59 research outputs found

    Mapping the Focal Points of WordPress: A Software and Critical Code Analysis

    Get PDF
    Programming languages or code can be examined through numerous analytical lenses. This project is a critical analysis of WordPress, a prevalent web content management system, applying four modes of inquiry. The project draws on theoretical perspectives and areas of study in media, software, platforms, code, language, and power structures. The applied research is based on Critical Code Studies, an interdisciplinary field of study that holds the potential as a theoretical lens and methodological toolkit to understand computational code beyond its function. The project begins with a critical code analysis of WordPress, examining its origins and source code and mapping selected vulnerabilities. An examination of the influence of digital and computational thinking follows this. The work also explores the intersection of code patching and vulnerability management and how code shapes our sense of control, trust, and empathy, ultimately arguing that a rhetorical-cultural lens can be used to better understand code\u27s controlling influence. Recurring themes throughout these analyses and observations are the connections to power and vulnerability in WordPress\u27 code and how cultural, processual, rhetorical, and ethical implications can be expressed through its code, creating a particular worldview. Code\u27s emergent properties help illustrate how human values and practices (e.g., empathy, aesthetics, language, and trust) become encoded in software design and how people perceive the software through its worldview. These connected analyses reveal cultural, processual, and vulnerability focal points and the influence these entanglements have concerning WordPress as code, software, and platform. WordPress is a complex sociotechnical platform worthy of further study, as is the interdisciplinary merging of theoretical perspectives and disciplines to critically examine code. Ultimately, this project helps further enrich the field by introducing focal points in code, examining sociocultural phenomena within the code, and offering techniques to apply critical code methods

    Management of socio-economic transformations of business processes: current realities, global challenges, forecast scenarios and development prospects

    Get PDF
    The authors of the scientific monograph have come to the conclusion that мanagement of socio-economic transformations of business processes requires the use of mechanisms to support of entrepreneurship, sectors of the national economy, the financial system, and critical infrastructure. Basic research focuses on assessment the state of social service provision, analysing economic security, implementing innovation and introducing digital technologies. The research results have been implemented in the different models of costing, credit risk and capital management, tax control, use of artificial intelligence and blockchain. The results of the study can be used in the developing of policies, programmes and strategies for economic security, development of the agricultural sector, transformation of industrial policy, implementation of employment policy in decision-making at the level of ministries and agencies that regulate the management of socio-economic and European integration processes. The results can also be used by students and young scientists in the educational process and conducting scientific research on global challenges and creation scenarios for the development of socio-economic processes

    Evaluating Resilience of Cyber-Physical-Social Systems

    Get PDF
    Nowadays, protecting the network is not the only security concern. Still, in cyber security, websites and servers are becoming more popular as targets due to the ease with which they can be accessed when compared to communication networks. Another threat in cyber physical social systems with human interactions is that they can be attacked and manipulated not only by technical hacking through networks, but also by manipulating people and stealing users’ credentials. Therefore, systems should be evaluated beyond cy- ber security, which means measuring their resilience as a piece of evidence that a system works properly under cyber-attacks or incidents. In that way, cyber resilience is increas- ingly discussed and described as the capacity of a system to maintain state awareness for detecting cyber-attacks. All the tasks for making a system resilient should proactively maintain a safe level of operational normalcy through rapid system reconfiguration to detect attacks that would impact system performance. In this work, we broadly studied a new paradigm of cyber physical social systems and defined a uniform definition of it. To overcome the complexity of evaluating cyber resilience, especially in these inhomo- geneous systems, we proposed a framework including applying Attack Tree refinements and Hierarchical Timed Coloured Petri Nets to model intruder and defender behaviors and evaluate the impact of each action on the behavior and performance of the system.Hoje em dia, proteger a rede não é a única preocupação de segurança. Ainda assim, na segurança cibernética, sites e servidores estão se tornando mais populares como alvos devido à facilidade com que podem ser acessados quando comparados às redes de comu- nicação. Outra ameaça em sistemas sociais ciberfisicos com interações humanas é que eles podem ser atacados e manipulados não apenas por hackers técnicos através de redes, mas também pela manipulação de pessoas e roubo de credenciais de utilizadores. Portanto, os sistemas devem ser avaliados para além da segurança cibernética, o que significa medir sua resiliência como uma evidência de que um sistema funciona adequadamente sob ataques ou incidentes cibernéticos. Dessa forma, a resiliência cibernética é cada vez mais discutida e descrita como a capacidade de um sistema manter a consciência do estado para detectar ataques cibernéticos. Todas as tarefas para tornar um sistema resiliente devem manter proativamente um nível seguro de normalidade operacional por meio da reconfi- guração rápida do sistema para detectar ataques que afetariam o desempenho do sistema. Neste trabalho, um novo paradigma de sistemas sociais ciberfisicos é amplamente estu- dado e uma definição uniforme é proposta. Para superar a complexidade de avaliar a resiliência cibernética, especialmente nesses sistemas não homogéneos, é proposta uma estrutura que inclui a aplicação de refinamentos de Árvores de Ataque e Redes de Petri Coloridas Temporizadas Hierárquicas para modelar comportamentos de invasores e de- fensores e avaliar o impacto de cada ação no comportamento e desempenho do sistema

