Results for 'Data security'

998 found
Order:
  1.  88
    Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Data Storage, Security And Techniques In Cloud Computing.R. Dinesh Arpitha & Shobha R. Sai - 2018 - International Journal of Research and Analytical Reviews 5 (4).
    Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  70
    Data Analytics in Higher Education: Key Concerns and Open Questions.Alan Rubel & Kyle M. L. Jones - 2017 - University of St. Thomas Journal of Law and Public Policy 1 (11):25-44.
    “Big Data” and data analytics affect all of us. Data collection, analysis, and use on a large scale is an important and growing part of commerce, governance, communication, law enforcement, security, finance, medicine, and research. And the theme of this symposium, “Individual and Informational Privacy in the Age of Big Data,” is expansive; we could have long and fruitful discussions about practices, laws, and concerns in any of these domains. But a big part of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  67
    Data Management Practices and Educational Research Effectiveness of University Lecturers in South-South Nigeria.Valentine Joseph Owan, Francisca Nonyelum Odigwe & Bassey Asuquo Bassey - 2020 - Journal of Educational and Social Research 10 (3):24-34.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. A sample of 602 lecturers were accessed during data collection and responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6.  34
    Enabling Posthumous Medical Data Donation: An Appeal for the Ethical Utilisation of Personal Health Data.Jenny Krutzinna, Mariarosaria Taddeo & Luciano Floridi - 2019 - Science and Engineering Ethics 25 (5):1357-1387.
    This article argues that personal medical data should be made available for scientific research, by enabling and encouraging individuals to donate their medical records once deceased, similar to the way in which they can already donate organs or bodies. This research is part of a project on posthumous medical data donation developed by the Digital Ethics Lab at the Oxford Internet Institute at the University of Oxford. Ten arguments are provided to support the need to foster posthumous medical (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  7.  95
    Public Interest in Health Data Research: Laying Out the Conceptual Groundwork.Angela Ballantyne & G. Owen Schaefer - 2020 - Journal of Medical Ethics 46 (9):610-616.
    The future of health research will be characterised by three continuing trends: rising demand for health data; increasing impracticability of obtaining specific consent for secondary research; and decreasing capacity to effectively anonymise data. In this context, governments, clinicians and the research community must demonstrate that they can be responsible stewards of health data. IRBs and RECs sit at heart of this process because in many jurisdictions they have the capacity to grant consent waivers when research is judged (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Integration of Intelligence Data Through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS). CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of (...) sources, types, models, and modalities (including text, images, audio, and signals). The result of applying this strategy to a given body of data is an evolving Dataspace that allows the application of a variety of integration and analytic processes to diverse data contents. We conceive semantic enhancement (SE) as a lightweight and flexible process that leverages the richness of the structured contents of the Dataspace without adding storage and processing burdens to what, in the intelligence domain, will be an already storage- and processing-heavy starting point. SE works not by changing the data to which it is applied, but rather by adding an extra semantic layer to this data. We sketch how the semantic enhancement approach can be applied consistently and in cumulative fashion to new data and data-models that enter the Dataspace. (shrink)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   8 citations  
  9.  29
    ICTs, Data and Vulnerable People: A Guide for Citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Big Data Ethics in Research.Nicolae Sfetcu - manuscript
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal data and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Data Science and Mass Media: Seeking a Hermeneutic Ethics of Information.Christine James - 2015 - Proceedings of the Society for Phenomenology and Media, Vol. 15, 2014, Pages 49-58 15 (2014):49-58.
    In recent years, the growing academic field called “Data Science” has made many promises. On closer inspection, relatively few of these promises have come to fruition. A critique of Data Science from the phenomenological tradition can take many forms. This paper addresses the promise of “participation” in Data Science, taking inspiration from Paul Majkut’s 2000 work in Glimpse, “Empathy’s Impostor: Interactivity and Intersubjectivity,” and some insights from Heidegger’s "The Question Concerning Technology." The description of Data Science (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Institutional Variables and the Supervision of Security in Public Secondary Schools in Cross River State.Festus Obun Arop & Valentine Joseph Owan - 2018 - International Journal of Innovation in Educational Management (IJIEM) 2 (1):1-11.
    The purpose of this paper was to examine institutional variables and the supervision of security in secondary schools in Cross River State. The study specifically sought to determine whether there was a significant influence of school population, school type and school location, on the supervision of security in public secondary schools in Cross River State. Three null hypotheses were formulated accordingly to guide the study. 360 students and 120 teachers resulting in a total of 480 respondents, constituted the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Horizontal Integration of Warfighter Intelligence Data: A Shared Semantic Resource for the Intelligence Community.Barry Smith, Tatiana Malyuta, William S. Mandrick, Chia Fu, Kesny Parent & Milan Patel - 2012 - In Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS), CEUR. pp. 1-8.
