Information Security: Computer Hacker Information Available on the Internet
1996-06-05
INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.
Crime, Abuse, and Hacker Ethics.
ERIC Educational Resources Information Center
Johnson, Deborah G.
1994-01-01
Discusses computer ethics and the use of computer networks. Topics addressed include computer hackers; software piracy; computer viruses and worms; intentional and unintentional abuse; intellectual property rights versus freedom of thought; the role of information in a democratic society; individual privacy; legislation; social attitudes; and the…
Crime or War: Cyberspace Law and Its Implications for Intelligence
2011-02-11
NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON a. REPORT UNCLASSIFED b. ABSTRACT UNCLASSIFED c . THIS PAGE UNCLASSIFED UNLIMITED 38...protected computer or gaining and using information in a manner exceeding authorized access. Robert Morris, a Cornell University computer science...hacker and not the Iranian government. There are hundreds of hackers conducting computer intrusions each day. The previously cited example of Robert
Teaching Hackers: School Computing Culture and the Future of Cyber-Rights.
ERIC Educational Resources Information Center
Van Buren, Cassandra
2001-01-01
Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…
Emulating a million machines to investigate botnets.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rudish, Donald W.
2010-06-01
Researchers at Sandia National Laboratories in Livermore, California are creating what is in effect a vast digital petridish able to hold one million operating systems at once in an effort to study the behavior of rogue programs known as botnets. Botnets are used extensively by malicious computer hackers to steal computing power fron Internet-connected computers. The hackers harness the stolen resources into a scattered but powerful computer that can be used to send spam, execute phishing, scams or steal digital information. These remote-controlled 'distributed computers' are difficult to observe and track. Botnets may take over parts of tens of thousandsmore » or in some cases even millions of computers, making them among the world's most powerful computers for some applications.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Granger, S.
The hacker ethic can be a peculiar concept to those unfamiliar with hacking and what really is. In fact, the entire definition of hacking is somewhat obscure. Hacking originated as a challenge between programmers. Programmers at MIT are known for coining the term. Individuals would hack at code meaning that they would work at programming problems until they could maniuplate their computers into doing exactly what they wanted. The MIT hackers began with simple programs and moved on to fidding with UNIX machines, especially those on the Arpanet. Hackers started freely distributing their code to their friends and eventually tomore » their friends across the network. This gave rise to a notion that software should be free. Eventually this was taken to the extreme information and network access should also be free.« less
Flow-based model of computer hackers' motivation.
Voiskounsky, Alexander E; Smyslova, Olga V
2003-04-01
Hackers' psychology, widely discussed in the media, is almost entirely unexplored by psychologists. In this study, hackers' motivation is investigated, using the flow paradigm. Flow is likely to motivate hackers, according to views expressed by researchers and by hackers themselves. Taken as granted that hackers experience flow, it was hypothesized that flow increases with the increase of hackers' competence in IT use. Self-selected subjects were recruited on specialized web sources; 457 hackers filled out a web questionnaire. Competence in IT use, specific flow experience, and demographic data were questioned. An on-line research was administered within the Russian-speaking community (though one third of Ss are non-residents of Russian Federation); since hacking seems to be international, the belief is expressed that the results are universal. The hypothesis is not confirmed: flow motivation characterizes the least and the most competent hackers, and the members of an intermediate group, that is, averagely competent Ss report the "flow crisis"-no (or less) flow experience. Two differing strategies of task choice were self-reported by Ss: a step-by-step increase of the difficulty of choices leads to a match of challenges and skills (and to preserving the flow experience); putting choices irrespective of the likelihood of solution leads to a "flow crisis." The findings give productive hints on processes of hackers' motivational development. The flow-based model of computer hackers' motivation was developed. It combines both empirically confirmed and theoretically possible ways of hackers' "professional" growth.
How You Can Protect Public Access Computers "and" Their Users
ERIC Educational Resources Information Center
Huang, Phil
2007-01-01
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
2012-06-21
Jaci Mize of the National Oceanic and Atmospheric Administration at Stennis Space Center learns about 'phishing,' a favorite ploy used by hackers to gain sensitive information from unsuspecting computer users, during the eighth annual Information Technology Expo held June 2, 2012,1 at the rocket engine test facility.
