11 research outputs found

    Frank Amyx v. Players Vacation Club, Inc. and John Does one through ten whose true names are unknown : Brief of Appellee

    Get PDF
    Appeal from the Memorandum Decision of The Honorable Royal L Hansen, Third District Court in and for Salt Lake County, Sandy Divisio

    Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices

    Get PDF
    Advertisers are poised to deliver advertising to cell phones in the U.S. This emerging advertising context is called mobile advertising. It will generate a host of privacy and personal data issues for consumers and for mobile advertisers, mobile phone manufacturers, and mobile carriers. This Article focuses on the existing federal regulatory environment applicable to mobile advertising and consumer privacy, the role of federal administrative agencies that enforce consumer privacy regulation, and the potential for industry selfregulation, particularly privacy policies, to enhance consumer privacy. It assesses the adequacy of the existing federal consumer privacy regulation as well as potential consumer remedies under contract theories and privacy tort laws. Concluding that meaningful disclosure of privacy practices and obtaining adequate consumer consent are essential privacy concerns in mobile advertising, the Article identifies weaknesses in the current regulatory system and offers simple suggestions for regulatory improvements to bolster consumers\u27 privacy protections

    Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices

    Get PDF
    Advertisers are poised to deliver advertising to cell phones in the U.S. This emerging advertising context is called mobile advertising. It will generate a host of privacy and personal data issues for consumers and for mobile advertisers, mobile phone manufacturers, and mobile carriers. This Article focuses on the existing federal regulatory environment applicable to mobile advertising and consumer privacy, the role of federal administrative agencies that enforce consumer privacy regulation, and the potential for industry selfregulation, particularly privacy policies, to enhance consumer privacy. It assesses the adequacy of the existing federal consumer privacy regulation as well as potential consumer remedies under contract theories and privacy tort laws. Concluding that meaningful disclosure of privacy practices and obtaining adequate consumer consent are essential privacy concerns in mobile advertising, the Article identifies weaknesses in the current regulatory system and offers simple suggestions for regulatory improvements to bolster consumers\u27 privacy protections

    Efficient Security Protocols for Constrained Devices

    Get PDF
    During the last decades, more and more devices have been connected to the Internet.Today, there are more devices connected to the Internet than humans.An increasingly more common type of devices are cyber-physical devices.A device that interacts with its environment is called a cyber-physical device.Sensors that measure their environment and actuators that alter the physical environment are both cyber-physical devices.Devices connected to the Internet risk being compromised by threat actors such as hackers.Cyber-physical devices have become a preferred target for threat actors since the consequence of an intrusion disrupting or destroying a cyber-physical system can be severe.Cyber attacks against power and energy infrastructure have caused significant disruptions in recent years.Many cyber-physical devices are categorized as constrained devices.A constrained device is characterized by one or more of the following limitations: limited memory, a less powerful CPU, or a limited communication interface.Many constrained devices are also powered by a battery or energy harvesting, which limits the available energy budget.Devices must be efficient to make the most of the limited resources.Mitigating cyber attacks is a complex task, requiring technical and organizational measures.Constrained cyber-physical devices require efficient security mechanisms to avoid overloading the systems limited resources.In this thesis, we present research on efficient security protocols for constrained cyber-physical devices.We have implemented and evaluated two state-of-the-art protocols, OSCORE and Group OSCORE.These protocols allow end-to-end protection of CoAP messages in the presence of untrusted proxies.Next, we have performed a formal protocol verification of WirelessHART, a protocol for communications in an industrial control systems setting.In our work, we present a novel attack against the protocol.We have developed a novel architecture for industrial control systems utilizing the Digital Twin concept.Using a state synchronization protocol, we propagate state changes between the digital and physical twins.The Digital Twin can then monitor and manage devices.We have also designed a protocol for secure ownership transfer of constrained wireless devices. Our protocol allows the owner of a wireless sensor network to transfer control of the devices to a new owner.With a formal protocol verification, we can guarantee the security of both the old and new owners.Lastly, we have developed an efficient Private Stream Aggregation (PSA) protocol.PSA allows devices to send encrypted measurements to an aggregator.The aggregator can combine the encrypted measurements and calculate the decrypted sum of the measurements.No party will learn the measurement except the device that generated it

