926 research outputs found

    U.S. Military Innovation In The 21st Century: The Era Of The “Spin-On”

    Get PDF
    The intersection between the U.S. military and technological innovation, a “military-innovation nexus,” has led to the genesis of key technologies, including nuclear energy, general computing, GPS, and satellite technology from World War II to the present. However, an evolving innovation context in the twenty-first century, including the leadership of the commercial sector in technology innovation and the resurgence of great power competition, has led to doubts about the ability of the Department of Defense to discover and promote the technological innovations of the future. The Third Offset Strategy was formulated in 2014 in response to these concerns: The offset strategy promulgated reforms to bring the Pentagon and the commercial sector closer together while creating alternative contracting mechanisms for streamlined procurement and prototyping. Using defense biometrics and artificial intelligence as case studies of spin-on innovations adopted by the military, this Article seeks to understand the efficacy of the reforms undertaken under the auspices of the Third Offset Strategy to improve the institutional underpinnings of the U.S. innovation system for national security. I argue that the Third Offset Strategy has allowed the Pentagon to more effectively procure, develop, and field commercial technologies in the twenty-first century, and I conclude by proposing modest recommendations for the successful acquisition of spin-on innovations

    Security Enhanced Applications for Information Systems

    Get PDF
    Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments

    Ubiquitous Computing. Summary

    Get PDF
    Ubiquitous computing - the complex electronic networking of things that communicate - is considered a promising innovation path worldwide. Intensive R&D activities and political strategies are aimed at promoting practical technologies and applications. Where do we currently stand on the path to the "Internet of Things"? Which practical projects already show the potential that can be exploited by implementing the basic idea of ubiquitous computing? What technical, legal and social challenges must be overcome to achieve this - and what can be the contribution of politics? In the light of these questions, the authors analyse the status quo and the perspectives of ubiquitous computing and illustrate their findings with examples from trade, logistics and health care, among others. the fascinating "Brownie technology" of ubiquitous computing must, however, still be comprehensively made fit by those involved in business, society and politics if its applications are really to become economically attractive, socially acceptable and helpful in overcoming social problems

    A study on ICT implants

    Get PDF

    A Survey of the European Security Market

    Get PDF
    This document synthesizes the results of the research made on the European security market. It deals with questions of interest regarding the provision of security goods and services for protecting society from terrorism and organised crime. It explores issues such as market revenues, demand and supply, industrial capabilities, technology, research and development, innovation, business strategies, competition as well as market structure, agents' conduct and economic performance. The research has been based upon desk analysis of open source information related to the security market. Economic theory and critical analysis has been applied to understand the gathered information, derive knowledge, point out key issues and assess trends and drivers that will likely shape the sector's future. The study is the outcome of the working package number 5 included in the research project A new Agenda for European Security Economics (EUSECON). This project with code number 218195 has been financed by the European Commission within the 7th European Research Framework Programme. The task has been performed by the company ISDEFE according to the scope and work plan described in the EUSECON proposal. The author wishes to express his appreciation to all the individuals that have provided input and valuable comments to this study, including anonymous referees. Any flaws or omissions contained in this document are solely the responsibility of the author.

    Appraisal of Cashless Policy on the Nigerian Financial System

    Get PDF
    The Central Bank of Nigeria (CBN) has been active in the inauguration of policies and schemes to foster the implementation of the cashless policy in Nigeria. However the current transition to cashless economy raises a lot of concerns with no substantial evidence yet to justify its implementation. This study was carried out in order to appraise the implementation of the cashless policy since its introduction into the Nigerian financial system in 2012 and also to examine the persistent challenges facing its implementation. In view of the above stated objective, primary data were collected with the aid of the questionnaire, which was randomly administered to 120 respondents ranging from First Bank, Zenith Bank and United Bank for Africa. The banks were selected based on their total assets and the information collected covered the activities of the CBN and that of these banks towards implementation of the cashless policy from 2012 till date.The data collected were presented and analyzed with the aid of the Statistical Package for Social Sciences (SPSS) using descriptive statistics and one-sample t-test. The results led to the conclusion that despite the need to operate cashless transactions dominating the modern Nigerian economy, the cashless policy will have the desired impact only if a lot is done to ensure the implementation of an effective cashless system

    The Balance between the Data Protection Law Regime and Modern Technologies: Collision or Collaboration? − A Comparative Study of Regulatory Instruments in the EU and Taiwan

    Get PDF
    The aim of this thesis is to discuss and evaluate how to strike a balance between the benefits and the risks of biometric and Radio-frequency Identification (RFID) technologies within a data protection regime. This presents a problem because of the lack of an applicable theoretical framework and clear guidelines and principles for legal regulations to deal with such technologies. The theory chosen here is the Principle of Generic Consistency (PGC), which has been justified as the basic principle of human rights in any given community. This thesis then elaborates on specific applications of the PGC in relation to various issues by defining relevant privacy concepts and describing how they are analysed to allow the identification, evaluation, and comparison of competing rights and interests in a specific conflict. Probing and evaluating current regulation of technologies at stake in Europe and Taiwan, it is argued that the right to benefit from advances in science and technology and the right to privacy are bound to come into conflict. However, it is problematic to suggest that the balancing of competing rights is a zero-sum trade-off. Instead, in line with the broad concept of privacy, it is contended that there is the possibility for the two sets of values to support each other. In this case, the thesis suggests a co-operative framework, which relies on a consistent approach to maintain valid consent, precautionary and preventive measures to tackle the risks of developing such technologies, and an independent institutional framework for personal data protection. Lastly, the thesis proposes a PGC-derived regulatory framework and model for Taiwan. As the Formosan hydra-headed bureaucracy model generates inconsistent data protection consequences, it is suggested that an institutional framework comprising an independent regulatory body might be able to assist the success of the co-operative model more effectively

    The InfoSec Handbook

    Get PDF
    Computer scienc
    corecore