87,956 research outputs found
The Undisclosed Dangers of Parental Sharing on Social Media: A Content Analysis of Sharenting Images on Instagram
Sharenting is a new term used to define the action of parents posting about their children online. Social media provides parents with an easy to use outlet for image distribution to all family and friends that simultaneously archives the images into a digital baby book. While convenient, once publicly posted anyone can gain access to the images of the children. Instagram is a favorable social media channel for sharenting. A popular hashtag on Instagram, #letthembelittle, contains 8 million posts dedicated to child imagery. A set of 300 randomly selected images under the hashtag were coded. Images tended to contain personal information such as the child’s name, age, and location. Communication Privacy Management and Uses and Gratifications theories provided the theoretical frameworks for this study. The results suggested a possibly dangerous pattern of parental oversharing that could negatively impact the child and the child’s safety
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets
Millimeter wave (mmWave) vehicular communica tion systems have the potential
to improve traffic efficiency and safety. Lack of secure communication links,
however, may lead to a formidable set of abuses and attacks. To secure
communication links, a physical layer precoding technique for mmWave vehicular
communication systems is proposed in this paper. The proposed technique
exploits the large dimensional antenna arrays available at mmWave systems to
produce direction dependent transmission. This results in coherent transmission
to the legitimate receiver and artificial noise that jams eavesdroppers with
sensitive receivers. Theoretical and numerical results demonstrate the validity
and effectiveness of the proposed technique and show that the proposed
technique provides high secrecy throughput when compared to conventional array
and switched array transmission techniques
When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy Assurance
We show that it is possible to achieve information theoretic location privacy
for secondary users (SUs) in database-driven cognitive radio networks (CRNs)
with an end-to-end delay less than a second, which is significantly better than
that of the existing alternatives offering only a computational privacy. This
is achieved based on a keen observation that, by the requirement of Federal
Communications Commission (FCC), all certified spectrum databases synchronize
their records. Hence, the same copy of spectrum database is available through
multiple (distinct) providers. We harness the synergy between multi-server
private information retrieval (PIR) and database- driven CRN architecture to
offer an optimal level of privacy with high efficiency by exploiting this
observation. We demonstrated, analytically and experimentally with deployments
on actual cloud systems that, our adaptations of multi-server PIR outperform
that of the (currently) fastest single-server PIR by a magnitude of times with
information theoretic security, collusion resiliency, and fault-tolerance
features. Our analysis indicates that multi-server PIR is an ideal
cryptographic tool to provide location privacy in database-driven CRNs, in
which the requirement of replicated databases is a natural part of the system
architecture, and therefore SUs can enjoy all advantages of multi-server PIR
without any additional architectural and deployment costs.Comment: 10 pages, double colum
WhoĘĽs Watching Us at Work? Toward a Structural-Perceptual Model of Electronic Monitoring and Surveillance in Organizations
Nearly 80% of organizations now employ some form of employee surveillance. This significant level of use infers a salient need for additional theory and research into the effects of monitoring and surveillance. Accordingly, this essay examines the panoptic effects of electronic monitoring and surveillance (EM/S) of social communication in the workplace and the underlying structural and perceptual elements that lead to these effects. It also provides future scholarly perspectives for studying EM/S and privacy in the organization from the vantage point of contemporary communication technologies, such as the telephone, voice mail, e-mail, and instant messaging, utilized for organizational communication. Finally, four propositions are presented in conjunction with a new communication-based model of EM/S, providing a framework incorporating three key components of the panoptic effect: (a) communication technology use, (b) organizational factors, and (c) organizational policies for EM/S
An Empirical Investigation of the Level of Users’ Acceptance of E-Banking in Nigeria
Nigeria was depicted to be the fastest growing telecommunications nation in African. Presently, all members of the Nigeria banking industry have engaged the use of Information and Communication Technology (ICT) as a platform for effective and efficient means of conducting financial transactions. This paper focuses on determining the level of users’ acceptance of the electronic banking services and investigating the factors that determine users’ behavioral intentions to use electronic banking systems in Nigeria.
The survey instrument employed involved design and administration of a total of 500 survey questionnaires within the Lagos metropolis and its environs. An extended Technology Acceptance Model (TAM) was employed as a conceptual framework to investigate the factors that influence users’ acceptance and intention to use electronic banking. To test the model, data was collected from 292 customers from various commercial banks in Nigeria. The model measured the impact of Perceived Credibility (PC), Computer Self-Efficacy (CSE), Perceived Usefulness (PU), and Perceived Ease of Use (PEOU) on customer attitude and customer attitude on customer adaptation.
The result of this research shows that ATM still remains the most widely used form e-Banking service. Banks’ customers who are active users of e-Banking system use it because it is convenient, easy to use, time saving and appropriate for their transaction needs. Also the network security and the security of the system in terms of privacy are the major concerns of the users and constitute hindrance to intending users
Finite-Block-Length Analysis in Classical and Quantum Information Theory
Coding technology is used in several information processing tasks. In
particular, when noise during transmission disturbs communications, coding
technology is employed to protect the information. However, there are two types
of coding technology: coding in classical information theory and coding in
quantum information theory. Although the physical media used to transmit
information ultimately obey quantum mechanics, we need to choose the type of
coding depending on the kind of information device, classical or quantum, that
is being used. In both branches of information theory, there are many elegant
theoretical results under the ideal assumption that an infinitely large system
is available. In a realistic situation, we need to account for finite size
effects. The present paper reviews finite size effects in classical and quantum
information theory with respect to various topics, including applied aspects
- …