2,390 research outputs found

    User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia

    Get PDF
    At the time of information technology, the development of technology runs rapidly for the needs of the users themselves. Internet access is very important to obtain any desired information around the world. As well as the internet, it develops rapidly. High mobility of the users is in need of access that can be connected all the time to the electronic device which is owned by the user. A wireless access is one of the exact solutions being applied at the present time. A security network is necessary to keep the rights of the wireless access user and security is one of the most important priorities. Security can be applied by the user or provider of communication services themselves. Because of the danger's security could be from anywhere. There are many factors that can disturb the network security. This project attempt to use the questionnaire methodology to the users of Wi-Fi in the Universiti Utara Malaysia, particularly at SOC building, to find out the perception of the users toward Wi-Fi security service provided by Universiti Utara Malaysia. All participants were SOC students with the total of 873 populations. The sample size used in this project was 109 students. The confidence level stated was 92% which represent a high confidentiality. This study found that the user aspect has a positive relation with the security aspect

    The Future of Information Sciences : INFuture2015 : e-Institutions – Openness, Accessibility, and Preservation

    Get PDF

    Towards A knowledge-Based Economy - Europe and Central Asia - Internet Development and Governance

    Get PDF
    The diversity and socio-economic differentiation of the real world prevents the full-scale cultivation of Information and Communication Technologies (ICT) to the benefit of all. Furthermore, the lack of determination and political will in some countries and slowness of responses to new technological opportunities in some others are responsible for the creation of another social divide – a digital one. The above problems were fully acknowledged by the World Summit on the Information Society (WSIS). The Summit called for a joint international effort to overcome the digital divide between and within the United Nations Member States under the Digital Solidarity umbrella. This report was prepared as a follow-up to the Summit and represents a brief review of the status and trends in the area of ICT and Internet development in the UNECE region and provides background information on the state of the art in some relevant ICT subsectors in the Member States. The report focuses on the state of the Internet critical resources and, consequently, on the ICT and Internet penetration across countries and social groups. It also looks into existing Internet governance arrangements and makes some recommendations. The report contains three parts and conclusions. The first part, “Towards a Knowledge-based Economy: Progress Assessment”, highlights the situation in the region with regards to the digital divide, both between and within countries, and national strategies and actions aiming at overcoming barriers to accessing the Internet. The second part, “Internet Development: Current State of Critical Internet Resources in the UNECE Region”, concentrates on reviewing the physical Internet backbone, interconnection and connectivity within the Internet in the UNECE Member States. The third part, “Governing the Evolving Internet in the UNECE Region”, focuses on the issues of Internet Governance in the countries of the region, challenges faced by the countries and participation of key stakeholders in ICT and Internet policy formulation and implementation. The final part contains conclusions and recommendations.Internet, governance, knowledge-based economy, Europe, Central Asia, transition economies

    The Ping-Pong Olympics of Antisuit Injunction in FRAND Litigation

    Get PDF
    In the past two years, antisuit injunctions (ASIs) and subsequent legal proceedings associated with standard-essential patents (SEPs) subject to fair, reasonable, and nondiscriminatory (FRAND) commitments have proliferated in multiple jurisdictions. This phenomenon reveals not only the transnational nature of technical standards and FRAND-encumbered SEPs but also the jurisdictional tension between different national courts. This Article explains the emergence of ASIs in FRAND scenarios and recent developments in six jurisdictions with major interests in standard development and adoption. Countries have developed different approaches to ASIs based on their own domestic rules and interests. We believe that to promote technical compatibility and international comity, it is necessary to facilitate legal compatibility between jurisdictions at the policy level. Currently, courts in multiple jurisdictions are competing to grant ASIs and anti-anti-suit injunctions (AASIs), leading to fragmented decisions and significant costs for global standardization. We propose to include an exclusive forum selection clause in the policy documents of standard-setting organizations (SSOs) to reduce undesirable transaction costs stemming from ASIs and subsequent legal actions. Our proposal is more realistic and cost-effective than others concerning FRAND dispute resolution

    Energy

    Get PDF

    Telecommunications

    Get PDF

    Next Generation Connectivity: A Review of Broadband Internet Transitions and Policy From Around the World

