41,554 research outputs found
Public Health Versus Court-Sponsored Secrecy
Public health practice relies on access to information. Givelber and Robbins discuss the debate about court-sponsored secrecy: Whether or not courts should tolerate, edorse, or protect secrecy when the sequestered information might help protect the public health
On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets
Millimeter wave (mmWave) vehicular communica tion systems have the potential
to improve traffic efficiency and safety. Lack of secure communication links,
however, may lead to a formidable set of abuses and attacks. To secure
communication links, a physical layer precoding technique for mmWave vehicular
communication systems is proposed in this paper. The proposed technique
exploits the large dimensional antenna arrays available at mmWave systems to
produce direction dependent transmission. This results in coherent transmission
to the legitimate receiver and artificial noise that jams eavesdroppers with
sensitive receivers. Theoretical and numerical results demonstrate the validity
and effectiveness of the proposed technique and show that the proposed
technique provides high secrecy throughput when compared to conventional array
and switched array transmission techniques
E-democracy and values in information systems design
In this paper I demonstrate the utility of a Values in Design (VID) perspective for the assessment, the design and development of e-democracy tools. In the first part, I give some background information on Values in Design and Value-Sensitive Design and their relevance in the context of e-democracy. In part 2, I analyze three different e-democracy tools from a VID-perspective. The paper ends with some conclusions concerning the merits of VID for e-democracy as well as some considerations concerning the dual tasks of philosophers in assessing and promoting value-sensitive technology design
Election '08: A Pro-Civil Justice Presidential Platform
Many Presidential candidates claim they stand "for the little guy," but do they have a proactive policy for strengthening our civil justice system so that it works for those whom it was meant to protect? Well, we have some ideas. The Drum Major Institute's latest report, Election '08: A Pro-Civil Justice Presidential Platform, lays out common-sense policy proposals that would turn the balance of power back to regular Americans
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV),
aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In
this case, the management of multiple UAVs is important. This paper considers
the power allocation strategy for a UAV swarm-enabled aerial network to enhance
the physical layer security of the downlink transmission, where an eavesdropper
moves following the trajectory of the swarm for better eavesdropping. Unlike
existing works, we use only the large-scale channel state information (CSI) and
maximize the secrecy throughput in a whole-trajectory-oriented manner. The
overall transmission energy constraint on each UAV and the total transmission
duration for all the legitimate users are considered. The non-convexity of the
formulated problem is solved by using max-min optimization with iteration. Both
the transmission power of desired signals and artificial noise (AN) are derived
iteratively. Simulation results are presented to validate the effectiveness of
our proposed power allocation algorithm and to show the advantage of aerial
CoMP by using only the large-scale CSI
ANALYSING FACTORS INFLUENCING INTANGIBLE ASSET DISCLOSURE (STUDY IN SOUTH-EAST ASIA AND AUSTRALIA TELECOMMUNICATION INDUSTRY)
This study aims to examine intangible asset voluntary disclosure practices
in annual report telecommunication company in South East Asia and Australia.
This research sample is 75 telecommunication company at year 2007, 2008 dan
2009. Intangible asset disclosure study consist of three categories; structural
capital, relational capital and human capital, based on Oliveira et al. categories.
This study using content analysis method in annual report sample
companies with index developed by Oliveira et al. as dependent variable.
Independent variable which are firm size, leverage, ownership concentration,
EBITDA margin, legal system of home country and secrecy accounting value, are
analysed as factors influencing intangible asset voluntary disclosure practices.
A significant positive relationship was observed between intangible asset
voluntary disclosure and firm size and secrecy accounting value. However,
leverage, ownership concentration, EBITDA margin and legal system of home
country did not influence intangible asset voluntary disclosure practices
- …