836,304 research outputs found
Personal Jurisdiction Over The Internet: How International Is Today's Shoe
<p align="left"><span style="font-size: small;">With the advent of the Internet and the World Wide Web, a novel question of procedural law has taken the legal arena by storm: how do we effectively apply traditional concepts of personal jurisdiction to the seamless world of cyberspace? In a world where politically recognized territorial boundaries will typically lead the discussion into where a party may be haled into court as a result of its activities, the Internet presents us with an anomaly of that traditional principle. Courts are now being launched into the unchartered waters of cyberspace where the traditional concept of personal jurisdiction often finds itself lost at sea. </span></p
Is the internet good for our environment?
Reports on various studies of the net environmental impact of the internet. Considers such aspects as the energy use of computers and the avoidance of personal transport by the use of internet services
CERT strategy to deal with phishing attacks
Every day, internet thieves employ new ways to obtain personal identity
people and get access to their personal information. Phishing is a somehow
complex method that has recently been considered by internet thieves.The
present study aims to explain phishing, and why an organization should deal
with it and its challenges of providing. In addition, different kinds of this
attack and classification of security approaches for organizational and lay
users are addressed in this article. Finally, the CERT strategy is presented to
deal with phishing and studying some anti-phishing
Emerging privacy challenges and approaches in CAV systems
The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing. Numerous developing CAV (Connected and Autonomous Vehicle) functions, such as traffic planning, optimisation, management, safety-critical and cooperative autonomous driving applications, rely on data from various sources. The efficacy of these functions is highly dependent on the dimensionality, amount and accuracy of the data being shared. It holds, in general, that the greater the amount of data available, the greater the efficacy of the function. However, much of this data is privacy-sensitive, including personal, commercial and research data. Location data and its correlation with identity and temporal data can help infer other personal information, such as home/work locations, age, job, behavioural features, habits, social relationships. This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions
- …