Infotech. Cyber security. Health care learns to share scares and solutions.
Colias, Mike
2004-05-01
Health care information technology leaders and others are coming together to share scary experiences and develop best practices to guard against crippling computer viruses, scheming hackers and other cyber threats.
[New risks of addiction for new populations: the example of hackers].
Tisserand, I N
2000-10-01
Our purpose was to examine recent social and technical habits related to high-tech environments. Our goal was to show that the prevention of risk behaviors due to training in data processing, requires an interdisciplinary approach where medical anthropology could benefit from and exchange of complementary information sources (particularly from psychiatrics and psychoanalysis). We used this approach to search for solutions regarding new kinds of addiction. When identifying pathological conditions and proposing appropriate care, these solutions must take into consideration the progressive loss of human nature in data processing environments and the very important and highly sophisticated relationship established between the human being and the computer. We looked at the hacker population as a modern tribe and marginal group. Our analysis led to a better understanding of this kind of artificial culture, sometimes called a "high-tech" or "cyber" culture. The hacker population is integrating new rituals, languages and special rhythms which induce addictions. We show how high-tech environments operating in e-time and e-life induce addictions. This work illustrates a classical anthropological approach to the question (ethnological fields, interviews, literature analysis). The major challenge is to explain how high-tech environments present high risks for dependency in the hacker population and other, unwarned, computer (ab)users.
ERIC Educational Resources Information Center
Thompson, Eleanor Elizabeth
2014-01-01
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
What Is Anonymous?: A Case Study of an Information Systems Hacker Activist Collective Movement
ERIC Educational Resources Information Center
Pendergrass, William Stanley
2013-01-01
Interconnected computer information systems have become indispensable aspects of modern life. All forms of communication, education, finance, commerce and identity utilize these systems creating a permanent personal presence for all of us within this digital world. Individuals who reveal or threaten to reveal these personal identities for various…
2 Internet-Savvy Students Help Track Down the Hacker of an NCAA Web Site.
ERIC Educational Resources Information Center
Wanat, Thomas
1997-01-01
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-09
... allege that hackers were able to exploit vulnerabilities in the computer networks of multiple end user clients, putting all consumer reports in those networks at risk. In multiple breaches, hackers accessed...
2015-05-01
say/. According to the article, “the hackers targeted big-name makers of nuclear and solar technology, stealing confidential business information...As JTF-GNO synchronized efforts to disinfect and protect over 2.5 million computers in 3,500 DoD organizations spanning 99 countries, Defense
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
The DTIC Review. Information Terrorism. Volume 5, Number 1
2000-03-01
ABSTRACT: (U) This document describes a PERSONAL AUTHORS: Llinas, James; proposed program of research into theories, Bisantz, Ann; Drury , Colin ; Seong...management computer. Before he finished he transferred more than $12 million to other banks and had access to the $500 billion daily transfer account . 3 By the...modem. The General Accounting Office recently estimated that Pentagon computers experience some 250,000 hacker attacks per year and 5 that 65 percent
Care and the Construction of Hacker Identities, Communities, and Society
ERIC Educational Resources Information Center
Toombs, Austin Lewis
2016-01-01
Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…
Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun
2017-05-01
The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.
1993-10-26
She offered some remarks about the effect of labeling youthful perpetrators as "hackers." Among certain segments of the youth culture, "hacker* has...provided by corporate system managers was also noted. It follows that effectively to prevent computer crime, steps must be taken to ensure cooperation among...as artificial, albeit most effective , i•’M04-..ýes on the abilities of people to perpetrate or enhance criminal activities with probab~y Ias
Advanced information society(7)
NASA Astrophysics Data System (ADS)
Chiba, Toshihiro
Various threats are hiding in advanced informationalized society. As we see car accident problems in motorization society light aspects necessarily accompy shady ones. Under the changing circumstances of advanced informationalization added values of information has become much higher. It causes computer crime, hacker, computer virus to come to the surface. In addition it can be said that infringement of intellectual property and privacy are threats brought by advanced information. Against these threats legal, institutional and insurance measures have been progressed, and newly security industry has been established. However, they are not adequate individually or totally. The future vision should be clarified, and countermeasures according to the visions have to be considered.