    Securing the Internet with digital signatures

    Get PDF
    The security and reliability of the Internet are essential for many functions of a modern society. Currently, the Internet lacks efficient network level security solutions and is vulnerable to various attacks, especially to distributed denial-of-service attacks. Traditional end-to-end security solutions such as IPSec only protect the communication end-points and are not effective if the underlying network infrastructure is attacked and paralyzed. This thesis describes and evaluates Packet Level Authentication (PLA), which is a novel method to secure the network infrastructure and provide availability with public key digital signatures. PLA allows any node in the network to verify independently the authenticity and integrity of every received packet, without previously established relationships with the sender or intermediate nodes that have handled the packet. As a result, various attacks against the network and its users can be more easily detected and mitigated, before they can cause significant damage or disturbance. PLA is compatible with the existing Internet infrastructure, and can be used with complementary end-to-end security solutions, such as IPSec and HIP. While PLA was originally designed for securing current IP networks, it is also suitable for securing future data-oriented networking approaches. PLA has been designed to scale from lightweight wireless devices to Internet core network, which is a challenge since public key cryptography operations are very resource intensive. Nevertheless, this work shows that digital signature algorithms and their hardware implementations developed for PLA are scalable to fast core network routers. Furthermore, the additional energy consumption of cryptographic operations is significantly lower than the energy cost of wireless transmission, making PLA feasible for lightweight wireless devices. Digital signature algorithms used by PLA also offer small key and signature sizes and therefore PLA's bandwidth overhead is relatively low. Strong security mechanisms offered by PLA can also be utilized for various other tasks. This work investigates how PLA can be utilized for controlling incoming connections, secure user authentication and billing, and for providing a strong accountability without an extensive data retention by network service providers

    The Charming Science of the Other: The cultural analysis of the scientific search for life beyond earth

    Get PDF
    This dissertation presents the cultural study of scientific search for extraterrestrial life conducted over the past sixty years by the scientific community. It introduces an original piece of research that conceptualises the extraterrestrial life hypothesis as a significant part of the general world-view, constantly shaped by the work and discoveries of science. It sheds light on the ways in which alien life is imagined and theorised and presents its concept in both the scientific community and in popular culture. Drawing from anthropology of science it offers elaboration of ā€˜culture of scienceā€™ and ā€˜scientific cultureā€™ and describes the scientific search for other life as a specific culture of science, here referred to as ā€˜charming scienceā€™. The three scientific search methods: message sending, analysing of cosmic signals and the search for extrasolar planets are conceptualised as the three search modes: messaging, listening and exploring respectively. This work introduces the extraterrestrial ā€˜Otherā€™ as a profoundly cultural concept, firstly presented as the missing subject of ā€˜charming scienceā€™. Exploration of public understanding the extraterrestrial life and popular imagination of the ā€˜Otherā€™ is intended to introduce the scientific search in broader social context and address the role of science in contemporary Western world. The dissertation draws on the multi-sited and multi-method ethnographic fieldwork conducted over two years in the UK. The research methods included interviewing (semi-structured face-to-face interviews and interviews conducted via email), participation (conferences and scientific meetings), and data collection from the global ā€˜onlineā€™ community including social networks

    New Hampshire general court, journal of the House of Representatives, containing the 2005 session December 1, 2004 through November 16, 2005.

    Get PDF
    Titles and imprints vary; Some volumes include miscellaneous state documents and reports; Rules of the House of Representative

    Detection and Prevention of Cyberbullying on Social Media

    Get PDF
    The Internet and social media have undoubtedly improved our abilities to keep in touch with friends and loved ones. Additionally, it has opened up new avenues for journalism, activism, commerce and entertainment. The unbridled ubiquity of social media is, however, not without negative consequences and one such effect is the increased prevalence of cyberbullying and online abuse. While cyberbullying was previously restricted to electronic mail, online forums and text messages, social media has propelled it across the breadth of the Internet, establishing it as one of the main dangers associated with online interactions. Recent advances in deep learning algorithms have progressed the state of the art in natural language processing considerably, and it is now possible to develop Machine Learning (ML) models with an in-depth understanding of written language and utilise them to detect cyberbullying and online abuse. Despite these advances, there is a conspicuous lack of real-world applications for cyberbullying detection and prevention. Scalability; responsiveness; obsolescence; and acceptability are challenges that researchers must overcome to develop robust cyberbullying detection and prevention systems. This research addressed these challenges by developing a novel mobile-based application system for the detection and prevention of cyberbullying and online abuse. The application mitigates obsolescence by using different ML models in a ā€œplug and playā€ manner, thus providing a mean to incorporate future classifiers. It uses ground truth provided by the enduser to create a personalised ML model for each user. A new large-scale cyberbullying dataset of over 62K tweets annotated using a taxonomy of different cyberbullying types was created to facilitate the training of the ML models. Additionally, the design incorporated facilities to initiate appropriate actions on behalf of the user when cyberbullying events are detected. To improve the appā€™s acceptability to the target audience, user-centred design methods were used to discover stakeholdersā€™ requirements and collaboratively design the mobile app with young people. Overall, the research showed that (a) the cyberbullying dataset sufficiently captures different forms of online abuse to allow the detection of cyberbullying and online abuse; (b) the developed cyberbullying prevention application is highly scalable and responsive and can cope with the demands of modern social media platforms (b) the use of user-centred and participatory design approaches improved the appā€™s acceptability amongst the target audience
    corecore