    We describe a strategy that is being used for the horizontal integration of warfighter intelligence data within the framework of the US Army’s Distributed Common Ground System Standard Cloud (DSC) initiative. The strategy rests on the development of a set of ontologies that are being incrementally applied to bring about what we call the ‘semantic enhancement’ of data models used within each intelligence discipline. We show how the strategy can help to overcome familiar tendencies to stovepiping of intelligence (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   5 citations  
  14. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It was (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  9
    Management of Data in Higher Education and the Quality of Academic Research of University Lecturers : A Case Study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  62
    Handles for Pentesting Modern Secure Coding: Bypassing Mobile Security.Mourad M. H. Henchiri - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (4):8-15.
    Abstract— Malware behavior was and still is a key solution, for top security appliances, to monitor algorithmic approaches when performing regular security tasks; scan, detection, cleaning and removal. And even for early actions; when building a security framework and securing all possible access points to all data sources. The first suspect in such scenario is the inner residents; appliances and system functions. Numerous are available at each operating system, and thus, the security is raised and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Ownership of Personal Data in the Internet of Things.Václav Janeček - 2018 - Computer Law and Security Review 34 (5):1039-52.
    This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Cloud Computing and Big Data for Oil and Gas Industry Application in China.Yang Zhifeng, Feng Xuehui, Han Fei, Yuan Qi, Cao Zhen & Zhang Yidan - 2019 - Journal of Computers 1.
    The oil and gas industry is a complex data-driven industry with compute-intensive, data-intensive and business-intensive features. Cloud computing and big data have a broad application prospect in the oil and gas industry. This research aims to highlight the cloud computing and big data issues and challenges from the informatization in oil and gas industry. In this paper, the distributed cloud storage architecture and its applications for seismic data of oil and gas industry are focused on (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Relationship Between Corporate Governance and Information Security Governance Effectiveness in United States Corporations.Dr Robert E. Davis - 2017 - Dissertation, Walden
    Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  43
    Moral Implications of Data-Mining, Key-Word Searches, and Targeted Electronic Surveillance.Michael Skerker - 2015 - In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets. Oxford, UK:
    This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  39
    Artificial Intelligent Smart Home Automation with Secured Camera Management-Based GSM, Cloud Computing and Arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Engaging the Public in Ethical Reasoning About Big Data.Justin Anthony Knapp - 2016 - In Soren Adam Matei & Jeff Collman (eds.), Ethical Reasoning in Big Data: An Exploratory Analysis. Springer. pp. 43-52.
    The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical The public constitutes a major stakeholder in the debate about, and resolution of privacy and ethical about Big Data research seriously and how to communicate messages designed to build trust in specific big data projects and the institution of science in general. This chapter explores the implications of various examples of engaging the public in online activities such as Wikipedia that contrast with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Axiology of Necrologies: Using Natural Language Processing to Examine Values in Obituaries (Dissertation Code and Limited Data).Jacob Levernier - 2016 - Dissertation, University of Oregon
    This dissertation is centrally concerned with exploring obituaries as repositories of values. Obituaries are a publicly-available natural language source that are variably written for members of communities that are wide (nation- level) and narrow (city-level, or at the level of specific groups therein). Because they are explicitly summative, limited in size, and written for consumption by a public audience, obituaries may be expected to express concisely the aspects of their subjects’ lives that the authors (often family members living in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  31
    Key ethical challenges in the European Medical Information Framework.Luciano Floridi, Christoph Luetge, Ugo Pagallo, Burkhard Schafer, Peggy Valcke, Effy Vayena, Janet Addison, Nigel Hughes, Nathan Lea, Caroline Sage, Bart Vannieuwenhuyse & Dipak Kalra - 2019 - Minds and Machines 29 (3):355-371.
    The European Medical Information Framework project, funded through the IMI programme, has designed and implemented a federated platform to connect health data from a variety of sources across Europe, to facilitate large scale clinical and life sciences research. It enables approved users to analyse securely multiple, diverse, data via a single portal, thereby mediating research opportunities across a large quantity of research data. EMIF developed a code of practice to ensure the privacy protection of data subjects, (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   3 citations  
  26. Infopolitics, Biopolitics, Anatomopolitics.Colin Koopman - 2018 - Graduate Faculty Philosophy Journal 39 (1):103-128.
    This paper argues for a distinctive concept of "infopolitics" as a theoretical tool for understanding how new regimes of data are exerting increasing political control of our lives. It seems almost undeniable today that there is a politics at stake in such ubiquitous features of our society as social media interaction, electioneering (and election hacking) through those interactions, cell phone addiction, personal information monetization, the lack of security in personal data markets, and massively-scaled state surveillance. Yet, even (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   1 citation  
  27. Preliminaries of a Space Situational Awareness Ontology.Robert J. Rovetto & T. S. Kelso - 2016 Feb - In Renato Zanetti, Ryan P. Russell, Martin T. Oximek & Angela L. Bowes (eds.), Proceedings of AAS/AIAA Spaceflight Mechanics Meeting, in Advances in the Astronautical Sciences. Univelt Inc.. pp. 4177-4192.
    Space situational awareness (SSA) is vital for international safety and security, and for the future of space travel. The sharing of SSA data and information should improve the state of global SSA for planetary defense and spaceflight safety. I take steps toward a Space Situational Awareness (SSA) Ontology, and outline some central objectives, requirements and desiderata in the ontology development process for this domain. The purpose of this ontological system is to explore the potential for the ontology research (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28.  17
    STC Database for SQL Range Queries Digital Apps with Privacy Preserving.Chandran Sudhin - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):49-59.
    Businesses and people outsource database to realize helpful and low-cost applications and administrations. In arrange to supply adequate usefulness for SQL inquiries, numerous secure database plans have been proposed. In any case, such plans are helpless to protection leakage to cloud server. The most reason is that database is facilitated and handled in cloud server, which is past the control of information proprietors. For the numerical extend inquiry (“>”, “<”, etc.), those plans cannot give adequate protection security against viable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Type of Tomato Classification Using Deep Learning.Mahmoud A. Alajrami & Samy S. Abu-Naser - 2020 - International Journal of Academic Pedagogical Research (IJAPR) 3 (12):21-25.
    Abstract: Tomatoes are part of the major crops in food security. Tomatoes are plants grown in temperate and hot regions of South American origin from Peru, and then spread to most countries of the world. Tomatoes contain a lot of vitamin C and mineral salts, and are recommended for people with constipation, diabetes and patients with heart and body diseases. Studies and scientific studies have proven the importance of eating tomato juice in reducing the activity of platelets in diabetics, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  59
    Workshop Report: Creating a Citizens’ Information Pack on Ethical and Legal Issues Around Icts: What Should Be Included?Janice Asine, Corelia Baibarac-Duignan, Elisabetta Broglio, Alexandra Castańeda, Helen Feord, Linda Freyburg, Marcel Leppée, Andreas Matheus, Marta Camara Oliveira, Christoforos Pavlakis, Jaume Peira, Karen Soacha, Gefion Thuermer, Katrin Vohland, Katherin Wagenknecht, Tim Woods, Katerina Zourou, Federico Caruso, Annelies Duerinckx, Andrzej Klimczuk, Mieke Sterken & Anna Berti Suman - 2020 - European Citizen Science Association.
    The aim of this workshop was to ask potential end-users of the citizens’ information pack on legal and ethical issues around ICTs the following questions: What is your knowledge of the EU’s General Data Protection Regulation, and what actions have you taken in response to these regulations? What challenges are you experiencing in ensuring the protection and security of your project data, and compliance with the GDPR, within existing data management processes/systems? What information/tools/resources do you need (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Traditional and Experimental Approaches to Free Will and Moral Responsibility.Gunnar Björnsson & Derk Pereboom - 2016 - In Justin Sytsma & Wesley Buckwalter (eds.), Companion to Experimental Philosophy. Blackwell. pp. 142-57.
    Examines the relevance of empirical studies of responsibility judgments for traditional philosophical concerns about free will and moral responsibility. We argue that experimental philosophy is relevant to the traditional debates, but that setting up experiments and interpreting data in just the right way is no less difficult than negotiating traditional philosophical arguments. Both routes are valuable, but so far neither promises a way to secure significant agreement among the competing parties. To illustrate, we focus on three sorts of issues. (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  32. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Bell's Theorem Versus Local Realism in a Quaternionic Model of Physical Space.Joy Christian - 2019 - IEEE Access 7:133388-133409.
    In the context of EPR-Bohm type experiments and spin detections confined to spacelike hypersurfaces, a local, deterministic and realistic model within a Friedmann-Robertson-Walker spacetime with a constant spatial curvature (S^3 ) is presented that describes simultaneous measurements of the spins of two fermions emerging in a singlet state from the decay of a spinless boson. Exact agreement with the probabilistic predictions of quantum theory is achieved in the model without data rejection, remote contextuality, superdeterminism or backward causation. A singularity-free (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  34. Synchronous Firing and its Influence on the Brain's Electromagnetic Field: Evidence for an Electromagnetic Field Theory of Consciousness.J. McFadden - 2002 - Journal of Consciousness Studies 9 (4):23-50.
