3 research outputs found

    Notorious places: image, reputation, stigma: the role of newspapers in area reputations for social housing estates

    Get PDF
    This paper reviews work in several disciplines to distinguish between image, reputation and stigma. It also shows that there has been little research on the process by which area reputations are established and sustained through transmission processes. This paper reports on research into the portrayal of two social housing estates in the printed media over an extended period of time (14 years). It was found that negative and mixed coverage of the estates dominated, with the amount of positive coverage being very small. By examining the way in which dominant themes were used by newspapers in respect of each estate, questions are raised about the mode of operation of the press and the communities' collective right to challenge this. By identifying the way regeneration stories are covered and the nature of the content of positive stories, lessons are drawn for programmes of area transformation. The need for social regeneration activities is identified as an important ingredient for changing deprived-area reputations

    Security and privacy issues in some special-puropse networks

    Get PDF
    This thesis is about providing security and privacy to new emergent applications which are based on special-purpose networks. More precisely, we study different aspects regarding security and privacy issues related to sensor networks, mobile ad hoc networks, vehicular ad hoc networks and social networks.Sensor networks consist of resource-constrained wireless devices with sensor capabilities. This emerging technology has a wide variety of applications related to event surveillance like emergency response, habitat monitoring or defense-related networks.Ad hoc networks are suited for use in situations where deploying an infrastructure is not cost effective or is not possible for any other reason. When the nodes of an ad hoc network are small mobile devices (e.g. cell phones or PDAs), such a network is called mobile ad hoc network. One of many possible uses of MANETs is to provide crisis management services applications, such as in disaster recovery, where the entire communication infrastructure is destroyed and reestablishing communication quickly is crucial. Another useful situation for MANETs is a scenario without fixed communication systems where there is the need for any kind of collaborative computing. Such situation can occur in both business and military environments.When the mobile nodes of a MANET are embedded in cars, such a network is called Vehicular Ad hoc Network (VANET). This kind of networks can be very useful to increase the road traffic safety and they will be deployed for real use in the forthcoming years. As a proof of that, eight important European vehicle manufacturers have founded the CAR 2 CAR Communication Consortium. This non-profit organisation is dedicated to the objective of further increasing traffic safety and efficiency by means of inter-vehicle communications.Social networks differ from the special-purpose networks commented above in that they are not physical networks. Social networks are applications that work through classic networks. They can be defined as a community of web users where each user can publish and share information and services. Social networks have become an object of study both in computer and social sciences, with even dedicated journals and conferences.The special-purpose networks described above provide a wide range of new services and applications. Even though they are expected to improve the society in several ways, these innovative networks and their related applications bring also security and privacy issues that must be addressed.This thesis solves some security and privacy issues related to such new applications and services. More specifically, it focuses on:路Secure information transmission in many-to-one scenarios with resource-constrained devices such as sensor networks.路Secure and private information sharing in MANETs.路Secure and private information spread in VANETs.路Private resource access in social networks.Results presented in this thesis include four contributions published in ISI JCR journals (IEEE Transactions on Vehicular Technology, Computer Networks (2) and Computer Communications) and two contributions published in two international conferences (Lecture Notes in Computer Science).Esta tesis trata diversos problemas de seguridad y privacidad que surgen al implantar en escenarios reales novedosas aplicaciones basadas en nuevos y emergentes modelos de red. Estos nuevos modelos de red difieren significativamente de las redes de computadores cl谩sicas y son catalogadas como redes de prop贸sito especial. Espec铆ficamente, en este trabajo se estudian diferentes aspectos relacionados con la seguridad de la informaci贸n y la privacidad de los usuarios en redes de sensores, redes ad hoc m贸viles (MANETs), redes ad hoc vehiculares (VANETs) y redes sociales.Las redes de sensores est谩n formadas por dispositivos inal谩mbricos muy limitados a nivel de recursos (capacidad de computaci贸n y bater铆a) que detectan eventos o condiciones del entorno donde se instalan. Esta tecnolog铆a tiene una amplia variedad de aplicaciones entre las que destacan la detecci贸n de emergencias o la creaci贸n de per铆metros de seguridad. Una MANET esta formada por nodos m贸viles conectados entre ellos mediante conexiones inal谩mbricas y de forma auto-organizada. Este tipo de redes se constituye sin la ayuda de infraestructuras, por ello son especialmente 煤tiles en situaciones donde implantar una infraestructura es inviable por ser su coste demasiado elevado o por cualquier otra raz贸n. Una de las muchas aplicaciones de las MANETs es proporcionar servicio en situaciones cr铆ticas (por ejemplo desastres naturales) donde la infraestructura de comunicaciones ha sido destruida y proporcionar conectividad r谩pidamente es crucial. Otra aplicaci贸n directa aparece en escenarios sin sistemas de comunicaci贸n fijos donde existe la necesidad de realizar alg煤n tipo de computaci贸n colaborativa entre diversas m谩quinas. Esta situaci贸n se da tanto en 谩mbitos empresariales como militares.Cuando los nodos m贸viles de una MANET se asocian a veh铆culos (coches, camiones.), dicha red se denomina red ad hoc vehicular o VANET. Este tipo de redes pueden ser muy 煤tiles para incrementar la seguridad vial y se espera su implantaci贸n para uso real en los pr贸ximos a帽os. Como prueba de la gran importancia que tiene esta tecnolog铆a, los ocho fabricantes europeos m谩s importantes han fundado la CAR 2 CAR Communication Consortium. Esta organizaci贸n tiene como objetivo incrementar la seguridad y la eficiencia del tr谩fico mediante el uso de comunicaciones entre los veh铆culos.Las redes sociales se diferencian de las redes especiales descritas anteriormente en que 茅stas no son redes f铆sicas. Las redes sociales son aplicaciones que funcionan a trav茅s de las redes de computadores cl谩sicas. Una red de este tipo puede ser definida como una comunidad de usuarios web en donde dichos usuarios pueden publicar y compartir informaci贸n y servicios. En la actualidad, las redes sociales han adquirido gran importancia ofreciendo un amplio abanico de posibilidades a sus usuarios: trabajar de forma colaborativa, compartir ficheros, b煤squeda de nuevos amigos, etc.A continuaci贸n se resumen las aplicaciones en las que esta tesis se centra seg煤n el tipo de red asociada:路Transmisi贸n segura de informaci贸n en escenarios muchos-a-uno (m煤ltiples emisores y un solo receptor) donde los dispositivos en uso poseen recursos muy limitados. Este escenario es el habitual en redes de sensores.路Distribuci贸n de informaci贸n de forma segura y preservando la privacidad de los usuarios en redes ad hoc m贸viles.路Difusi贸n de informaci贸n (con el objeto de incrementar la seguridad vial) fidedigna preservando la privacidad de los usuarios en redes ad hoc vehiculares.路Acceso a recursos en redes sociales preservando la privacidad de los usuarios. Los resultados de la tesis incluyen cuatro publicaciones en revistas ISI JCR (IEEE Transactions on Vehicular Technology, Computer Networks (2) y Computer Communications) y dos publicaciones en congresos internacionales(Lecture Notes in Computer Science)
    corecore