98,179 research outputs found

    Secure web application development and global regulation

    Get PDF
    The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies

    A practical framework for data collection in wireless sensor networks

    Full text link
    Optimizing energy consumption for extending the lifetime in wireless sensor networks is of dominant importance. Groups of autonomous robots and unmanned aerial vehicles (UAVs) acting as mobile data collectors are utilized to minimize the energy expenditure of the sensor nodes by approaching the sensors and collecting their buffers via single hop communication, rather than using multihop routing to forward the buffers to the base station. This paper models the sensor network and the mobile collectors as a system-of-systems, and defines all levels and types of interactions. A practical framework that facilitates deploying heterogeneous mobiles without prior knowledge about the sensor network is presented. Realizing the framework is done through simulation experiments and tested against several performance metrics.<br /

    Fog Computing in Medical Internet-of-Things: Architecture, Implementation, and Applications

    Full text link
    In the era when the market segment of Internet of Things (IoT) tops the chart in various business reports, it is apparently envisioned that the field of medicine expects to gain a large benefit from the explosion of wearables and internet-connected sensors that surround us to acquire and communicate unprecedented data on symptoms, medication, food intake, and daily-life activities impacting one's health and wellness. However, IoT-driven healthcare would have to overcome many barriers, such as: 1) There is an increasing demand for data storage on cloud servers where the analysis of the medical big data becomes increasingly complex, 2) The data, when communicated, are vulnerable to security and privacy issues, 3) The communication of the continuously collected data is not only costly but also energy hungry, 4) Operating and maintaining the sensors directly from the cloud servers are non-trial tasks. This book chapter defined Fog Computing in the context of medical IoT. Conceptually, Fog Computing is a service-oriented intermediate layer in IoT, providing the interfaces between the sensors and cloud servers for facilitating connectivity, data transfer, and queryable local database. The centerpiece of Fog computing is a low-power, intelligent, wireless, embedded computing node that carries out signal conditioning and data analytics on raw data collected from wearables or other medical sensors and offers efficient means to serve telehealth interventions. We implemented and tested an fog computing system using the Intel Edison and Raspberry Pi that allows acquisition, computing, storage and communication of the various medical data such as pathological speech data of individuals with speech disorders, Phonocardiogram (PCG) signal for heart rate estimation, and Electrocardiogram (ECG)-based Q, R, S detection.Comment: 29 pages, 30 figures, 5 tables. Keywords: Big Data, Body Area Network, Body Sensor Network, Edge Computing, Fog Computing, Medical Cyberphysical Systems, Medical Internet-of-Things, Telecare, Tele-treatment, Wearable Devices, Chapter in Handbook of Large-Scale Distributed Computing in Smart Healthcare (2017), Springe

    Computer game technology, collaborative software environments and participatory design

    Get PDF
    This paper presents a project that explores the possibilities for the use of computer game technologies in the participatory design process. Interactive 3D environments designed with the Virtools development environment were used in a Home Zone consultation process, which allowed participants to navigate, explore and contribute to proposed developments to their residential environment. These technologies were observed to benefit the participatory design process in some areas, namely the visualization and contextualizing of the developments, but also presented traditional technological barriers in others. While these barriers did not completely remove the participants from the process, they reduced the apparent level of engagement of these participants with the process. This paper concludes that the technology overall, is a positive addition to the participatory design process, and while there is still much research to be undertaken, it has many more potential applications in related areas

    Cyber-crime Science = Crime Science + Information Security

    Get PDF
    Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions

    The development of accessibility indicators for distance learning programs

    Get PDF
    A study was undertaken to explore program policies and practices related to the accessibility of American distance learning courses to qualified students with disabilities. A literature review was conducted, a draft list of accessibility indicators was created, examples of applications of the indicators in existing distance learning programs were collected, the indicators were systematically applied to one distance learning program, input from a variety of distance learning programs was used to further refine the indicators, and these programs were encouraged to adopt the indicators and make use of resources provided by the project. Results of this exploratory work suggest that incorporating accessibility considerations into policies, procedures and communications of a program requires consideration of the unique needs of students, course designers, instructors and evaluators; involves approval and implementation at a variety of administrative levels; and is an ongoing process that may be implemented in incremental steps
    • …
    corecore