Search results for "lcsh:Information theory"

showing 2 items of 2 documents

Restrictions on data-driven political micro-targeting in Germany

2017

The revitalisation of canvassing in recent elections is strongly related to campaigns´ growing possibilities for analysing voter data to gain knowledge about their constituents, identifying their most likely voters and serving up personalised messages through individual conversations. The research literature about political micro-targeting hardly ever focusses on campaigns in parliamentary democracies with strict data protection laws. Based on in-depth expert interviews we introduce a framework of constraints in strategic political communication and reveal several restrictions on the macro, meso and micro levels which hinder the implementation of sophisticated data strategies in Germany. We…

Research literatureInternet PolicyCanvassingComputer Networks and CommunicationsSocial Sciences050801 communication & media studiesQualitative propertyPolitical communicationManagement Monitoring Policy and LawCommerce communications & transportationData-drivenPolitics0508 media and communicationsPolitical sciencelcsh:Information theory050602 political science & public administrationData Protection Act 1998MacroCampaigningCommunicationPolitics05 social sciencesQualitative datalcsh:Q300-390lcsh:Q350-3900506 political scienceddc:380Computer science knowledge & systemsddc:340Political economyddc:000ddc:300lcsh:CyberneticsMicro-targetingInternet Policy Review
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct