25,405 research outputs found

    The Security Rule

    Get PDF

    Piracy of Digital Products: A Critical Review of the Economics Literature

    Get PDF
    Digital products have the property that they can be copied almost costlessly. This makes them candidates for non-commercial copying by final consumers. Because the copy of a copy typically does not deteriorate in quality, copying products can become a wide-spread phenomenon – this can be illustrated by the surge of file-sharing networks. In this paper we provide a critical overview of the literature that addresses the economic consequences of end-user copying. We conclude that some models with network effects are well-suited for the analysis of software copying while other models incorporating the feature that copies provide information about the originals may be useful for the analysis of digital music copying.information good, piracy, copyright, internet, peer-to-peer, software, music

    Frequency and fundamental signal measurement algorithms for distributed control and protection applications

    Get PDF
    Increasing penetration of distributed generation within electricity networks leads to the requirement for cheap, integrated, protection and control systems. To minimise cost, algorithms for the measurement of AC voltage and current waveforms can be implemented on a single microcontroller, which also carries out other protection and control tasks, including communication and data logging. This limits the frame rate of the major algorithms, although analogue to digital converters (ADCs) can be oversampled using peripheral control processors on suitable microcontrollers. Measurement algorithms also have to be tolerant of poor power quality, which may arise within grid-connected or islanded (e.g. emergency, battlefield or marine) power system scenarios. This study presents a 'Clarke-FLL hybrid' architecture, which combines a three-phase Clarke transformation measurement with a frequency-locked loop (FLL). This hybrid contains suitable algorithms for the measurement of frequency, amplitude and phase within dynamic three-phase AC power systems. The Clarke-FLL hybrid is shown to be robust and accurate, with harmonic content up to and above 28% total harmonic distortion (THD), and with the major algorithms executing at only 500 samples per second. This is achieved by careful optimisation and cascaded use of exact-time averaging techniques, which prove to be useful at all stages of the measurements: from DC bias removal through low-sample-rate Fourier analysis to sub-harmonic ripple removal. Platform-independent algorithms for three-phase nodal power flow analysis are benchmarked on three processors, including the Infineon TC1796 microcontroller, on which only 10% of the 2000 mus frame time is required, leaving the remainder free for other algorithms

    The effectiveness of the creativity trigger module in achieving higher levels of creative thinking among prospective teachers

    Get PDF
    The unoptimised level of creative thinking is seen as an issue among Semester 8 prospective teachers in Malaysian Teacher-Education Institutes (IPG). This could impede their teaching of creative thinking as one of the four components of 21st century skills in schools. In relation to this, this study sets out to investigate prior creativity levels of IPG prospective teachers and develop the Creativity Trigger Module (CTM) as a training module for enhancing their creativity. The Torrance Tests of Creative Thinking (TTCT) was used to compare the prior creativity levels of four respondent groups and test the effectiveness of the CTM on five dimensions of figural creativity, namely fluency, originality, elaboration, resistance to premature closure, abstractness of titles, and their overall creativity. A two-stage cluster sampling technique identified two IPGs with 68 respondents in the state of Johor namely, IPG-Kampus Tun Hussein Onn, Batu Pahat (IPGKTHO) as the control group site (34 respondents), and IPG- Kampus Temenggong Ibrahim, Johor Bahru (IPGKTI) as the treatment group site (34 respondents). Mathematics (MT) and Design and Technology (RBT) are the only two specialist subject combinations that provided enough sample size at both test sites. A quasi-experimental research design was used and this involved intact classes. Data analysis was carried out as follows: ANOVA, ANCOVA, and Wilcoxon Signed Rank Test analysis for TTCT scores while data analysis based on the NVivo software was used for the focus group interviews. Findings on prior creativity levels showed average or low creativity levels among all 4 test groups with IPGKTHO and RBT options having significantly higher posttest marks as compared to IPGKTI and MT option respectively. The CTM was found to improve significantly respondents’ posttest marks for the treatment group in all the five dimensions of figural creativity and, their overall creativity. Feedback from respondents revealed positive support for the CTM. In conclusion, the prior creativity of IPG prospective teachers was at an unoptimised level before treatment but the CTM has been successfully developed as an effective resource for enhancing the creative thinking levels among IPG prospective teachers

    BitTorrent Sync: Network Investigation Methodology

    Full text link
    The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles covering various invasion of privacy issues and data protection breaches in the media has caused many to review their online security practices with their personal information. To provide an alternative to cloud based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync to alpha testers in April 2013. BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.Comment: 9th International Conference on Availability, Reliability and Security (ARES 2014

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    On Constructing Persistent Identifiers with Persistent Resolution Targets

    Get PDF
    Persistent Identifiers (PID) are the foundation referencing digital assets in scientific publications, books, and digital repositories. In its realization, PIDs contain metadata and resolving targets in form of URLs that point to data sets located on the network. In contrast to PIDs, the target URLs are typically changing over time; thus, PIDs need continuous maintenance -- an effort that is increasing tremendously with the advancement of e-Science and the advent of the Internet-of-Things (IoT). Nowadays, billions of sensors and data sets are subject of PID assignment. This paper presents a new approach of embedding location independent targets into PIDs that allows the creation of maintenance-free PIDs using content-centric network technology and overlay networks. For proving the validity of the presented approach, the Handle PID System is used in conjunction with Magnet Link access information encoding, state-of-the-art decentralized data distribution with BitTorrent, and Named Data Networking (NDN) as location-independent data access technology for networks. Contrasting existing approaches, no green-field implementation of PID or major modifications of the Handle System is required to enable location-independent data dissemination with maintenance-free PIDs.Comment: Published IEEE paper of the FedCSIS 2016 (SoFAST-WS'16) conference, 11.-14. September 2016, Gdansk, Poland. Also available online: http://ieeexplore.ieee.org/document/7733372
    • …
    corecore