446,935 research outputs found

    Privacy in Real-Time Systems

    Get PDF
    Abstract We study the problem of privacy in the framework of Timed Automata. By distinguishing between secret and observable actions we formulate a property of no-privacy in terms of a property of the language accepted by a Timed Automaton, and we give an algorithm checking such property

    The impacts of text-based CMC on online social presence

    Get PDF
    Social presence is a critical influence on learners’ online social interaction in an online learning environment via computer-mediated communication (CMC) systems. This study examines how three CMC systems, e-mail, bulletin board, and real-time discussion, influence the level of online social presence and privacy. Mixed methods were applied to examine the relationships of three CMC systems with social presence and privacy. The results indicate (a) E-mail is perceived to possess the highest level of social presence, followed by the real-time discussion and bulletin board; (b) one-to-one e-mail was perceived to have a higher level of privacy while one-to-many was perceived less privacy; and (c) in addition to the attributes of CMC systems, learners’ perceptions of CMC systems impacted level of privacy as well. This study suggested that the format of CMC systems, e-mail and real-time discussion should be examined in two different formats: one-to-one e-mail, one-to-many e-mail, one-to-one real-time discussion, and many-to-many real-time discussion

    Cashless Societies and the Rise of the Independent Cryptocurrencies: How Governments Can Use Privacy Laws to Compete with Independent Cryptocurrencies

    Get PDF
    Many individuals (including governments) envision living in a future world where physical currency is a thing of the past. Many countries have made great strides in their efforts to go cashless. At the same time, there is increasing awareness among citizens of the decreasing amount of privacy in their lives. The potential hazards cashless societies pose to financial privacy may incentivize citizens to hold some of their money in independent cryptocurrencies. This article argues that in order for governments in cashless societies to keep firm control over their money supply, they should enact stronger privacy law protections for its citizens in order to decrease the real or perceived loss of (financial) privacy. This paper compares the privacy laws that exist today in both the United States and the European Union and suggests combining elements of both legal systems in order create a more privacy-friendly legal framework that can enable governments to complete against independent cryptocurrencies

    Mechatronics & the cloud

    Get PDF
    Conventionally, the engineering design process has assumed that the design team is able to exercise control over all elements of the design, either directly or indirectly in the case of sub-systems through their specifications. The introduction of Cyber-Physical Systems (CPS) and the Internet of Things (IoT) means that a design team’s ability to have control over all elements of a system is no longer the case, particularly as the actual system configuration may well be being dynamically reconfigured in real-time according to user (and vendor) context and need. Additionally, the integration of the Internet of Things with elements of Big Data means that information becomes a commodity to be autonomously traded by and between systems, again according to context and need, all of which has implications for the privacy of system users. The paper therefore considers the relationship between mechatronics and cloud-basedtechnologies in relation to issues such as the distribution of functionality and user privacy
    corecore