41,554 research outputs found

    Public Health Versus Court-Sponsored Secrecy

    Get PDF
    Public health practice relies on access to information. Givelber and Robbins discuss the debate about court-sponsored secrecy: Whether or not courts should tolerate, edorse, or protect secrecy when the sequestered information might help protect the public health

    On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets

    Full text link
    Millimeter wave (mmWave) vehicular communica tion systems have the potential to improve traffic efficiency and safety. Lack of secure communication links, however, may lead to a formidable set of abuses and attacks. To secure communication links, a physical layer precoding technique for mmWave vehicular communication systems is proposed in this paper. The proposed technique exploits the large dimensional antenna arrays available at mmWave systems to produce direction dependent transmission. This results in coherent transmission to the legitimate receiver and artificial noise that jams eavesdroppers with sensitive receivers. Theoretical and numerical results demonstrate the validity and effectiveness of the proposed technique and show that the proposed technique provides high secrecy throughput when compared to conventional array and switched array transmission techniques

    E-democracy and values in information systems design

    Get PDF
    In this paper I demonstrate the utility of a Values in Design (VID) perspective for the assessment, the design and development of e-democracy tools. In the first part, I give some background information on Values in Design and Value-Sensitive Design and their relevance in the context of e-democracy. In part 2, I analyze three different e-democracy tools from a VID-perspective. The paper ends with some conclusions concerning the merits of VID for e-democracy as well as some considerations concerning the dual tasks of philosophers in assessing and promoting value-sensitive technology design

    Election '08: A Pro-Civil Justice Presidential Platform

    Get PDF
    Many Presidential candidates claim they stand "for the little guy," but do they have a proactive policy for strengthening our civil justice system so that it works for those whom it was meant to protect? Well, we have some ideas. The Drum Major Institute's latest report, Election '08: A Pro-Civil Justice Presidential Platform, lays out common-sense policy proposals that would turn the balance of power back to regular Americans

    UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective

    Get PDF
    Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important. This paper considers the power allocation strategy for a UAV swarm-enabled aerial network to enhance the physical layer security of the downlink transmission, where an eavesdropper moves following the trajectory of the swarm for better eavesdropping. Unlike existing works, we use only the large-scale channel state information (CSI) and maximize the secrecy throughput in a whole-trajectory-oriented manner. The overall transmission energy constraint on each UAV and the total transmission duration for all the legitimate users are considered. The non-convexity of the formulated problem is solved by using max-min optimization with iteration. Both the transmission power of desired signals and artificial noise (AN) are derived iteratively. Simulation results are presented to validate the effectiveness of our proposed power allocation algorithm and to show the advantage of aerial CoMP by using only the large-scale CSI

    ANALYSING FACTORS INFLUENCING INTANGIBLE ASSET DISCLOSURE (STUDY IN SOUTH-EAST ASIA AND AUSTRALIA TELECOMMUNICATION INDUSTRY)

    Get PDF
    This study aims to examine intangible asset voluntary disclosure practices in annual report telecommunication company in South East Asia and Australia. This research sample is 75 telecommunication company at year 2007, 2008 dan 2009. Intangible asset disclosure study consist of three categories; structural capital, relational capital and human capital, based on Oliveira et al. categories. This study using content analysis method in annual report sample companies with index developed by Oliveira et al. as dependent variable. Independent variable which are firm size, leverage, ownership concentration, EBITDA margin, legal system of home country and secrecy accounting value, are analysed as factors influencing intangible asset voluntary disclosure practices. A significant positive relationship was observed between intangible asset voluntary disclosure and firm size and secrecy accounting value. However, leverage, ownership concentration, EBITDA margin and legal system of home country did not influence intangible asset voluntary disclosure practices

    Opioid Multidistrict Litigation Secrecy

    Get PDF
    • …
    corecore