103,375 research outputs found

    Obstacles to the Adoption of Secure Communication Tools

    Get PDF
    The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools (e.g., Signal, Telegram) have been launched with security as a key selling point. However it remains unclear if users understand what protection these tools offer, and if they value that protection. In this study, we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools. We identified a number of incorrect mental models that underpinned participants' beliefs

    Free Space Optical Communication

    Get PDF
    Communication is key to day to day activities for all companies and people. Wireless communication has made us expect more from our tools. Radio Frequency has been the preferred medium for a couple decades, but there is a need for faster secure communication. Free Space Optical Communication is an alternate wireless communication system which uses optics to create a link. It utilizes low-power and converts an analog signal into digital pulses which are transmitted across space to a receiver. Its only caveat is its vulnerability under atmospheric obstacles. The goal of this project is to create a free space optical transmitter and receiver link that can circumvent the attenuation inherent in adverse weather conditions such as fog presence. The target requirement for the system is to enable multiple wavelength transmission at safe power levels through non-optimal conditions with minimal errors in the link. The receiver reads the signal as a current input which is amplified to establish an optical link. The integration of optical wavelengths will improve the quality of transmission. The system will strive to minimize signal attenuation from atmospheric obstacles such as fog. This solution will offer customers an alternative wireless medium to Radio Frequency in which Free Space Optical Communication offers a higher bandwidth link at faster speeds while consuming less power. It also offers the same high speed bandwidth seen today in fiber optic cables at a fraction of the cost due to the free space element which eliminates physical wires. Intuitive FSO systems that combine these specifications with a potential transmission distance of up to 2 kilometers will prove to be lucratively successful in industry. The end result will enable more widespread adoption of FSO technology in addition to securing cheap, smaller community footprint data handling for customers of nearly all business structures. Customers will benefit from an ecologically resilient wireless communication option that ensures security and transmission at competitive speeds

    Implementing Education Policy: Getting From What Now? to What Works

    Get PDF
    Outlines key lessons from the 2011 Education Grantmakers Institute about funding the implementation of policy change as well as advocacy and building public will. Offers framework for planning, stakeholder engagement, capacity building, and communication

    Identity in research infrastructure and scientific communication: Report from the 1st IRISC workshop, Helsinki Sep 12-13, 2011

    Get PDF
    Motivation for the IRISC workshop came from the observation that identity and digital identification are increasingly important factors in modern scientific research, especially with the now near-ubiquitous use of the Internet as a global medium for dissemination and debate of scientific knowledge and data, and as a platform for scientific collaborations and large-scale e-science activities.

The 1 1/2 day IRISC2011 workshop sought to explore a series of interrelated topics under two main themes: i) unambiguously identifying authors/creators & attributing their scholarly works, and ii) individual identification and access management in the context of identity federations. Specific aims of the workshop included:

• Raising overall awareness of key technical and non-technical challenges, opportunities and developments.
• Facilitating a dialogue, cross-pollination of ideas, collaboration and coordination between diverse – and largely unconnected – communities.
• Identifying & discussing existing/emerging technologies, best practices and requirements for researcher identification.

This report provides background information on key identification-related concepts & projects, describes workshop proceedings and summarizes key workshop findings

    The Utilization of Mobile Technology for Crime Scene Investigation in the San Francisco Bay Area

    Get PDF
    The research presented aims to explore factors affecting the decision to adopt a mobile crime scene investigation application in police departments throughout the San Francisco Bay Area. To accomplish this goal, the mobile technology acceptance model was used in designing a survey for data collection. This model utilizes four categories to interpret the factors that influence a police officer’s decision to accept or reject mobile technologies: performance, security and reliability, management style, and cognitive acceptance. Nine police departments were sampled through a series of in-person and over-the-phone interviews to obtain data regarding factors affecting the adoption of a mobile crime scene investigation application. Results suggest that if a mobile crime scene investigation application were made available, a vast majority of the police departments in the Bay Area would implement this new technology

    Resilience of multi-robot systems to physical masquerade attacks

    Full text link
    The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and security-critical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience.Accepted manuscrip

    Challenges of Internet of Things and Big Data Integration

    Full text link
    The Internet of Things anticipates the conjunction of physical gadgets to the In-ternet and their access to wireless sensor data which makes it expedient to restrain the physical world. Big Data convergence has put multifarious new opportunities ahead of business ventures to get into a new market or enhance their operations in the current market. considering the existing techniques and technologies, it is probably safe to say that the best solution is to use big data tools to provide an analytical solution to the Internet of Things. Based on the current technology deployment and adoption trends, it is envisioned that the Internet of Things is the technology of the future, while to-day's real-world devices can provide real and valuable analytics, and people in the real world use many IoT devices. Despite all the advertisements that companies offer in connection with the Internet of Things, you as a liable consumer, have the right to be suspicious about IoT advertise-ments. The primary question is: What is the promise of the Internet of things con-cerning reality and what are the prospects for the future.Comment: Proceedings of the International Conference on International Conference on Emerging Technologies in Computing 2018 (iCETiC '18), 23rd -24th August, 2018, at London Metropolitan University, London, UK, Published by Springer-Verla
    • …
    corecore