11 research outputs found

    The Problematic of Privacy in the Namespace

    Get PDF
    In the twenty-first century, the issue of privacy--particularly the privacy of individuals with regard to their personal information and effects--has become highly contested terrain, producing a crisis that affects both national and global social formations. This crisis, or problematic, characterizes a particular historical conjuncture I term the namespace. Using cultural studies and the theory of articulation, I map the emergent ways that the namespace articulates economic, juridical, political, cultural, and technological forces, materials, practices and protocols. The cohesive articulation of the namespace requires that privacy be reframed in ways that make its diminution seem natural and inevitable. In the popular media, privacy is often depicted as the price we pay as citizens and consumers for security and convenience, respectively. This discursive ideological shift supports and underwrites the interests of state and corporate actors who leverage the ubiquitous network of digitally connected devices to engender a new regime of informational surveillance, or dataveillance. The widespread practice of dataveillance represents a strengthening of the hegemonic relations between these actors--each shares an interest in promoting an emerging surveillance society, a burgeoning security politics, and a growing information economy--that further empowers them to capture and store the personal information of citizens/consumers. In characterizing these shifts and the resulting crisis, I also identify points of articulation vulnerable to rearticulation and suggest strategies for transforming the namespace in ways that might empower stronger protections for privacy and related civil rights

    Smart PIN: performance and cost-oriented context-aware personal information network

    Get PDF
    The next generation of networks will involve interconnection of heterogeneous individual networks such as WPAN, WLAN, WMAN and Cellular network, adopting the IP as common infrastructural protocol and providing virtually always-connected network. Furthermore, there are many devices which enable easy acquisition and storage of information as pictures, movies, emails, etc. Therefore, the information overload and divergent content’s characteristics make it difficult for users to handle their data in manual way. Consequently, there is a need for personalised automatic services which would enable data exchange across heterogeneous network and devices. To support these personalised services, user centric approaches for data delivery across the heterogeneous network are also required. In this context, this thesis proposes Smart PIN - a novel performance and cost-oriented context-aware Personal Information Network. Smart PIN's architecture is detailed including its network, service and management components. Within the service component, two novel schemes for efficient delivery of context and content data are proposed: Multimedia Data Replication Scheme (MDRS) and Quality-oriented Algorithm for Multiple-source Multimedia Delivery (QAMMD). MDRS supports efficient data accessibility among distributed devices using data replication which is based on a utility function and a minimum data set. QAMMD employs a buffer underflow avoidance scheme for streaming, which achieves high multimedia quality without content adaptation to network conditions. Simulation models for MDRS and QAMMD were built which are based on various heterogeneous network scenarios. Additionally a multiple-source streaming based on QAMMS was implemented as a prototype and tested in an emulated network environment. Comparative tests show that MDRS and QAMMD perform significantly better than other approaches

    Peer-to-Peer Based Trading and File Distribution for Cloud Computing

    Get PDF
    In this dissertation we take a peer-to-peer approach to deal with two specific issues, fair trading and file distribution, arisen from data management for cloud computing. In mobile cloud computing environment cloud providers may collaborate with each other and essentially organize some dedicated resources as a peer to peer sharing system. One well-known problem in such peer to peer systems with exchange of resources is free riding. Providing incentives for peers to contribute to the system is an important issue in peer to peer systems. We design a reputation-based fair trading mechanism that favors peers with higher reputation. Based on the definition of the reputation used in the system, we derive a fair trading policy. We evaluate the performance of reputation-based trading mechanisms and highlight the scenarios in which they can make a difference. Distribution of data to the resources within a cloud or to different collaborating clouds efficiently is another issue in cloud computing. The delivery efficiency is dependent on the characteristics of the network links available among these network nodes and the mechanism that takes advantage of them. Our study is based on the Global Environment for Network Innovations (GENI), a testbed for researchers to build a virtual laboratory at scale to explore future Internets. Our study consists of two parts. First, we characterize the links in the GENI network. Even though GENI has been used in many research and education projects, there is no systematic study about what we can expect from the GENI testbeds from a performance perspective. The goal is to characterize the links of the GENI networks and provide guidance for GENI experiments. Second, we propose a peer to peer approach to file distribution for cloud computing. We develop a mechanism that uses multiple delivery trees as the distribution structure, which takes into consideration the measured performance information in the GENI network. Files are divided into chunks to improve parallelism among different delivery trees. With a strict scheduling mechanism for each chunk, we can reduce the overall time for getting the file to all relevant nodes. We evaluate the proposed mechanism and show that our mechanism can significantly reduce the overall delivery time