76 FR 26729 - Ceridian Corporation; Analysis of Proposed Consent Order to Aid Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... result of these failures, hackers executed an SQL injection attack on the Powerpay Web site and Web application. Through this attack, the hackers found personal information stored in Powerpay on Ceridian's...
NASA Technical Reports Server (NTRS)
Denning, Peter J.
1989-01-01
Two new books about intrusions and computer viruses remind us that attacks against our computers on networks are the actions of human beings. Cliff Stoll's book about the hacker who spent a year, beginning in Aug. 1986, attempting to use the Lawrence Berkeley Computer as a stepping-stone for access to military secrets is a spy thriller that illustrates the weaknesses of our password systems and the difficulties in compiling evidence against a hacker engaged in espionage. Pamela Kane's book about viruses that attack IBM PC's shows that viruses are the modern version of the old problem of a Trojan horse attack. It discusses the most famous viruses and their countermeasures, and it comes with a floppy disk of utility programs that will disinfect your PC and thwart future attack.
Ethical Responsibility Key to Computer Security.
ERIC Educational Resources Information Center
Lynn, M. Stuart
1989-01-01
The pervasiveness of powerful computers and computer networks has raised the specter of new forms of abuse and of concomitant ethical issues. Blurred boundaries, hackers, the Computer Worm, ethical issues, and implications for academic institutions are discussed. (MLW)
Do potential SETI signals need to be decontaminated?
NASA Astrophysics Data System (ADS)
Carrigan, Richard A., Jr.
2006-01-01
Biological contamination from space samples is a remote but accepted possibility. Signals received by searches for extraterrestrial intelligence (SETI) could also contain harmful information in the spirit of a computer virus, the so-called "SETI Hacker" hypothesis. Over the last four decades extraterrestrial intelligence searches have given little consideration to this possibility. Some argue that information in an extraterrestrial signal could not attack a terrestrial computer because the computer logic and code is idiosyncratic and constitutes an impenetrable firewall. Suggestions are given on how to probe these arguments. Measures for decontaminating extraterrestrial intelligence signals (ETI) are discussed. Modifications to the current SETI detection protocol may be appropriate. Beyond that, the potential character of ETI message content requires much broader discussion.
DOE's Computer Incident Advisory Capability (CIAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schultz, E.
1990-09-01
Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less
Graph Coarsening for Path Finding in Cybersecurity Graphs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh
2013-01-01
n the pass-the-hash attack, hackers repeatedly steal password hashes and move through a computer network with the goal of reaching a computer with high level administrative privileges. In this paper we apply graph coarsening in network graphs for the purpose of detecting hackers using this attack or assessing the risk level of the network's current state. We repeatedly take graph minors, which preserve the existence of paths in the graph, and take powers of the adjacency matrix to count the paths. This allows us to detect the existence of paths as well as find paths that have high risk ofmore » being used by adversaries.« less
NASA Technical Reports Server (NTRS)
Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)
2001-01-01
This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.
ERIC Educational Resources Information Center
Wilson, David L.
1994-01-01
College administrators recently appealed to students and faculty to change their computer passwords after security experts announced that tens of thousands had been stolen by computer hackers. Federal officials are investigating. Such attacks are not uncommon, but the most effective solutions are either inconvenient or cumbersome. (MSE)
SFU Hacking for Non-Hackers v. 1.005
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, David James
The program provides a limited virtual environment for exploring some concepts of computer hacking. It simulates a simple computer system with intentional vulnerabilities, allowing the user to issue commands and observe their results. It does not affect the computer on which it runs.
Computer Virus Bibliography, 1988-1989.
ERIC Educational Resources Information Center
Bologna, Jack, Comp.
This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…
Online Hand Holding in Fixing Computer Glitches
ERIC Educational Resources Information Center
Goldsborough, Reid
2005-01-01
According to most surveys, computer manufacturers such as HP puts out reliable products, and computers in general are less troublesome than in the past. But personal computers are still prone to bugs, conflicts, viruses, spyware infestations, hacker and phishing attacks, and--most of all--user error. Unfortunately, technical support from computer…
ERIC Educational Resources Information Center
Wilson, David L.
1993-01-01
Campus computing officials are working to improve security against computer hackers because of concerns about privacy, accidental or intentional damage to systems, and impediments to legitimate system users. Increasingly, public law enforcement authorities are called in but do not always take the problem seriously. (MSE)
The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law Enforcement’s Role?
2001-04-01
defined as cyber crime or —hacker“. Although this category of hacker includes many kinds of cyber criminals , from a DOD perspective, the motivation of a...perpetrator. 6 In his book, —Fighting Computer Crime“, Wiley identifies several types of cyber criminals . They range from pranksters who perpetrate...usually financial11 This first group of cyber criminals or —hackers“ can be categorized as Unintentional Cyber actors. Although they have a variety of
Technological Metaphors and Moral Education: The Hacker Ethic and the Computational Experience
ERIC Educational Resources Information Center
Warnick, Bryan R.
2004-01-01
This essay is an attempt to understand how technological metaphors, particularly computer metaphors, are relevant to moral education. After discussing various types of technological metaphors, it is argued that technological metaphors enter moral thought through their "functional descriptions." The computer metaphor is then explored by turning to…
ERIC Educational Resources Information Center
Landis, Melodee
2001-01-01
Describes the blurring line between the traditional roles of "systems guys" and "hackers" in the world of computer network professionals, creating a "techie 3.0," or computer professional who has experience and training in technical and non-technical fields and contributes both design expertise and creativity. (EV)
Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena
2016-01-01
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders—attention to detail and systemizing—may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings. PMID:27242491
Harvey, India; Bolgan, Samuela; Mosca, Daniel; McLean, Colin; Rusconi, Elena
2016-01-01
Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are typically enhanced in autism spectrum disorders-attention to detail and systemizing-may be positively related to both the choice of pursuing a career in information security and skilled performance in a prototypical hacking task (i.e., crypto-analysis or code-breaking). A group of naïve participants and of ethical hackers completed the Autism Spectrum Quotient, including an attention to detail scale, and the Systemizing Quotient (Baron-Cohen et al., 2001, 2003). They were also tested with behavioral tasks involving code-breaking and a control task involving security X-ray image interpretation. Hackers reported significantly higher systemizing and attention to detail than non-hackers. We found a positive relation between self-reported systemizing (but not attention to detail) and code-breaking skills in both hackers and non-hackers, whereas attention to detail (but not systemizing) was related with performance in the X-ray screening task in both groups, as previously reported with naïve participants (Rusconi et al., 2015). We discuss the theoretical and translational implications of our findings.
Colleges Struggle To Train Experts in Protecting Computer Systems.
ERIC Educational Resources Information Center
McCollum, Kelly
2000-01-01
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
The Social Organization of the Computer Underground
1989-08-01
colleagues, with only small groups approaching peer relationships. 14 . SUBJECT TERMS HACK, Computer Underground 15. NUMBER OF PAGES 16. PRICE CODE 17...between individuals involved in a common activity (pp. 13- 14 ). Assessing the degree and manner in which the...criminalized over the past several years . Hackers, and the "danger" that they present in our computer dependent
Academic Information Security Researchers: Hackers or Specialists?
Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn
2018-04-01
In this opinion piece, we present a synopsis of our findings from the last 2 years concerning cyber-attacks on web-based academia. We also present some of problems that we have faced and try to resolve any misunderstandings about our work. We are academic information security specialists, not hackers. Finally, we present a brief overview of our methods for detecting cyber fraud in an attempt to present general guidelines for researchers who would like to continue our work. We believe that our work is necessary for protecting the integrity of scholarly publishing against emerging cybercrime.
2005-09-01
Israeli teens who sabotaged a website of Hezbollah, the militantly anti-Israel guerrilla movement in Lebanon, with a defacement which placed an Israeli...ftp with out a password. FUCK HIZZBALLA!!! Sincerely digibrain & haboshanik (we are the domain masters).” • Hackers of Israel Unite: Hackers of...other defacement. 2. b1n4ry c0d3 defaced only one site on December 3, 2000. This defacement was the only one to refer to the WFD as the “World’s Fuck
Preventing Catastrophes from Data Loss
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Email authentication using symmetric and asymmetric key algorithm encryption
NASA Astrophysics Data System (ADS)
Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.