    The human brain consists of approximately 100 billion electrically active neurones that generate an endogenous electromagnetic field, whose role in neuronal computing has not been fully examined. The source, magnitude and likely influence of the brain's endogenous em field are here considered. An estimate of the strength and magnitude of the brain's em field is gained from theoretical considerations, brain scanning and microelectrode data. An estimate of the likely influence of the brain's em field is gained from theoretical principles (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  35.  33
    Robust Multiple Authority and Attribute Based Encryption for Access Control in Cloud Computing.P. S. Mona & M. Dhande ProfNutan - 2018 - International Journal on Recent and Innovation Trends in Computing and Communication 6 (3).
    Data access control is a challenging issue in public cloud storage systems. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been adopted as a promising technique to provide flexible, fine-grained and secure data access control for cloud storage with honest-but- curious cloud servers. However, in the existing CP-ABE schemes, the single attribute authority must execute the time-consuming user legitimacy verification and secret key distribution, and hence it results in a single-point performance bottleneck when a CP-ABE scheme is adopted in a large-scale (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36.  41
    Українське ісламознавство в контексті проблеми дослідження радикального джихадізму.Mykola Nesprava - 2018 - Гілея: Науковий Вісник 128:270-272.
    Obtaining data on the results of the study of Ukrainian scholars on radical Jihadism is the purpose of this study. To achieve this goal, the study uses analysis and hermeneutics as its research methods. The research found that in the Ukrainian Islamic studies, there are now five main areas of research: theoretical, historical, social, economical and the area of security provision. In Ukraine, the problem of radical Jihadism is considered within the framework of the security research direction. (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  37.  83
    Epidemic Depression and Burtonian Melancholy.Jennifer Radden - 2007 - Philosophical Papers 36 (3):443-464.
    Data indicate the ubiquity and rapid increase of depression wherever war, want and social upheaval are found. The goal of this paper is to clarify such claims and draw conceptual distinctions separating the depressive states that are pathological from those that are normal and normative responses to misfortune. I do so by appeal to early modern writing on melancholy by Robert Burton, where the inchoate and boundless nature of melancholy symptoms are emphasized; universal suffering is separated from the disease (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Computational Transformation of the Public Sphere: Theories and Cases.S. M. Amadae (ed.) - 2020 - Helsinki: Faculty of Social Sciences, University of Helsinki.
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Cryptographic Methods with a Pli Cachete: Towards the Computational Assurance of Integrity.Thatcher Collins - 2020 - In Gerhard R. Joubert Ian Foster (ed.), Advances in Parallel Computing. Amsterdam: IOS Press. pp. 10.
    Unreproducibility stemming from a loss of data integrity can be prevented with hash functions, secure sketches, and Benford's Law when combined with the historical practice of a Pli Cacheté where scientific discoveries were archived with a 3rd party to later prove the date of discovery. Including the distinct systems of preregistation and data provenance tracking becomes the starting point for the creation of a complete ontology of scientific documentation. The ultimate goals in such a system--ideally mandated--would rule out (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  72
    Ontology as the Core Discipline of Biomedical Informatics: Legacies of the Past and Recommendations for the Future Direction of Research.Barry Smith & Werner Ceusters - 2007 - In Gordana Dodig Crnkovic & Susan Stuart (eds.), Computation, Information, Cognition: The Nexus and the Liminal. Cambridge Scholars Publishing. pp. 104-122.
    The automatic integration of rapidly expanding information resources in the life sciences is one of the most challenging goals facing biomedical research today. Controlled vocabularies, terminologies, and coding systems play an important role in realizing this goal, by making it possible to draw together information from heterogeneous sources – for example pertaining to genes and proteins, drugs and diseases – secure in the knowledge that the same terms will also represent the same entities on all occasions of use. In the (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Investigation Into Ethical Issues of Intelligent Systems.Marziyah Davoodabadi & Zahra Khazaei - 2008 - Journal of Philosophical Theological Research 10 (37):95-120.
    Despite of the undeniable advantages and surprising applications of them in training and industry as well as cultures of different countries, there have been many ethical issues concerning intelligent and computer systems. Presenting a definition of artificial intelligence and intelligent systems, the research paper deals with the shared ethical issues of intelligent systems, computer systems as well as the global network; and then it concentrates on the most important ethical issues of two types of intelligent systems, i.e. data-analysis system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  14
    Development of a Method for Selected Financing of Scientific and Educational Institutions Through Targeted Capital Investment in the Development of Innovative Technologies.Iaroslava Levchenko, Oksana Dmytriieva, Inna Shevchenko, Igor Britchenko, Vitalii Kruhlov, Nina Avanesova, Oksana Kudriavtseva & Olesia Solodovnik - 2021 - Eastern-European Journal of Enterprise Technologies 3 (13 (111)):55 - 62.
