533 research outputs found

    On Securing Communication From Profilers

    Get PDF
    A profiling adversary is an adversary which aims to classify messages into pre-defined profiles and thus gain useful information regarding the sender or receiver of such messages. Usual chosen-plaintext secure encryption schemes are capable of securing information from profilers, but these schemes provide more security than required for this purpose. In this paper we study the requirements for an encryption algorithm to be secure only against profilers and finally give a precise notion of security for such schemes. We also present a full protocol for secure (against profiling adversaries) communication, which neither requires a key exchange nor a public key infrastructure. Our protocol guarantees security against non-human profilers and is constructed using CAPTCHAs and secret sharing schemes

    Pay as You Go: A Generic Crypto Tolling Architecture

    Full text link
    The imminent pervasive adoption of vehicular communication, based on dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will foster a richer service ecosystem for vehicular applications. The appearance of new cryptography based solutions envisaging digital identity and currency exchange are set to stem new approaches for existing and future challenges. This paper presents a novel tolling architecture that harnesses the availability of 5G C-V2X connectivity for open road tolling using smartphones, IOTA as the digital currency and Hyperledger Indy for identity validation. An experimental feasibility analysis is used to validate the proposed architecture for secure, private and convenient electronic toll payment

    Balancing Consumer Privacy with Behavioral Targeting

    Get PDF

    Volume 42, Number 13: November 19, 2004

    Get PDF

    Media Effects and Criminal Profiling: How Fiction Influences Perception and Profile Accuracy

    Get PDF
    The objective of this dissertation was to investigate whether media and fictional information that is observed daily can influence perception to build a criminal psychological profile. Staggering between a distinguished art and science, the term profiling has been known by several different names – including criminal profiling, psychological profiling, offender profiling and more. Bandura (2009) believed that exposure to television and other media feeds into a socially constructed reality, where the audience is inevitably influenced by the beliefs and cognitions of observed media. The researcher believed that exposure to media can either influence criminal profiling and investigations with increasing accuracy or encourage perpetuated stereotypes. Kocsis, Hayes, and Irwin (2002) suggested that increased exposure to crime dramas creates a bias that decreases profile accuracy. The researcher examined the knowledge and perceptions of profiling and the crime scene examination skills of approximately 119 law enforcement professionals both active and retired at the local, state, and federal levels as well as college students to determine if these theories were accurate. This dissertation examines the literature on profiling and how it aids in criminal investigations for law enforcement officers, as well as in risk assessments for psychologists, approaches, and legal admissibility in courts. The data explores the reactions of exposure to media and crime television shows in relation to criminal psychological profiling, as well as the ability to accurately profile a crime and an offender based on the skills needed, specifically objective reasoning. The participants were asked questions utilizing a questionnaire to determine their exposure to crime related television shows and fictional media, and their views on profiling. The participants were then given a case scenario and asked to provide a criminal psychological profile based on the information given in the case paired with completing the Profiling Offender Characteristics Questionnaire adapted from Kocsis et al. (2000). Active and retired law enforcement professionals as well as college students seemed to agree on the belief that criminal profiling can be influenced by fictional and non-fictional media. The researcher found in a regression analysis that media consumption influenced the ability for participants to accurately create a criminal profile. This research contributes to the field of crime and media because it aids in law enforcement training, as well as criminal justice and psychology studies to ensure time and resources are invested correctly – ensuring that individuals are creating a criminal profile that will not have law enforcement searching for the wrong offender. The results of this study expound on previous profiling research leading to the determination if profiling should continue to be considered as a viable tool

    Crime scene of the mind: Prohibition, enjoyment, and the criminal profiler in film and television

    Get PDF
    Scope and Method of Study: This dissertation traces the evolution of the FBI agent in American popular culture from the 1930s to the present day. Until the 1950s, the FBI agent's symbolic status as an elite moral crusader was transmitted through the figure of the G-Man, an action-detective hero featured in such films as G-Men (1935) and The House on 92nd Street (1945). In the 1970s, however, the death of J. Edgar Hoover and the revelation of the FBI's abuse of civil rights changed the image of the FBI agent, often shifting it from the hero to the villain. The fallen status of the FBI agent is redeemed by the emergence of the criminal profiler in the 1980s, and this dissertation shows that the criminal profiler first seen in Manhunter (1986) and The Silence of the Lambs (1991) combined the heroism of the G-Man with the disgraced agent of the 1970s to form an ambiguous character that reflected, on the one hand, the Bureau's attempt to recuperate its image, and, on the other hand, changing attitudes towards the symbolic authority of the FBI. This dissertation theorizes the appeal of the shift from the G-Man's moral clarity to the profiler's ambiguity.Findings and Conclusions: The shifting image of the FBI depends on the difference between two portrayals of solving crime; whereas the G-Man solves crimes through a physically challenging quest, which leads to the satisfactory apprehension and punishment of the criminal, the profiler replaces the G-Man's quest with the injunction to become the criminal, authorizing a fantasy of complete criminal satisfaction, in which the audience is invited to enjoy. Working within the tradition of Jacques Lacan and neoLacanian theorists such as Todd McGowan, Slavoj Zizek, and Renata Salecl, this study contends that contemporary culture is in the process of transforming itself from a society based on prohibition to one based on private enjoyment. Ultimately, this dissertation concludes that the appeal of the criminal profiler is a reflection of society's inward turn towards private enjoyment and away from social and communal obligations

    Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

    Full text link
    Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available

    The Sociological Eye 2018

    Get PDF
    Faculty Advisor: Dr. Rebecca Sager & Dr. Stacy Burns Co-Editors: Jonathan Santos, Alex Meek, & Kees Wilcoxhttps://digitalcommons.lmu.edu/thesociologicaleyestudentjournal/1003/thumbnail.jp
    • …
    corecore