2017-10-01
Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.
Police close unsolved 'climategate' investigation
NASA Astrophysics Data System (ADS)
Lavender, Gemma
2012-09-01
Police in Norfolk in the UK have closed an investigation into the hacking of e-mails at the University of East Anglia's Climate Research Unit (CRU) after admitting that they will not be able to find the hackers who broke into CRU computer servers.
Preventing Catastrophes from Data Loss
ERIC Educational Resources Information Center
Goldsborough, Reid
2004-01-01
What's the worst thing that can happen to a computer? Worse than a hard disk crash, virus infection, spare assault, denial-of-service attack, hacker take-over, fire, flood or some other human, mechanical or natural disaster is a faulty backup when it is really needed. If the computer blows up, as long as the data is backed up securely, it can be…
2014-10-01
CRm CAL FA~WR£S Q I • Software Engineering Institute I Ccamt>gw l\\~llon Lniwndty 34 Basic attack tree Destroy Building Generate Sufficient...by computer-security company marketing literature that touts 11hacker proof software,11 11triple-DES security,11 and the like. In truth, unbreakable
The hack attack - Increasing computer system awareness of vulnerability threats
NASA Technical Reports Server (NTRS)
Quann, John; Belford, Peter
1987-01-01
The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).
Designing, Implementing, and Evaluating Secure Web Browsers
ERIC Educational Resources Information Center
Grier, Christopher L.
2009-01-01
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
ERIC Educational Resources Information Center
Waters, John K.
2009-01-01
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Adding the Fourth "R": A Systems Approach to Solving the Hacker's Arms Race
DOE Office of Scientific and Technical Information (OSTI.GOV)
Endicott-Popovsky, Barbara E.; Frincke, Deborah A.
2006-01-01
In this paper, the authors propose a modification of CERT's 3 R model to include a 4 th R, the discipline of Redress, identified as a necessary step to end the hacker arms race. Redress will require implementation of computer forensic investigation methods, tools and techniques that will permit evidence gathered to be admissible in a court of law, a standard not often understood or followed by many who are responsible for securing networks today. This leads the authors to conclude that there is a need for future work that will involve re-examination of the mechanisms and procedures used tomore » collect evidence of network intrusions in order to ensure that the Rules of Evidence requirements are considered.« less
Safeguarding Information Assets in Higher Education: The Role of the CSO
ERIC Educational Resources Information Center
Petersen, Rodney
2006-01-01
A campus information system becomes unavailable because a hacker has exploited a vulnerability in the operating system and rendered the application unusable. A faculty member's laptop, which contains research data including personally identifiable information on research subjects, turns up missing. A college's homepage is altered, without…
The New Zealand Hacker Case: A Post Mortem
DOE Office of Scientific and Technical Information (OSTI.GOV)
Popovsky, Barbara; Ryan, Daniel J.; Frincke, Deborah A.
2005-10-01
A typical incident response pits technicians against networks that aren't prepared forensically. [1, 2] If practitioners do consider collecting network forensic data, they face a choice between expending extraordinary effort (time and money) collecting forensically sound data, or simply restoring the network as quickly as possible. In this context, the concept of organizational network forensic readiness has emerged. The following is a discussion of selected computer crime cases, using publically available information, spanning a period of time of several years, that together demonstrate the need for a preventive and proactive response to malicious intrusion over a reactive one. It concludesmore » with recommendations for how to "operationalize" organizational network forensic readiness.« less
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
Hackers against technology: Critique and recuperation in technological cycles.
Maxigas
2017-12-01
I offer an interpretation of hackers' technological choices through a theoretical framework of critique and recuperation in technological cycles, building on prior research that brings the pragmatic sociology of Boltanski and Chiapello to bear on matters in Science and Technology Studies. I argue that contextualizing technology choices in the development of capitalism through innovation illuminates their political significance. I start with the counterintuitive observation that some browser extensions popular with hackers, like RequestPolicy, make it considerably harder for them to look at websites. This observation showcases the Luddite aspects of hackerdom, in that they are willing to 'break' popular websites that would otherwise cheat on the user. In line with an undercurrent of hacker studies, in this case study I find hackers fighting technological progress they see as social decline.
