Search results for "Computer security"
showing 10 items of 433 documents
Internet of things and privacy preserving technologies
2009
In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.
Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020
2010
In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.
Trust-enhanced intelligent security model
2012
In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use opinions to express trustworthiness of such assignments.
Rings for privacy: An architecture for privacy-preserving user profiling
2014
Vulnerability Analysis of Interdependent Critical Infrastructures upon a Cyber-attack
2019
The silent work of speech. On an Enactive Grammar’s Insight
2019
Many research programs have been worked out in recent years in order to account for an apparently trivial aspect of the human language activity. We refer to the fact that every speaker hears the sound of his own words. Our paper aims to embed this empirical insight in the theoretical framework of the so-called enactive grammar. This choice is justified by the fact that the enactive grammar introduced a formal distinction which allows to provide a clear formulation of the jakobsonian assert. In order to highlight this point, the paper will be subdivided into seven sections. The first section will be devoted to the experience of the hearing oneself speak. The second one will examine this expe…
Mapping Elderly Citizen’s Computer and ICT Use in a Small-sized Norwegian Municipality
2015
In Norway, many citizensâ services are exclusively or at least delivered online. They usually require sufficient knowledge to use information and communication technologies (ICT). As part of an Interreg IV European project focused on e-inclusion for elderly, this work presents a study to map computer and Internet use among the elderly. The study was carried out in a small municipality of 10 000 inhabitants in Southern Norway, of whom15% were 65-year-olds or older. 178 replies out of 500 were obtained. Results showed that 9 out of 10 had access to and frequently used a computer at home. However, there still was 1 out of 5 who did not make effective use of ICT. Importantly, half of the resp…
Struggles for recognition: a content analysis of messages posted on the Internet
2012
Anders Johan W Andersen,1,2 Tommy Svensson31Department of Psychosocial Health, University of Agder, Norway; 2Nordic School of Public Health, Gothenburg, Sweden; 3Department of Behavioral Sciences and Learning, Linköping University, Linköping, SwedenBackground: The Internet has enlarged the possibilities of human communication and opened new ways of exploring perceptions of mental health. This study is part of a research project aiming to explore, describe, and analyze different discourses of mental health in Norway and Sweden, using material from Internet-based services.Aim: To examine messages posed by users of publicly available question-and-answer services and to descri…
Capturing citizens — Emerging needs: Using social networks in smart cities
2017
In order to reach its objectives, smart cities (or whatever kind of smart urban environment) should be underpinned by complex cyber physical systems (CPS) able to discover needs and services and "smartly" combine them. Services may be thought as services offered by software components, of whatever nature, for instance software, bot, robot, app and so on. Searching for the best service depends on the need of the citizen(s) and also on the type of (smart) environment the citizens are in. Analysis and design of CPSs are more challenging than the only physical or the only cyber system. We propose a design paradigm shift towards runtime for identifying requirements of cyber physical systems for …
Information Infrastructures and the Challenge of the Installed Base
2017
In this chapter we present the theoretical perspective of information infrastructures, which is used to analyze the empirical cases in the book. In this perspective, information technology is seen as intimately intertwined with organizational structures, procedures and work practices, and as an underlying, supporting and often invisible infrastructure. Information infrastructures are not only local, but shared among distributed actors which can have multiple and different needs and interests. Understanding the complexities and mechanisms involved in the evolution of information infrastructures is at the core of this perspective which challenges traditional management approaches. Instead of …