    The problem of supporting scientific and educational institutions is considered. A method of selective financing of scientific and educational institutions that create innovative technologies taking into account their investment in innovative developments is proposed. On the basis of statistical data on the indicators for assessing the activities of scientific and educational institutions and the indicator of the innovative potential of a scientific and educational institution from the production of innovations (PNn), their rating was calculated. The essence of PNn is (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  43. Equality and Information.Carl Knight & Roger Knight - 2012 - Ethical Perspectives 19 (3):469-499.
    Traditional outcome-orientated egalitarian principles require access to information about the size of individual holdings. Recent egalitarian political theory has sought to accommodate considerations of responsibility. Such a move may seem problematic, in that a new informational burden is thereby introduced, with no apparent decrease in the existing burden. This article uses a simple model with simulated data to examine the extent to which outcome egalitarianism and responsibility-sensitive egalitarianism (‘luck egalitarianism’) can be accurately applied where information is incomplete or erroneous. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44. W poszukiwaniu ontologicznych podstaw prawa. Arthura Kaufmanna teoria sprawiedliwości [In Search for Ontological Foundations of Law: Arthur Kaufmann’s Theory of Justice].Marek Piechowiak - 1992 - Instytut Nauk Prawnych PAN.
    Arthur Kaufmann is one of the most prominent figures among the contemporary philosophers of law in German speaking countries. For many years he was a director of the Institute of Philosophy of Law and Computer Sciences for Law at the University in Munich. Presently, he is a retired professor of this university. Rare in the contemporary legal thought, Arthur Kaufmann's philosophy of law is one with the highest ambitions — it aspires to pinpoint the ultimate foundations of law by explicitly (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   2 citations  
  45. A Study on Tools And Techniques Used For Network Forensic In A Cloud Environment: An Investigation Perspective.Rajeshwar Rao & Siby Samuel - 2014 - Journal of Basic and Applied Engineering Research 1 (8):21-26.
    The modern computer environment has moved past the local data center with a single entry and exit point to a global network comprising many data centers and hundreds of entry and exit points, commonly referred as Cloud Computing, used by all possible devices with numerous entry and exit point for transactions, online processing, request and responses traveling across the network, making the ever complex networks even more complex, making traversing, monitoring and detecting threats over such an environment a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  54
    Present Scenario of Fog Computing and Hopes for Future Research.G. KSoni, B. Hiren Bhatt & P. Dhaval Patel - 2019 - International Journal of Computer Sciences and Engineering 7 (9).
    According to the forecast that billions of devices will get connected to the Internet by 2020. All these devices will produce a huge amount of data that will have to be handled rapidly and in a feasible manner. It will become a challenge for real-time applications to handle this huge data while considering security issues as well as time constraints. The main highlights of cloud computing are on-demand service and scalability; therefore the data generated from IoT (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  45
    All Flash, No Substance?Elizabeth Miller - forthcoming - In V. Allori (ed.), Quantum Mechanics and Fundamentality.
    The GRW dynamics propose a novel, relevantly “observer”-independent replacement for orthodox “measurement”-induced collapse. Yet the tails problem shows that this dynamical innovation is not enough: a principled alternative to the orthodox account demands some corresponding ontological advancement as well. In fact, there are three rival fundamental ontologies on offer for the GRW dynamics. Debate about the relative merits of these candidates is a microcosm of broader disagreement about the role of ontology in our physical theorizing. According to imprimitivists, the GRW (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  47
    Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. URBAN INFRASTRUCTURE PREFERENCES OF TOWNSFOLK: AN EMPIRICAL SURVEY WITHIN THE FRAMEWORK OF SOCIO-ECOLOGICAL MODEL OF THE CITY.Vitalii Shymko, Daria Vystavkina & Ievgeniia Ivanova - 2020 - Technologies of Intellect Development 4 (2(27)).
    The article presents the results of an interdisciplinary (psychological, behavioral, sociological, urban) survey of residents of elite residential complexes of Odessa regarding theirs urban infrastructure preferences, as well as the degree of satisfaction with their place of residence. It was found that respondents are characterized by a high level of satisfaction with their place of residence. It was also revealed that the security criterion of the district is the main one for choosing a place of residence, which indicates the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 998