    Get PDF
    Fostering the development of a ubiquitously networked society, connected over high-capacity networks, is a widely shared goal among both developed and developing countries. High capacity networks are seen as strategic infrastructure, intended to contribute to high and sustainable economic growth and to core aspects of human development. In the pursuit of this goal, various countries have, over the past decade and a half, deployed different strategies, and enjoyed different results. At the Commission's request, this study reviews the current plans and practices pursued by other countries in the transition to the next generation of connectivity, as well as their past experience. By observing the experiences of a range of market-oriented democracies that pursued a similar goal over a similar time period, we hope to learn from the successes and failures of others about what practices and policies best promote that goal. By reviewing current plans or policy efforts, we hope to learn what others see as challenges in the next generation transition, and to learn about the range of possible solutions to these challenges

    Communications Policy for 2006 and Beyond

    Get PDF
    In this Article, the Authors propose sweeping changes to the current telecommunications regulatory regime. With impending reform in telecommunications laws, the Authors argue that an important first step is the creation of a bipartisan, independent commission to examine and recommend implementation of more market-oriented communications policy. Through maximizing the operation of the markets, the authors argue that communications policy will better serve its goals of increasing business productivity and consumer welfare through the better services and lower prices. Important steps to achieve optimal market operation include deregulating retail prices where multifirm competition is available, minimizing the cost of public property inputs, overhauling universal service, assigning greater jurisdictional authority to federal regulators, and significantly reorganizing the FCC. The Authors argue that the timely implementation of these policies is crucial for achieving United States telecommunications policy goals

    Modernization of Manufacturing with Cybersecurity at the Forefront

    Full text link
    With the proliferation of Industrial Control Systems (ICSs), manufacturing processes have improved over the last 30 years, however, the organizational focus to securely exchange and process information to/from integrated systems has been consistently lacking. These environments continue to be susceptible to security vulnerabilities, despite history [15] showing that cybersecurity exposures in manufacturing have largely gone unaddressed and continue to rise [52]. This study evaluates cybersecurity challenges in the industry and proposes recommendations for practical and fiscally responsible defense-in-depth cybersecurity protections for manufacturing environments. The business operating model, how ICSs became pervasive, as well as the major components that enable the operational technology (OT) were evaluated. With an understanding of the traditional network architecture for the industry [37], the rapidly evolving challenges facing the industry were examined. These challenges are impactful to the traditional and slow to change manufacturing operating model that has not focused on the necessary cyber protections for their OT environments. In addition, the industry is now facing game-changing technological concepts such as advanced manufacturing and Industry 4.0 that bring new complex challenges and cyber threats, unfamiliar to most in the industry. This is all underpinned by an organizational divide where the personnel most knowledgeable with the modern technology and cyber risks, in the majority of cases, are not responsible for the OT architecture and security. These headwinds impact an industry which spends the least on IT and cyber security than any other industry, globally [22]. The cyber risks and challenges in the industry are diverse, spanning technological and organizational competencies, stemming from purpose built components which operate in an ecosystem where cybersecurity is an afterthought. As a means to close the gap, practical and reasonable recommendations to address these problems are discussed; some specific and unique to the manufacturing industry while others are fundamental applications discussed with a manufacturing industry lens, which are commonly ignored due to perceived complexity, cost or simply lack of awareness. Lastly, a number of these recommendations were selected for further evaluation and implementation; challenges, approach, benefits and outcomes are shared showing measureable improvements to the cybersecurity posture of the organization.Master of ScienceComputer and Information Science, College of Engineering & Computer ScienceUniversity of Michigan-Dearbornhttps://deepblue.lib.umich.edu/bitstream/2027.42/147433/1/49698122_CIS699 - Mangano Thesis - Modernization of Manufacturing with Cybersecurity at the Forefront - Final 121018-v4.pdfDescription of 49698122_CIS699 - Mangano Thesis - Modernization of Manufacturing with Cybersecurity at the Forefront - Final 121018-v4.pdf : Thesi

    HSR Abstracts & Author Index, 2004-2014

    Get PDF
    As part of the HSR Supplement 26 “Historical Social Research: An International Journal for the Application of Formal Methods to History, 2004-2014” this document contains abstracts of all 671 contributions published in Historical Social Research from 2004 to 2014 inclusive. Furthermore, this collection contains an author index
    • …
    corecore