184 research outputs found

    Utilizing a Restricted Access e-Learning Platform for Reform, Equity, and Self-development in Correctional Facilities

    Get PDF
    Objectives: The goal of this paper is to address the issues that arose because of the exclusion of law offenders in the Greek Correctional Institutions from second chance education during the COVID-19 pandemic. During this period, the offenders were deprived of their right to equal access to second-chance education since the pandemics blocked mobility and close contact with teaching personnel. Methods/Analysis: In this paper, we propose a framework based on the Technology Acceptance Model (TAM) that will be deployed to evaluate the acceptance of the CILMS by the learners in Correctional Institutions. We describe a methodology and a set of hypotheses that can reveal the intention of learners to use the system based on several factors, such as trust, perception of privacy, perception of usefulness, and perception of self-efficacy. Findings: We suggest that eLearning and limited Internet access should be added to the list of fundamental human rights for CI detainees as well, in order to counteract their separation from physical society. Inmates are still individuals. In fact, they should be placed in solitary confinement as prescribed by the law. Novelty/Improvement:This viewpoint has been demonstrated with the development and evaluation of acceptance by inmates through the TAM technology acceptance methodology, as well as the proposal of a generic privacy-preserving Web information and services access model for CIs that can, at the same time, provide sufficient information access freedom while respecting the restrictions that should be imposed on such an access for CI inmates. Doi: 10.28991/ESJ-2022-SIED-017 Full Text: PD

    On the existence of highly organized communities in networks of locally interacting agents

    Full text link
    In this paper we investigate phenomena of spontaneous emergence or purposeful formation of highly organized structures in networks of related agents. We show that the formation of large organized structures requires exponentially large, in the size of the structures, networks. Our approach is based on Kolmogorov, or descriptional, complexity of networks viewed as finite size strings. We apply this approach to the study of the emergence or formation of simple organized, hierarchical, structures based on Sierpinski Graphs and we prove a Ramsey type theorem that bounds the number of vertices in Kolmogorov random graphs that contain Sierpinski Graphs as subgraphs. Moreover, we show that Sierpinski Graphs encompass close-knit relationships among their vertices that facilitate fast spread and learning of information when agents in their vertices are engaged in pairwise interactions modelled as two person games. Finally, we generalize our findings for any organized structure with succinct representations. Our work can be deployed, in particular, to study problems related to the security of networks by identifying conditions which enable or forbid the formation of sufficiently large insider subnetworks with malicious common goal to overtake the network or cause disruption of its operation

    Secure Distributed Cloud Storage based on the Blockchain Technology and Smart Contracts

    Get PDF
    Objectives: This paper addresses the problem of secure data storage and sharing over cloud storage infrastructures. A secure, distributed cloud storage structure incorporating the blockchain structure is proposed that supports confidentiality, integrity, and availability. Methods/Analysis: The proposed structure combines two well-known technologies: one of them is the Ethereum Blockchain and its Smart Contracts and the other is the RSA encryption and authentication scheme. The Ethereum Blockchain is used as a data structure, which ensures data availability and integrity while RSA provides sensitive data confidentiality and source authentication. Findings: As a result, users of the proposed structure can trust it and be certain that they can securely exchange information through a publicly accessible and shared cloud storage. The application can be used either through a user interface (UI) or a command-line interface (CLI). Novelty /Improvement:The novelty of this work is that the system that is proposed could be used for secure data storage on the cloud as well as for file sharing and authentication verification. Also, secure data storage and file sharing are already offered by the proposed system. Doi: 10.28991/ESJ-2023-07-02-012 Full Text: PD
    • …
    corecore