    Talent Management in the Humanitarian Aid Context

    Get PDF
    Talent management is currently seen as a high-priority issue in organizations worldwide, and a critical determinant of organizational success. Organizations spend a great deal of resources on identifying and developing talent necessary for strategy implementation and to achieve strategic targets. When looking at critical factors for competitive advantage and business success, ‘talent’ is gaining status as an important element, almost equal to financial resources. Furthermore, both management researchers and practitioners have found the identification and development of high potential employees to be one of the major challenges of the current human resource function. Even if talent management has in recent years received much attention in academia, research on different contexts, such as that of non-profit organizations, is limited. This dissertation explores talent management in the context of Non-Governmental Organizations (NGO), and more precisely in humanitarian aid organizations. The focal organization of this study is the International Federation of the Red Cross and Red Crescent Societies. The main question of my study is: “Do the managerial or business approaches to talent management and the principal assumption of organizations as money-making entities make talent management frameworks and theories non-applicable in the context of e.g. non-profit organizations?” I studied this question by beginning with the pivotal matter of ‘what is talent’, and how it is defined both in academia and by practitioners. The notion of potential is of essence in talent definition, and is thus included in the way I advocate that ‘talent’ should be defined: it is a formula multiplying competence by commitment and contribution. Furthermore, each of these components is divided into two distinctive time dimensions: the present and future. Particularly the future dimension of ‘contribution’ involves factors that epitomize potential; insight, curiosity, and determination, to name a few. Talent management, i.e. attracting, identifying, recruiting, developing, and retaining people, is a strategic process that should contribute to competitive advantage by first identifying the strategically pivotal positions in the organization and then making sure that these positions are filled with talent: right people at the right time in the right job. Talent management at its most mature stage should both inform the overall strategy of the organization and be informed by it. Overall, the results indicated that talent management frameworks and related activities are applicable to non-profit organizations, and can contribute to better attraction, identification, and retention of talent in humanitarian aid organizations. Traditionally, particularly in humanitarian aid organizations, the determining factors in recruitment and retention have been experience in similar organizations and a significant number of required competencies. The results suggest that these so-called competency frameworks are not ideal in the current VUCA (volatile, uncertain, complex, and ambiguous) world, since they do not take e.g. meta-competencies into account, and tend to be rather mechanical in their approach. Furthermore, the development approach of humanitarian aid organizations can arguably be beneficial for corporations as well. This is particularly the case when developing high potentials or talent at the early stages of their careers. Namely, the way these organizations use mentoring – equaling to strong involvement of one’s supervisor in the corporate world – and deployments to emergency operations – i.e. not simulations or experiments in ‘safe’ environments – are among development activities corporations could benefit from. The ability to identify potential remains to be one of the priorities of any manager, be it in non- or for-profit organizations. The competencies that guaranteed success in the past will most probably not be adequate, and managers need to learn to detect potential, with its components of curiosity and learning agility seeming crucial

    Special Libraries, August 1974

    Get PDF
    Volume 65, Issue 8https://scholarworks.sjsu.edu/sla_sl_1974/1006/thumbnail.jp

    New York/New Jersey High Intensity Drug Trafficking Area Terrorist Financing & Drug Trafficking Strategy

    Get PDF
    My Masters Project focuses around the New York/New Jersey High Intensity Drug Trafficking Area (NY/NJ HIDTA). Narco-terrorism has become a significant issue for the safety and security of the United States. Terrorist financing also plays a significant role in the war on terror. I chose to create a three part strategy for the NY/NJ HIDTA that will combat both narco-terrorism and terrorist financing. Each chapter describes another detailed plan of how the NY/NJ HIDTA, as well as particular agencies within, combat these issues in attempt to keep our nation secure. My Masters Project was carefully constructed with a strong focus on terrorist financing. The top priority of terrorist organizations is to cripple the American economy. This paper will illustrate the significance of following the money will eventually deteriorate terrorist organizations at their core

    The Digital Person: Technology and Privacy in the Information Age

    Get PDF
    This is the complete text of Daniel J. Solove\u27s book, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE (Full Text) (NYU Press 2004) explores the social, political, and legal implications of the collection and use of personal information in computer databases. In the Information Age, our lives are documented in digital dossiers maintained by hundreds (perhaps thousands) of businesses and government agencies. These dossiers are composed of bits of our personal information, which when assembled together begin to paint a portrait of our personalities. The dossiers are increasingly used to make decisions about our lives - whether we get a loan, a mortgage, a license, or a job; whether we are investigated or arrested; and whether we are permitted to fly on an airplane. Digital dossiers impact many aspects of our lives. For example, they increase our vulnerability to identity theft, a serious crime that has been escalating at an alarming rate. Moreover, since September 11th, the government has been tapping into vast stores of information collected by businesses and using it to profile people for criminal or terrorist activity. Do these developments pose a problem? Is it possible to protect privacy in a society where information flows so freely and proliferates so rapidly? THE DIGITAL PERSON seeks to answer these questions. This book explores the problem from all angles - how businesses gather personal information in massive databases; how the government increasingly provides this data to businesses through public records; and how the government is gathering personal data from businesses for its own uses. THE DIGITAL PERSON not only explores these problems, but also provides a compelling account of how we can respond to them. Using a wide variety of sources, including history, philosophy, and literature, Solove sets forth a new understanding of privacy, one that is appropriate for the new challenges of the Information Age. He argues that although the use of digital dossiers can create Orwellian harms of surveillance, they often create a different kind of problem best captured by Franz Kafka’s The Trial — a sense of helplessness, vulnerability, and frustration when entities use vast dossiers of data but refuse to provide people with sufficient knowledge and participation in the use of the data. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world

