693 research outputs found

    An Anonymous System Based on Random Virtual Proxy Mutation

    Get PDF
    Anonymous systems are usually used to protect users\u27 privacy in network communication. However, even in the low-latency Tor system, it is accompanied by network communication performance degradation, which makes users have to give up using the anonymity system in many applications. Therefore, we propose a novel anonymity system with rotated multi-path accompanying virtual proxy mutation for data transmission. Unlike onion routing, in our system the randomly generated virtual proxies take over the address isolation executing directly on the network layer and expand the anonymity space to all terminals in the network. With the optimal algorithm of selecting the path, the network communication performance improved significantly also. The verification experiments show that the anonymity system terminal sends and receives data at 500 kbps, and only a slight delay jitter occurs at the receiving end, and the other network performance is not significantly reduced

    North Dakota\u27s New Frontier: Unmanned Aircraft

    Get PDF
    Unmanned Aircraft, or drones, represent a modern-day frontier, one that is, as yet, neither fully explored nor fully developed. The state of North Dakota has moved into the frontier and is deeply involved in its exploration and development. The state has invested tens of millions of dollars in the Unmanned Aircraft Systems (UAS) industry, an investment that has helped to attract tens of millions of additional dollars from military sources and from private business firms. The University of North Dakota’s John D. Odegard School of Aerospace Sciences, long-recognized as among the leading aviation schools in the nation, is at the forefront of developing and applying Unmanned Aircraft Systems, and the school was the first to offer a university degree in UAS. Noting North Dakota’s commanding position in the UAS industry, an article in the New York Times dated December 25, 2015, referred to the state as “the Silicon Valley of Drones.” This thesis will contribute to the scholarly treatment of the UAS industry by concentrating on its development and application in the state of North Dakota. It will do so by using frontiers as the historical backdrop. Throughout the state’s history, North Dakotans have been characterized by their ability and willingness to adapt to the hardships and challenges faced on the North Dakota frontiers. They have also been able and willing to adapt to opportunities, to prospects, and to advances in technology. This thesis treats how North Dakotans are once again adapting, this time to the opportunities, prospects, and challenges presented by yet another frontier- that of unmanned aircraft or drones

    When bureaucracy meets the crowd:Studying ‘Open Government’ in the Vienna city administration

    Get PDF
    International audienceOpen Government is en vogue, yet vague: while practitioners, policy-makers, and others praise its virtues, little is known about how Open Government relates to bureaucratic organization. This paper presents insights from a qualitative investigation into the City of Vienna, Austria. It demonstrates how the encounter between the city administration and “the open” juxtaposes the decentralizing principles of the crowd, such as transparency, participation, and distributed cognition, with the centralizing principles of bureaucracy, such as secrecy, expert knowledge, written files, and rules. The paper explores how this theoretical conundrum is played out and how senior city managers perceive Open Government in relation to the bureaucratic nature of their administration. The purpose of this paper is twofold: first, to empirically trace the complexities of the encounter between bureaucracy and Open Government; and second, to critically theorize the ongoing rationalization of public administration in spite of constant challenges to its bureaucratic principles. In so doing, the paper advances our understanding of modern bureaucratic organizations under the condition of increased openness, transparency, and interaction with their environments.<br/

    Governance of the Facebook Privacy Crisis

    Get PDF
    In November 2018, The New York Times ran a front-page story describing how Facebook concealed knowledge and disclosure of Russian-linked activity and exploitation resulting in Kremlin led disruption of the 2016 and 2018 U.S. elections, through the use of global hate campaigns and propaganda warfare. By mid-December 2018, it became clear that the Russian efforts leading up to the 2016 U.S. elections were much more extensive than previously thought. Two studies conducted for the United States Senate Select Committee on Intelligence (SSCI), by: (1) Oxford University’s Computational Propaganda Project and Graphika; and (2) New Knowledge, provide considerable new information and analysis about the Russian Internet Research Agency (IRA) influence operations targeting American citizens.By early 2019 it became apparent that a number of influential and successful high growth social media platforms had been used by nation states for propaganda purposes. Over two years earlier, Russia was called out by the U.S. intelligence community for their meddling with the 2016 American presidential elections. The extent to which prominent social media platforms have been used, either willingly or without their knowledge, by foreign powers continues to be investigated as this Article goes to press. Reporting by The New York Times suggests that it wasn’t until the Facebook board meeting held September 6, 2017 that board audit committee chairman, Erskin Bowles, became aware of Facebook’s internal awareness of the extent to which Russian operatives had utilized the Facebook and Instagram platforms for influence campaigns in the United States. As this Article goes to press, the degree to which the allure of advertising revenues blinded Facebook to their complicit role in offering the highest bidder access to Facebook users is not yet fully known. This Article can not be a complete chapter in the corporate governance challenge of managing, monitoring, and oversight of individual privacy issues and content integrity on prominent social media platforms. The full extent of Facebook’s experience is just now becoming known, with new revelations yet to come. All interested parties: Facebook users; shareholders; the board of directors at Facebook; government regulatory agencies such as the Federal Trade Commission (FTC) and Securities and Exchange Commission (SEC); and Congress must now figure out what has transpired and what to do about it. These and other revelations have resulted in a crisis for Facebook. American democracy has been and continues to be under attack. This article contributes to the literature by providing background and an account of what is known to date and posits recommendations for corrective action

    Floating Entourage: Reframing Adult-Adolescent Computer-Mediated Communication towards Communal Adoption