    Writing Around the Ancient Mediterranean

    Get PDF
    Writing in the ancient Mediterranean existed against a backdrop of very high levels of interaction and contact. In the societies around its shores, writing was a dynamic practice that could serve many purposes – from a tool used by elites to control resources and establish their power bases to a symbol of local identity and a means of conveying complex information and ideas. This volume presents a group of papers by members of the Contexts of and Relations between Early Writing Systems (CREWS) research team and visiting fellows, offering a range of different perspectives and approaches to problems of writing in the ancient Mediterranean. They focus on practices, viewing writing as something that people do within a wider social and cultural context, and on adaptations, considering the ways in which writing changed and was changed by the people using it

    The Dark Posthuman

    Get PDF
    The Dark Posthuman: Dehumanization, Technology, and the Atlantic World explores how liberal humanism first enlivened, racialized, and gendered global cartographies, and how memory, ancestry, expression, and other aspects of social identity founded in its theories and practices made for the advent of the category of the posthuman through the dimensions of cultural, geographic, political, social, and scientific classification. The posthuman is very much the product of world-building narratives that have their beginnings in the commercial franchise and are fundamentally rooted in science, governance, and economics around the hegemonic appropriation of environments and commodification of bodies that initially fuelled white settler life worlds and continue to be operational in the way we conceive of these worlds as continuous ontological formations. The want has always been for ownership of any of these dimensions of being without regard to condition, to not remain stranded as the subsidiary of another’s being, to another’s claim to humanity, and finally, to escape the suffocating confines of an instrumental ontology that suggests a subcategory of humanity without rights onto itself. The Dark Posthuman distinguishes the posthuman’s place within both the liberal and neoliberal imaginary and reveals how its appearance first entrenched itself through the avarice of English settler colonialism, and subsequently, through the paranoia of American slavery. This same figure of the posthuman played a crucial role in the functional adaptation of Cold War behavioural cybernetics, and thereafter, in the fetishization of technology within the era of global financialization. The shadowing of this arrangement during and beyond the long duration of humanity’s domination of this world becomes the structural web work of this book

    Next Generation Internet of Things – Distributed Intelligence at the Edge and Human-Machine Interactions

