11 research outputs found

    Cybersecurity

    Get PDF
    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections: Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective

    A speaker classification framework for non-intrusive user modeling : speech-based personalization of in-car services

    Get PDF
    Speaker Classification, i.e. the automatic detection of certain characteristics of a person based on his or her voice, has a variety of applications in modern computer technology and artificial intelligence: As a non-intrusive source for user modeling, it can be employed for personalization of human-machine interfaces in numerous domains. This dissertation presents a principled approach to the design of a novel Speaker Classification system for automatic age and gender recognition which meets these demands. Based on literature studies, methods and concepts dealing with the underlying pattern recognition task are developed. The final system consists of an incremental GMM-SVM supervector architecture with several optimizations. An extensive data-driven experiment series explores the parameter space and serves as evaluation of the component. Further experiments investigate the language-independence of the approach. As an essential part of this thesis, a framework is developed that implements all tasks associated with the design and evaluation of Speaker Classification in an integrated development environment that is able to generate efficient runtime modules for multiple platforms. Applications from the automotive field and other domains demonstrate the practical benefit of the technology for personalization, e.g. by increasing local danger warning lead time for elderly drivers.Die Sprecherklassifikation, also die automatische Erkennung bestimmter Merkmale einer Person anhand ihrer Stimme, besitzt eine Vielzahl von Anwendungsmöglichkeiten in der modernen Computertechnik und Künstlichen Intelligenz: Als nicht-intrusive Wissensquelle für die Benutzermodellierung kann sie zur Personalisierung in vielen Bereichen eingesetzt werden. In dieser Dissertation wird ein fundierter Ansatz zum Entwurf eines neuartigen Sprecherklassifikationssystems zur automatischen Bestimmung von Alter und Geschlecht vorgestellt, welches diese Anforderungen erfüllt. Ausgehend von Literaturstudien werden Konzepte und Methoden zur Behandlung des zugrunde liegenden Mustererkennungsproblems entwickelt, welche zu einer inkrementell arbeitenden GMM-SVM-Supervector-Architektur mit diversen Optimierungen führen. Eine umfassende datengetriebene Experimentalreihe dient der Erforschung des Parameterraumes und zur Evaluierung der Komponente. Weitere Studien untersuchen die Sprachunabhängigkeit des Ansatzes. Als wesentlicher Bestandteil der Arbeit wird ein Framework entwickelt, das alle im Zusammenhang mit Entwurf und Evaluierung von Sprecherklassifikation anfallenden Aufgaben in einer integrierten Entwicklungsumgebung implementiert, welche effiziente Laufzeitmodule für verschiedene Plattformen erzeugen kann. Anwendungen aus dem Automobilbereich und weiteren Domänen demonstrieren den praktischen Nutzen der Technologie zur Personalisierung, z.B. indem die Vorlaufzeit von lokalen Gefahrenwarnungen für ältere Fahrer erhöht wird

    Doing It Ourselves: The Networked Practices Of Feminist Media Activism

    Get PDF
    Feminist organizing in the United States is undergoing a paradigm shift. Whereas 1960s-era feminism unfolded through the in-person activities of formal organizations, today, feminist movements are mediated and networked. Contemporary feminism manifests as hashtags, blogs, print zines, digitally coordinated protests, online communities, and more. Case studies of recent movements suggest that, for feminists, to be networked is to be both politically empowered and politically vulnerable. At the same time that emerging media platforms enable activists to quickly reach wide audiences at little or no expense, networked movements face online harassment, commercial cooptation, and activist burnout. This qualitative study examines how feminists are navigating the double-edged nature of networked activism. In particular, I demonstrate how feminists are drawing on networked media to organize resistance, mobilize protests, and cultivate communities, all while juggling the affordances and limitations of their media tools. Data for this study come from an ethnographic analysis of grassroots feminist media activism in the city of Philadelphia, textual analyses of national and transnational feminist media campaigns, and interviews with and archived reflections from activists. Through this data, I argue that feminists’ negotiations among media platforms, the political context, and their intersectional values produce a particular activist praxis. I call this praxis do-it-ourselves (DIO) feminism, an organizing paradigm that draws on networked media to build feminist movements from the ground up that reflect feminist values and meet the challenges of the current climate. Faced with an electoral system and a history of collective organizing that has failed to address intersecting systems of oppression, DIO feminists do not rely on existing political institutions. Instead, they draw on networked media to create their own communities, discourses, and protests, cutting out the middlemen of political leaders, organizations, parties, and policy-makers and integrating protest into everyday life. Feminists’ turn toward diffuse, decentralized media networks and away from formal organizations raises questions about movement accessibility, sustainability, backlash, impact, and cooptation. But the do-it-ourselves praxis is a distinctly feminist form of networked activism that models new possibilities for what collective action and social transformation can look like in the networked era

    Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad: actas de las VIII Jornadas Nacionales de InvestigaciĂłn en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de InvestigaciĂłn en Ciberseguridad (8ÂŞ. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernizaciĂłn tecnolĂłxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    Actas de las VI Jornadas Nacionales (JNIC2021 LIVE)

    Get PDF
    Estas jornadas se han convertido en un foro de encuentro de los actores más relevantes en el ámbito de la ciberseguridad en España. En ellas, no sólo se presentan algunos de los trabajos científicos punteros en las diversas áreas de ciberseguridad, sino que se presta especial atención a la formación e innovación educativa en materia de ciberseguridad, y también a la conexión con la industria, a través de propuestas de transferencia de tecnología. Tanto es así que, este año se presentan en el Programa de Transferencia algunas modificaciones sobre su funcionamiento y desarrollo que han sido diseñadas con la intención de mejorarlo y hacerlo más valioso para toda la comunidad investigadora en ciberseguridad

    Computational and Causal Approaches on Social Media and Multimodal Sensing Data: Examining Wellbeing in Situated Contexts

    Get PDF
    A core aspect of our lives is often embedded in the communities we are situated in. The interconnectedness of our interactions and experiences intertwines our situated context with our wellbeing. A better understanding of wellbeing will help us devise proactive and tailored support strategies. However, existing methodologies to assess wellbeing suffer from limitations of scale and timeliness. These limitations are surmountable by social and ubiquitous technologies. Given its ubiquity and wide use, social media can be considered a “passive sensor” that can act as a complementary source of unobtrusive, real-time, and naturalistic data to infer wellbeing. This dissertation leverages social media in concert with multimodal sensing data, which facilitate analyzing dense and longitudinal behavior at scale. This work adopts machine learning, natural language, and causal inference analysis to infer wellbeing of individuals and collectives, particularly in situated communities, such as college campuses and workplaces. Before incorporating sensing modalities in practice, we need to account for confounds. One such confound that might impact behavior change is the phenomenon of “observer effect” --- that individuals may deviate from their typical or otherwise normal behavior because of the awareness of being “monitored”. I study this problem by leveraging the potential of longitudinal and historical behavioral data through social media. Focused on a multimodal sensing study, I conduct a causal study to measure observer effect in social media behavior, and explain the observations through existing theory in psychology and social science. The findings provide recommendations to correcting biases due to observer effect in social media sensing for human behavior and wellbeing. The novelties and contributions of this dissertation are four-fold. First, I use social media data that uniquely captures the behavior of situated communities. Second, I adopt theory-driven computational and causal methods to make conclusive research claims on wellbeing dynamics. Third, I address major challenges with methods to combine social media with multimodal sensing data for a comprehensive understanding of human behavior. Fourth, I draw interpretations and explanations of online-data-driven offline inferences. This dissertation situates the findings in an interdisciplinary context, including psychology and social science, and bears implications from theoretical, practical, design, methodological, and ethical perspectives catering to various stakeholders, including researchers, practitioners, and policymakers.Ph.D

    Data and the city – accessibility and openness. a cybersalon paper on open data

    Get PDF
    This paper showcases examples of bottom–up open data and smart city applications and identifies lessons for future such efforts. Examples include Changify, a neighbourhood-based platform for residents, businesses, and companies; Open Sensors, which provides APIs to help businesses, startups, and individuals develop applications for the Internet of Things; and Cybersalon’s Hackney Treasures. a location-based mobile app that uses Wikipedia entries geolocated in Hackney borough to map notable local residents. Other experiments with sensors and open data by Cybersalon members include Ilze Black and Nanda Khaorapapong's The Breather, a "breathing" balloon that uses high-end, sophisticated sensors to make air quality visible; and James Moulding's AirPublic, which measures pollution levels. Based on Cybersalon's experience to date, getting data to the people is difficult, circuitous, and slow, requiring an intricate process of leadership, public relations, and perseverance. Although there are myriad tools and initiatives, there is no one solution for the actual transfer of that data
    corecore