China’s Cyber Power and America’s National Security
2011-03-24
activates and can damage software, stored data, or may allow a hacker remote access to the computer system. The term comes from Greek mythology about...the Trojan War: the Greeks presented the citizens of Troy with a large wooden horse in which they had secretly hidden their warriors. During the
Students Compete to Mount Best Defense against Malicious Hackers
ERIC Educational Resources Information Center
Mejia, Robin
2008-01-01
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Student Drivers on the Information Highway.
ERIC Educational Resources Information Center
Hanson, William R.
1994-01-01
Describes high school students' use of the Internet based on experiences at a Canadian high school, including its use to obtain information for classroom assignments. Topics discussed include Internet Relay Chat; gender bias; collaboration; hackers and ethics agreements; control on the Internet; students teaching teachers; listservs and discussion…
Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Le Blanc, Katya; Freeman, Sarah
As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less
A test of a mechanical multi-impact shear-wave seismic source
Worley, David M.; Odum, Jack K.; Williams, Robert A.; Stephenson, William J.
2001-01-01
We modified two gasoline-engine-powered earth tampers, commonly used as compressional-(P) wave seismic energy sources for shallow reflection studies, for use as shear(S)-wave energy sources. This new configuration, termed ?Hacker? (horizontal Wacker?), is evaluated as an alternative to the manual sledgehammer typically used in conjunction with a large timber held down by the front wheels of a vehicle. The Hacker maximizes the use of existing equipment by a quick changeover of bolt-on accessories as opposed to the handling of a separate source, and is intended to improve the depth of penetration of S-wave data by stacking hundreds of impacts over a two to three minute period. Records were made with a variety of configurations involving up to two Hackers simultaneously then compared to a reference record made with a sledgehammer. Preliminary results indicate moderate success by the higher amplitude S-waves recorded with the Hacker as compared to the hammer method. False triggers generated by the backswing of the Hacker add unwanted noise and we are currently working to modify the device to eliminate this effect. Correlation noise caused by insufficient randomness of the Hacker impact sequence is also a significant noise problem that we hope to reduce by improving the coupling of the Hacker to the timber so that the operator has more control over the impact sequence.
Identifying multiple submissions in Internet research: preserving data integrity.
Bowen, Anne M; Daniel, Candice M; Williams, Mark L; Baird, Grayson L
2008-11-01
Internet-based sexuality research with hidden populations has become increasingly popular. Respondent anonymity may encourage participation and lower social desirability, but associated disinhibition may promote multiple submissions, especially when incentives are offered. The goal of this study was to identify the usefulness of different variables for detecting multiple submissions from repeat responders and to explore incentive effects. The data included 1,900 submissions from a three-session Internet intervention with a pretest and three post-test questionnaires. Participants were men who have sex with men and incentives were offered to rural participants for completing each questionnaire. The final number of submissions included 1,273 "unique", 132 first submissions by "repeat responders" and 495 additional submissions by the "repeat responders" (N = 1,900). Four categories of repeat responders were identified: "infrequent" (2-5 submissions), "persistent" (6-10 submissions), "very persistent" (11-30 submissions), and "hackers" (more than 30 submissions). Internet Provider (IP) addresses, user names, and passwords were the most useful for identifying "infrequent" repeat responders. "Hackers" often varied their IP address and identifying information to prevent easy identification, but investigating the data for small variations in IP, using reverse telephone look up, and patterns across usernames and passwords were helpful. Incentives appeared to play a role in stimulating multiple submissions, especially from the more sophisticated "hackers". Finally, the web is ever evolving and it will be necessary to have good programmers and staff who evolve as fast as "hackers".
Adaptive cyber-attack modeling system
NASA Astrophysics Data System (ADS)
Gonsalves, Paul G.; Dougherty, Edward T.
2006-05-01
The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.
