87 research outputs found

    Restoring the privacy and confidentality of users over Mobile Collaborative Learning (MCL) environment

    Get PDF
    Rogue DHCP server spreads the wrong network parameters that create the bridge for attackers to expose confidentiality and privacy. Trojans like DNS-changing installs the rogue DHCP server and pollutes the network. It provides the chances for attackers to use compromised resources on network. Rogue DHCP server creates several problems to expose the privacy of legitimate users. Two important attacks are shown in figure 1. The poster focuses on two of most important issues

    Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)

    Get PDF
    Mobile collaborative learning (MCL) is highly acknowledged and focusing paradigm in eductional institutions and several organizations across the world. It exhibits intellectual synergy of various combined minds to handle the problem and stimulate the social activity of mutual understanding. To improve and foster the baseline of MCL, several supporting architectures, frameworks including number of the mobile applications have been introduced. Limited research was reported that particularly focuses to enhance the security of those pardigms and provide secure MCL to users. The paper handles the issue of rogue DHCP server that affects and disrupts the network resources during the MCL. The rogue DHCP is unauthorized server that releases the incorrect IP address to users and sniffs the traffic illegally. The contribution specially provides the privacy to users and enhances the security aspects of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with novel algorithms through addition of new rules in IDS and mathematcal model. The major target of contribution is to detect the malicious attacks and blocks the illegal activities of rogue DHCP server. This innovative security mechanism reinforces the confidence of users, protects network from illicit intervention and restore the privacy of users. Finally, the paper validates the idea through simulation and compares the findings with other existing techniques.Comment: 20 pages and 11 figures; International Journal of Computer Networks and Communications (IJCNC) July 2012, Volume 4. Number

    A Case Study of an Ethnically-Tailored Community-Based Mental Health Program: Washington Christian Counseling Institute

    Get PDF
    Disparities in health and mental health service utilization among racial and ethnic groups in the U.S. are well documented, with many studies having identified accessibility to linguistically and culturally informed services as a key barrier to service utilization. Korean Americans in particular, being the most recent immigrant group of Asian Americans, reportedly suffer from higher rates of depression and anxiety than other Asian American groups. There is, however, some indication that Asian Americans do utilize ethnicity-specific programs at a higher rate than mainstream services when such services are made available to them. Therefore, this study seeks to investigate and explain the case of the Washington Christian Counseling Institute (WCCI), an organization that utilizes an innovative mental health service delivery approach to address the mental health needs of the Korean American immigrant community in the Washington, D.C. metropolitan area. It is hoped that the study contributes to developing a model for meeting the mental health needs of immigrant communities of similar cultural backgrounds in the US. The method used for this study is an intrinsic descriptive case study that is historical and sociological in orientation, utilizing record reviews, observations, and in-depth interviews for data collection. The key findings of this case study rendered a set of guiding principles that can help to create and maintain a mental health service delivery for under-served ethnic minority communities, which is ethnically-tailored, community-centered, and faith-based and promotes multi-level collaboration and integration

    An architecture framework for enhanced wireless sensor network security

    Get PDF
    This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish secure WSNs, in a distributed and self-healing manner. Wireless Sensors are used to monitor and control environmental properties such as sound, acceleration, vibration, air pollutants, and temperature. Due to their limited resources in computation capability, memory and energy, their security schemes are susceptible to many kinds of security vulnerabilities. This thesis investigated all possible network attacks on WSNs and at the time of writing, 19 different types of attacks were identified, all of which are discussed including exposures to the attacks, and the impact of those attacks. The author then utilises this work to examine the ZigBee series, which are the new generation of wireless sensor network products with built-in layered security achieved by secure messaging using symmetric cryptography. However, the author was able to uniquely identify several security weaknesses in ZigBee by examining its protocol and launching the possible attacks. It was found that ZigBee is vulnerable to the following attacks, namely: eavesdropping, replay attack, physical tampering and Denial of Services (DoS). The author then provides solutions to improve the ZigBee security through its security schema, including an end-to-end WSN security framework, architecture design and sensor configuration, that can withstand all types of attacks on the WSN and mitigate ZigBee’s WSN security vulnerabilities

    2013-2014, August - Integrated Regional Water Management Plan for the Greater Monterey County Region

    Get PDF
    An Integrated Regional Water Management Plan (IRWM Plan) developed by 18 member entities that include government agencies, nonprofit organizations, educational organizations, water service districts, private water companies, and organizations representing agricultural, environmental, and community interests. The IRWM Plan is an expansion and modification of a previous plan – the May 2006 Salinas Valley Integrated Regional Water Management Functionally Equivalent Plan developed by Monterey County Water Resources Agency. While the traditional approach to water resource management has typically involved separate and distinct agencies managing different aspects of the water system, i.e., water supply, water quality, flood management, and natural resources, integrated regional water management considers the hydrologic system as a whole. The IRWM planning process brings together water and natural resource managers, along with other community stakeholders, to collaboratively plan for and ensure the region’s continued water supply reliability, improved water quality, flood management, and healthy functioning ecosystems—allowing for creative new solutions, greater efficiencies, and an increased promise of long-term success.https://digitalcommons.csumb.edu/hornbeck_cgb_5/1020/thumbnail.jp

    In Our Blood: Mapping Narrative Enactments of Leukaemia Online

    Full text link
    Often externally invisible, and currently considered incurable, chronic lymphocytic leukaemia (CLL) presents with variable progression outcomes from indolent, through actively progressive, to terminal in some cases. Diagnosed with CLL myself, and having learned much of what I know about my disease online, this virtual ethnography triangulates autopathographic narrative with object oriented philosophies to map digital narrative circulations relating to the disease. Observing that key CLL online support sites function as hubs within complex networks connecting through to a variety of narrative enactments of CLL, this thesis draws on Actor-Network-Theory (ANT) throughout to explore and explain these narrative phenomena. The work shows that stories relating to CLL circulate in differing forms across networks peopled with varied actors (both human and non-human artefacts), key among which is the informed, connected and empowered ‘e-patient’. These digital actors mobilize a wealth of information from translations of the complex evolving science pushing the boundaries of biomedical understanding and treatment, to sharing the daily effects of living with a cancer whose sufferers record exceptionally low emotional well-being. By exploring the intersection of circulating narratives of a single disease online from a perspective of their material rather than representational effects, I locate them as inscriptions of the practices enacted by the individuals, organizations and institutions producing and putting them into circulation. In doing so, I argue that this study successfully puts into practice an innovative approach for studying disease and its narrative performances in online support and knowledge exchange networks, revealing complex networks of intersections among the multiple narrative inscriptions of CLL online. The work identifies some of the key actors and narratives engaged in that process, demonstrating some of the network effects produced when they come together. Notable among the multiple effects generated through these complex assemblages of collaborative narrative circulation in online communities are changing patterns of knowledge exchange in clinical relationships, an over-arching potential for a variety of forms of patient empowerment, and the emergence of new open and generative forms of digital pathographies
    • …
    corecore