46,911 research outputs found

    The Summit on Creativity and Aging in America

    Get PDF
    This report looks at how the federal government can leverage the arts to foster healthy aging and inclusive design for this growing population. This white paper features recommendations from the May 2015 Summit on Creativity and Aging in America, a convening of more than 70 experts hosted by the National Endowment for the Arts and the National Center for Creative Aging. The paper highlights recommendations on healthy aging, lifelong learning in the arts, and age-friendly community design. The summit was a precursor to the 2015 White House Conference on Aging, which addressed four major issues: retirement security, long-term services and supports, healthy aging, and elder abuse

    Spartan Daily, October 2, 1975

    Get PDF
    Volume 65, Issue 15https://scholarworks.sjsu.edu/spartandaily/6000/thumbnail.jp

    Potential mass surveillance and privacy violations in proximity-based social applications

    Get PDF
    Proximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive geo-localisation and used to build a sense of serendipitous discovery of people, places and interests. Unfortunately, while this class of applications opens different interactions possibilities for people in urban settings, obtaining access to certain identity information could lead a possible privacy attacker to identify and follow a user in their movements in a specific period of time. The same information shared through the platform could also help an attacker to link the victim's online profiles to physical identities. We analyse a set of popular dating application that shares users relative distances within a certain radius and show how, by using the information shared on these platforms, it is possible to formalise a multilateration attack, able to identify the user actual position. The same attack can also be used to follow a user in all their movements within a certain period of time, therefore identifying their habits and Points of Interest across the city. Furthermore we introduce a social attack which uses common Facebook likes to profile a person and finally identify their real identity

    Spartan Daily, October 31, 2003

    Get PDF
    Volume 121, Issue 45https://scholarworks.sjsu.edu/spartandaily/9911/thumbnail.jp

    Spartan Daily, August 28, 1980

    Get PDF
    Volume 75, Issue 1https://scholarworks.sjsu.edu/spartandaily/13014/thumbnail.jp

    Spartan Daily, April 21, 1978

    Get PDF
    Volume 70, Issue 51https://scholarworks.sjsu.edu/spartandaily/6342/thumbnail.jp
    • …
    corecore