. The proposed technique exploits the large dimensional antenna arrays available at mmWave systems to produce direction dependent transmission. This results in coherent transmission to the legitimate receiver and artificial noise that jams eavesdroppers with sensitive receivers. Theoretical and numerical results demonstrate the validity and effectiveness of the proposed technique and show that the proposed technique provides high secrecy throughput when compared to conventional array and switched array transmission techniques

    When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance

    Full text link
    We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications Commission (FCC), all certified spectrum databases synchronize their records. Hence, the same copy of spectrum database is available through multiple (distinct) providers. We harness the synergy between multi-server private information retrieval (PIR) and database- driven CRN architecture to offer an optimal level of privacy with high efficiency by exploiting this observation. We demonstrated, analytically and experimentally with deployments on actual cloud systems that, our adaptations of multi-server PIR outperform that of the (currently) fastest single-server PIR by a magnitude of times with information theoretic security, collusion resiliency, and fault-tolerance features. Our analysis indicates that multi-server PIR is an ideal cryptographic tool to provide location privacy in database-driven CRNs, in which the requirement of replicated databases is a natural part of the system architecture, and therefore SUs can enjoy all advantages of multi-server PIR without any additional architectural and deployment costs.Comment: 10 pages, double colum

    WhoĘĽs Watching Us at Work? Toward a Structural-Perceptual Model of Electronic Monitoring and Surveillance in Organizations

    Get PDF
    Nearly 80% of organizations now employ some form of employee surveillance. This significant level of use infers a salient need for additional theory and research into the effects of monitoring and surveillance. Accordingly, this essay examines the panoptic effects of electronic monitoring and surveillance (EM/S) of social communication in the workplace and the underlying structural and perceptual elements that lead to these effects. It also provides future scholarly perspectives for studying EM/S and privacy in the organization from the vantage point of contemporary communication technologies, such as the telephone, voice mail, e-mail, and instant messaging, utilized for organizational communication. Finally, four propositions are presented in conjunction with a new communication-based model of EM/S, providing a framework incorporating three key components of the panoptic effect: (a) communication technology use, (b) organizational factors, and (c) organizational policies for EM/S

    An Empirical Investigation of the Level of Users’ Acceptance of E-Banking in Nigeria

    Get PDF
    Nigeria was depicted to be the fastest growing telecommunications nation in African. Presently, all members of the Nigeria banking industry have engaged the use of Information and Communication Technology (ICT) as a platform for effective and efficient means of conducting financial transactions. This paper focuses on determining the level of users’ acceptance of the electronic banking services and investigating the factors that determine users’ behavioral intentions to use electronic banking systems in Nigeria. The survey instrument employed involved design and administration of a total of 500 survey questionnaires within the Lagos metropolis and its environs. An extended Technology Acceptance Model (TAM) was employed as a conceptual framework to investigate the factors that influence users’ acceptance and intention to use electronic banking. To test the model, data was collected from 292 customers from various commercial banks in Nigeria. The model measured the impact of Perceived Credibility (PC), Computer Self-Efficacy (CSE), Perceived Usefulness (PU), and Perceived Ease of Use (PEOU) on customer attitude and customer attitude on customer adaptation. The result of this research shows that ATM still remains the most widely used form e-Banking service. Banks’ customers who are active users of e-Banking system use it because it is convenient, easy to use, time saving and appropriate for their transaction needs. Also the network security and the security of the system in terms of privacy are the major concerns of the users and constitute hindrance to intending users

    Finite-Block-Length Analysis in Classical and Quantum Information Theory

    Full text link
    Coding technology is used in several information processing tasks. In particular, when noise during transmission disturbs communications, coding technology is employed to protect the information. However, there are two types of coding technology: coding in classical information theory and coding in quantum information theory. Although the physical media used to transmit information ultimately obey quantum mechanics, we need to choose the type of coding depending on the kind of information device, classical or quantum, that is being used. In both branches of information theory, there are many elegant theoretical results under the ideal assumption that an infinitely large system is available. In a realistic situation, we need to account for finite size effects. The present paper reviews finite size effects in classical and quantum information theory with respect to various topics, including applied aspects
    • …
    corecore