2,159 research outputs found

    More than a touristic visit: scholar exchanges as a communication method in public diplomacy

    Get PDF
    This paper discusses the concept of Public Diplomacy and the effectiveness of a specific Public Diplomacy tool: Scholar Exchanges as a tool of Public Diplomacy. The foreign Fulbright Program of the United States Government is introduced as a case study and for further interpreting the perceptions of the program, a survey is ran among 59 current grantees. Scholar exchanges programs are suggested to be implemented in order to overcome the barriers in communication processes in the international arena

    Choosing IT Platforms In The Age Of Stuxnet

    Get PDF
    This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source software, and opting for managed services such as public cloud computing versus in-house hardware/communication infrastructures.  These dilemmas in strategic information systems planning have become more significant in light of the recent revelations of security backdoors in commercial software, encryption backdoors in communication software, and governmental access to private data on managed services for national security reasons.  This paper considers enterprise-wide challenges and strategies for adopting open source software/hardware in response to these security concerns

    A PERSPECTIVE ON TECHNOLOGY EDUCATION FOR LAW STUDENTS

    Get PDF
    A PERSPECTIVE ON TECHNOLOGY EDUCATION FOR LAW STUDENT

    At the Gates: Analysis of Malicious Activity Facing Residential IP Addresses

    Get PDF
    The prevalence and permeation of technology in business has allowed for new and very creative ways to steal. With data breaches becoming more common (and more publicized), many people are aware of the threats that large companies face. However, the digital threats that a normal person faces are not as apparent. While many stories exist of people using technology to threaten or harass others, many are not necessarily aware of the threats these large scale data thieves pose to those who just simply own an always-on internet connection. This project was conceived as a way to see what threatens the common user. Using SecurityOnion, ESXI, and an unpatched operating system a simple network intrusion detection system was created to capture the reconnaissance traffic being sent to a residential IP address. The usage of ESXI allows for fast deployment of new exploitable systems as well as easy packet capture with virtual switches. SecurityOnion was used due to its’ ease of use and detailed tutorials. An unpatched, unregistered, and unprotected (no firewall or antivirus) copy of Windows XP was used as the honeypot. All unsolicited packets from unknown IP addresses were then analyzed for country of origin to gain statistics on where attackers are coming from (or rather where they wish to be seen coming from), as well as to see the most common ports that were being scanned for

    Access to the Internet and Regional Structures: The Case of Italy

    Get PDF
    I study the effects of Internet access on regional structures and provide some insights into the complex question of the role of technology in regional development. The paper analyzes the distribution of access to the Internet in Italy, highlighting the differences among regions and sub-regional areas and with respect to categories of users. This is an aspect of the so-called \u201cdigital divide\u201d. I concentrate on the stability and change of regional structures in Italy, pointing at conclusions of general relevance. My analysis confirms the dynamism of the regions of the so-called \u201cThird Italy\u201d and the fundamental distinction between the North-Center with respect to the South, the Italian Mezzogiorno. My preliminary conclusions on the effects of the Internet in promoting economic development suggest lines for further investigation. Key Words: Regional development, Italy, Internet, digital divide JEL Classifications: R11, R12, O3

    Int J Tuberc Lung Dis

    Get PDF
    Migrant health is a critical public health issue, and in many countries attention to this topic has focused on the link between migration and communicable diseases, including tuberculosis (TB). When creating public health policies to address the complex challenges posed by TB and migration, countries should focus these policies on evidence, ethics, and human rights. This paper traces a commonly used migration route from sub-Saharan Africa to Europe, identifying situations at each stage in which human rights and ethical values might be affected in relation to TB care. This illustration provides the basis for discussing TB and migration from the perspective of human rights, with a focus on the right to health. We then highlight three strands of discussion in the ethics and justice literature in an effort to develop more comprehensive ethics of migrant health. These strands include theories of global justice and global health ethics, the creation of 'firewalls' to separate enforcement of immigration law from protection of human rights, and the importance of non-stigmatization to health justice. The paper closes by reflecting briefly on how TB programs can better incorporate human rights and ethical principles and values into public health practice.20172018-10-01T00:00:00ZCC999999/Intramural CDC HHS/United States28911349PMC5793855870

    Vulnerability analysis of three remote voting methods

    Get PDF
    This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page
    • …
    corecore