    Modélisation et exploitation de base de connaissances dans le cadre du web des objets

    Get PDF
    The concept Web of things (WOT) is gradually becoming a reality as the result of development of network and hardware technologies. Nowadays, there is an increasing number of objects that can be used in predesigned applications. The world is thus more tightly connected, various objects can share their information as well as being triggered through a Web-like structure. However, even if the heterogeneous objects have the ability to be connected to the Web, they cannot be used in different applications unless there is a common model so that their heterogeneity can be described and understood. In this thesis, we want to provide a common model to describe those heterogeneous objects and use them to solve user’s problems. Users can have various requests, either to find a particular object, or to fulfill some tasks. We highlight thus two research directions. The first step is to model those heterogeneous objects and related concepts in WOT, and the next step is to use this model to fulfill user’s requests. Thus, we first study the existing technologies, applications and domains where the WOT can be applied. We compare the existing description models in this domain and find their insufficiency to be applied in the WOT...Le concept du web des objets (WOT - web of things) est devenu une rĂ©alitĂ© avec le dĂ©veloppement d’internet, des rĂ©seaux, des technologies matĂ©rielles et des objets communicants. De nos jours, il existe un nombre croissant d’objets susceptibles d’ĂȘtre utilisĂ©s dans des applications spĂ©cifiques. Le Monde est ainsi plus Ă©troitement connectĂ©, diffĂ©rents objets pouvant maintenant partager leurs informations et ĂȘtre ainsi utilisĂ©s Ă  travers une structure similaire Ă  celle du Web classique. Cependant, mĂȘme si des objets hĂ©tĂ©rogĂšnes ont la possibilitĂ© de se connecter au Web, ils ne peuvent pas ĂȘtre utilisĂ©s dans diffĂ©rentes applications Ă  moins de possĂ©der un modĂšle de reprĂ©sentation et d’interrogation commun capable de prendre en compte leur hĂ©tĂ©rogĂ©nĂ©itĂ©. Dans cette thĂšse, notre objectif est d’offrir un modĂšle commun pour dĂ©crire les objets hĂ©tĂ©rogĂšnes et pouvoir ensuite les utiliser pour accĂ©der aux requĂȘtes des utilisateurs. Ceux-ci peuvent avoir diffĂ©rentes demandes, que ce soit pour trouver un objet particulier ou pour rĂ©aliser certaines tĂąches. Nous mettons en Ă©vidence deux directions de recherche. La premiĂšre consiste Ă  trouver une bonne modĂ©lisation de ces objets hĂ©tĂ©rogĂšnes et des concepts liĂ©s au WOT. La seconde est d’utiliser un tel modĂšle pour rĂ©pondre efficacement aux requĂȘtes des utilisateurs. Dans un premier temps, nous Ă©tudions d’abord les technologies, les applications et les domaines existants oĂč le WOT peut ĂȘtre appliquĂ©. Nous comparons les modĂšles de description existants dans ce domaine et nous mettons en Ă©vidence leurs insuffisances lors d’applications relatives au WOT. Nous proposons alors un nouveau modĂšle sĂ©mantique pour la description d’objets dans le cadre du WOT. Ce modĂšle est construit sur une ontologie qui comporte trois composantes principales: le Core model, le Space model et l’Agent model. Ce modĂšle peut alors permettre la description Ă  la fois des informations statiques mais aussi des changements dynamiques associĂ©s au WOT..

    Communication Platform Payload Definition (CPPD) study. Volume 2: Technical report

    Get PDF
    This is Volume 2 (Technical Report) of the Ford Aerospace & Communications Corporation Final Report for the Communication Platform Payload Definition (CPPD) Study program conducted for NASA Lewis Research Center under contract No. NAS3-24235. This report presents the results of the study effort leading to five potential platform payloads to service CONUS and WARC Region 2 traffic demand as projected to the year 2008. The report addresses establishing the data bases, developing service aggregation scenarios, selecting and developing 5 payload concepts, performing detailed definition of the 5 payloads, costing them, identifying critical technology, and finally comparing the payloads with each other and also with non-aggregated equivalent services

    Accountants\u27 index. Twenty-fourth supplement, January-December 1975

    Get PDF
    https://egrove.olemiss.edu/aicpa_accind/1026/thumbnail.jp
    corecore