    Get PDF
    This book provides an overview of the next generation Internet of Things (IoT), ranging from research, innovation, development priorities, to enabling technologies in a global context. It is intended as a standalone in a series covering the activities of the Internet of Things European Research Cluster (IERC), including research, technological innovation, validation, and deployment.The following chapters build on the ideas put forward by the European Research Cluster, the IoT European Platform Initiative (IoT–EPI), the IoT European Large-Scale Pilots Programme and the IoT European Security and Privacy Projects, presenting global views and state-of-the-art results regarding the next generation of IoT research, innovation, development, and deployment.The IoT and Industrial Internet of Things (IIoT) are evolving towards the next generation of Tactile IoT/IIoT, bringing together hyperconnectivity (5G and beyond), edge computing, Distributed Ledger Technologies (DLTs), virtual/ andaugmented reality (VR/AR), and artificial intelligence (AI) transformation.Following the wider adoption of consumer IoT, the next generation of IoT/IIoT innovation for business is driven by industries, addressing interoperability issues and providing new end-to-end security solutions to face continuous treats.The advances of AI technology in vision, speech recognition, natural language processing and dialog are enabling the development of end-to-end intelligent systems encapsulating multiple technologies, delivering services in real-time using limited resources. These developments are focusing on designing and delivering embedded and hierarchical AI solutions in IoT/IIoT, edge computing, using distributed architectures, DLTs platforms and distributed end-to-end security, which provide real-time decisions using less data and computational resources, while accessing each type of resource in a way that enhances the accuracy and performance of models in the various IoT/IIoT applications.The convergence and combination of IoT, AI and other related technologies to derive insights, decisions and revenue from sensor data provide new business models and sources of monetization. Meanwhile, scalable, IoT-enabled applications have become part of larger business objectives, enabling digital transformation with a focus on new services and applications.Serving the next generation of Tactile IoT/IIoT real-time use cases over 5G and Network Slicing technology is essential for consumer and industrial applications and support reducing operational costs, increasing efficiency and leveraging additional capabilities for real-time autonomous systems.New IoT distributed architectures, combined with system-level architectures for edge/fog computing, are evolving IoT platforms, including AI and DLTs, with embedded intelligence into the hyperconnectivity infrastructure.The next generation of IoT/IIoT technologies are highly transformational, enabling innovation at scale, and autonomous decision-making in various application domains such as healthcare, smart homes, smart buildings, smart cities, energy, agriculture, transportation and autonomous vehicles, the military, logistics and supply chain, retail and wholesale, manufacturing, mining and oil and gas

    An ecosystem inspired framework for digital government transformation

    Full text link
    Traditional e-government and Digital Government Transformation (DGT) initiatives are often focused on technology transformation and business-IT alignment with the attempt to make government more efficient, transparent and easier to operate within. However, billions of public funding has been spent on those initiatives with very few anticipated benefits yielded. This thesis asserts that DGT will bring about true government transformation when business, people and culture are considered together. Many existing business/industry frameworks, architectures and best practices in the literature for DGT projects address only one or two of those dimensions. To focus on the development and delivery of transformational changes in DGT initiatives, this thesis will propose a solution framework for an integrative approach that brings about business transformation, technology transformation, with people-stakeholder-leadership oriented cultural transformation to form a holistic methodology framework for DGT that is beyond technology alone and will illuminate the road to success in DGT executions. This thesis will provide an ecosystem inspired framework together with tools and maturity model framework to guide a government-wide successful execution of the DGT journey that is iterative, measurable and with consideration of all aspects of business, technology and people. This thesis will approach DGT journeys by: 1. Implementing of a holistic framework to guide the DGT; 2. Considering people and culture for an effective DGT; 3. Providing an integrated approach that can bring innovative knowledge and cultural transformation together with the technology transformation; and by 4. Providing a measurement framework and metrics to guide the maturity of DGT projects. This thesis will be evaluated through four case studies including public sector, the defence force, and health ecosystems and is aimed at supporting public entities for better utilisation of resources, modernising operations, displaying better use of public funds, keeping trust high, saving time, offering fast learning, and better engagement and services for its stakeholders both internally and externally

    Virginia Commonwealth University Courses

    Get PDF
    Listing of courses for the 2021-2022 year

    Internet of Things (IoT) for Automated and Smart Applications

    Get PDF
    Internet of Things (IoT) is a recent technology paradigm that creates a global network of machines and devices that are capable of communicating with each other. Security cameras, sensors, vehicles, buildings, and software are examples of devices that can exchange data between each other. IoT is recognized as one of the most important areas of future technologies and is gaining vast recognition in a wide range of applications and fields related to smart homes and cities, military, education, hospitals, homeland security systems, transportation and autonomous connected cars, agriculture, intelligent shopping systems, and other modern technologies. This book explores the most important IoT automated and smart applications to help the reader understand the principle of using IoT in such applications

    Virginia Commonwealth University Undergraduate Bulletin

    Get PDF
    Undergraduate bulletin for Virginia Commonwealth University for the academic year 2021-2022. It includes information on academic regulations, degree requirements, course offerings, faculty, academic calendar, and tuition and expenses for undergraduate programs
    corecore