836,304 research outputs found

    Internet psychology, a very personal reflection: review of The Oxford handbook of Internet psychology

    Get PDF

    Personal Jurisdiction Over The Internet: How International Is Today's Shoe

    Get PDF
    <p align="left"><span style="font-size: small;">With the advent of the Internet and the World Wide Web, a novel question of procedural law has taken the legal arena by storm: how do we effectively apply traditional concepts of personal jurisdiction to the seamless world of cyberspace? In a world where politically recognized territorial boundaries will typically lead the discussion into where a party may be haled into court as a result of its activities, the Internet presents us with an anomaly of that traditional principle. Courts are now being launched into the unchartered waters of cyberspace where the traditional concept of personal jurisdiction often finds itself lost at sea. </span></p

    Is the internet good for our environment?

    Get PDF
    Reports on various studies of the net environmental impact of the internet. Considers such aspects as the energy use of computers and the avoidance of personal transport by the use of internet services

    Personal Jurisdiction: Are the Federal Rules Keeping Up with (Internet) Traffic?

    Get PDF

    Personal Jurisdiction and the Internet

    Get PDF

    CERT strategy to deal with phishing attacks

    Full text link
    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy is presented to deal with phishing and studying some anti-phishing

    Emerging privacy challenges and approaches in CAV systems

    Get PDF
    The growth of Internet-connected devices, Internet-enabled services and Internet of Things systems continues at a rapid pace, and their application to transport systems is heralded as game-changing. Numerous developing CAV (Connected and Autonomous Vehicle) functions, such as traffic planning, optimisation, management, safety-critical and cooperative autonomous driving applications, rely on data from various sources. The efficacy of these functions is highly dependent on the dimensionality, amount and accuracy of the data being shared. It holds, in general, that the greater the amount of data available, the greater the efficacy of the function. However, much of this data is privacy-sensitive, including personal, commercial and research data. Location data and its correlation with identity and temporal data can help infer other personal information, such as home/work locations, age, job, behavioural features, habits, social relationships. This work categorises the emerging privacy challenges and solutions for CAV systems and identifies the knowledge gap for future research, which will minimise and mitigate privacy concerns without hampering the efficacy of the functions
    • …
    corecore