    Get PDF
    As social media becomes the normal life experience of contemporary adolescents, faith communities are increasingly exploring ministry implications of this form of social interaction. The intent of this doctoral project is to reframe adult-adolescent computer mediated communication (hereafter, CMC) from systemic abandonment towards communal adoption. It is argued that by adaptively utilizing the concept of floating entourage,1 the foundational actions for the development of an adoptive multi-networked web of adult-adolescent relationships can be developed. Through psychosocial, theological, and missional examination, research identifies communicative community as a core reality of God’s desire for a cultural telos of communal adoption. The project consists of seminars offered between March and December of 2012 primarily targeting youth workers and secondarily parents represented from Fuller Theological Seminary’s Sacramento student body. The sessions encompassed theological, psychosocial, and ecological social media issues grounded in practical theology, measuring effectiveness according to the following desired outcomes: 1) an understanding of how each stage of adolescence affects social media usage; 2) integration of a CMC culture of adoption among existing offline-relationships; 3) understanding of how to develop opportunities for spiritual growth that invite adolescents to trust Jesus with social media issues; 4) an ability to counsel parents and other youth workers in contextualized CMC usage that perpetuates an adoption culture. To measure this, pre- and post-seminar surveys were given and results triangulated with online participant feedback of adult-adolescent CMC experiences. This study concludes that reframing adult perspectives increases psychosocial awareness of adolescent CMC usage. Concrete actions hospitable to communicative community became increasingly normative. The desire for corporate engagement with adolescents remained unchanged. Participants reported increased experiences of positive adult-adolescent social media interactions. Theological Mentor: Kurt Fredrickson, PhD Footnotes 1 Floating Entourage is a term developed to describe an adolescent’s ability through smart phone technology to digitally stay connected with their network of friends despite time and space limitations. Any adolescent, no matter where they may be, if equipped with a smart phone has this digital network of friends ‘hovering’ around with them

    Rational Cybersecurity for Business

    Get PDF
    Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your busines

    Clean Electrification

    Get PDF
    To combat climate change, many leading states have adopted the aim of creating a “participatory” grid. In this new model, electricity is priced based on time of consumption and carbon content, and consumers are encouraged to adjust their behavior and adopt new technologies to maintain affordable electricity. Although a more participatory grid is an important component of lowering greenhouse gas emissions, it also raises a new problem of clean energy justice: utilities and consumer advocates claim that such policies unjustly benefit the rich at the expense of the poor, given the type of consumer best able to participate in the grid. These arguments pitting clean energy against equity often prove persuasive to energy regulators considering whether to adopt or maintain clean energy policies. But these arguments fail to seriously engage the question of how energy law’s historical equity norms should be interpreted and applied in the era of climate change. This Article concludes that there are legitimate and underappreciated equity concerns with the participatory grid, given that participation in the grid is likely to stratify along income lines. However, these equity concerns do not justify slowing progress on climate change, given the extreme inequities raised by that problem itself. Fortunately, however, there is a longstanding tradition of attention to equity concerns within electricity law that paves a way forward. Throughout the twentieth-century project of electrification, electricity law focused on expanding the range of Americans able to access affordable electricity. Twenty-first century regulators, in contrast, plan to require consumers to participate in the grid in order to maintain affordable power. This new vision requires a new instantiation of electricity law’s long-standing equity commitment: a project of “clean electrification,” which seeks to expand participation in emerging clean energy marketplaces to all Americans

    Maximum Feasible Participation of the Poor: New Governance, New Accountability, and a 21st Century War on the Sources of Poverty

    Get PDF
    In 1964, President Lyndon B. Johnson called for a Nationwide War on the Sources of Poverty to “strike away the barriers to full participation” in our society. Central to that war was an understanding that given poverty’s complex and multi-layered causes, identifying, implementing, and monitoring solutions to it would require the “maximum feasible participation” of affected communities. Equally central, however, was an understanding that such decentralized problem-solving could not be fully effective without national-level orchestration and support. As such, an Office of Economic Opportunity was established – situated in the Executive Office of the President itself – to support, through encouragement, funding, and coordination, the development and implementation of community-based plans of action for poverty alleviation, as identified and prioritized by the poor themselves. This Article urges a return to this practical, locally-responsive, yet federally-orchestrated orientation of U.S. social welfare law. It argues that while the regulatory and political context of the 1960s provided inauspicious ground for the early “maximum feasible participation” policy to effectively take root, four decades later, two broad paradigm shifts have yielded a new, more fertile opportunity framework. The first involves the shift in U.S. regulatory law away from earlier command-and-control structures favoring fixed rules and centralized enforcement, toward a New Governance model that privileges decentralization, flexibility, stakeholder participation, performance indicators, and guided discretion. The second is the concurrent paradigm shift in U.S. social movement approaches to poverty – what I call “New Accountability” – which similarly promotes local voice and inclusive participation, performance monitoring around human rights standards, and negotiated policymaking (rather than non-negotiable material demands and mass confrontation, the preferred tactics of 1960s activism). Supported by a renewed U.S. interest in collecting and reporting performance indicators for government programs, these two shifts converge to create a theory and policy-based environment in which it is both practically feasible and normatively coherent to re-embrace the participatory orientation of the early “War on the Sources of Poverty” strategy. The challenge for U.S. social welfare rights law, I argue, is how to bring these two complementary paradigms together in constructive synergy to mount a 21st century battle against poverty. A set of national subsidiarity-based institutions to support this effort is proposed, each mandated to orchestrate and competitively incentivize targeted anti-poverty efforts by all social stakeholders, while opening new institutional spaces for the active participation of the poor in all aspects of meeting the nation’s poverty reduction targets
    corecore