ERIC Educational Resources Information Center
Britz, J. J.
1996-01-01
Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…
NASA Astrophysics Data System (ADS)
McFall, Steve
1994-03-01
With the increase in business automation and the widespread availability and low cost of computer systems, law enforcement agencies have seen a corresponding increase in criminal acts involving computers. The examination of computer evidence is a new field of forensic science with numerous opportunities for research and development. Research is needed to develop new software utilities to examine computer storage media, expert systems capable of finding criminal activity in large amounts of data, and to find methods of recovering data from chemically and physically damaged computer storage media. In addition, defeating encryption and password protection of computer files is also a topic requiring more research and development.
Cracking Bank PINs by Playing Mastermind
NASA Astrophysics Data System (ADS)
Focardi, Riccardo; Luccio, Flaminia L.
The bank director was pretty upset noticing Joe, the system administrator, spending his spare time playing Mastermind, an old useless game of the 70ies. He had fought the instinct of telling him how to better spend his life, just limiting to look at him in disgust long enough to be certain to be noticed. No wonder when the next day the director fell on his chair astonished while reading, on the newspaper, about a huge digital fraud on the ATMs of his bank, with millions of Euros stolen by a team of hackers all around the world. The article mentioned how the hackers had 'played with the bank computers just like playing Mastermind', being able to disclose thousands of user PINs during the one-hour lunch break. That precise moment, a second before falling senseless, he understood the subtle smile on Joe's face the day before, while training at his preferred game, Mastermind.
Russia’s Approach to Cyber Warfare
2016-09-01
mobilized. However, the crowd-sourced approach that has typified how the Kremlin has utilized hackers and criminal networks in the past is likely to be...specially trained and equipped troops. According to one source, these troops would include hackers , journalists, specialists in strategic...direct links to the Russian government are difficult to prove conclusively (and the Russian government denies that it sponsors any hacker groups
Securing Information with Complex Optical Encryption Networks
2015-08-11
Network Security, Network Vulnerability , Multi-dimentional Processing, optoelectronic devices 16. SECURITY CLASSIFICATION OF: 17. LIMITATION... optoelectronic devices and systems should be analyzed before the retrieval, any hostile hacker will need to possess multi-disciplinary scientific...sophisticated optoelectronic principles and systems where he/she needs to process the information. However, in the military applications, most military
NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks
NASA Technical Reports Server (NTRS)
Alley, Adam David
2016-01-01
Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.
Information Protection Engineering: Using Technology and Experience to Protect Assets
2001-07-01
SAIC’s highly experienced team has developed technology, techniques and expertise in protecting these information assets from electronic attack by...criminals, terrorists, hackers or nation states. INFORMATION PROTECTION ENGINEERING : Using Technology and Experience to Protect Assets William J. Marlow... Engineering : Using Technology and Experience to Protect Assets Contract or Grant Number Program Element Number Authors Marlow, William J. Project
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2015-01-01
Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)
Three if by Internet: Exploring the Utility of a Hacker Militia
2017-03-01
INTERNET: EXPLORING THE UTILITY OF A HACKER MILITIA by Matthew S. O’Loughlin March 2017 Thesis Advisor: Leo Blanken Co-Advisor: Zachary...COVERED Master’s thesis 4. TITLE AND SUBTITLE THREE IF BY INTERNET: EXPLORING THE UTILITY OF A HACKER MILITIA 5. FUNDING NUMBERS 6. AUTHOR(S...technologies to combat them asymmetrically in the digital environment may provide the foundation for forging a new kind of strategy based on
Secondary Infertility: Why Does It Happen?
... 2016. http://accessmedicine.com. Accessed Nov. 29, 2016. Hacker NF, et al. Infertility and assisted reproductive technologies. In: Hacker & Moore's Essentials of Obstetrics and Gynecology. 6th ed. ...
Stanger, O
2000-04-01
The year of 1999 marks the 75th anniversary of Viktor von Hacker's retirement as chairman of the Department of Surgery at Karl-Franzens University School of Medicine in Graz. He was a favored pupil of Theodor Billroth (1829-1894). When he took his professorship at Graz in 1903, the present hospital, then as now one of the largest in Europe, was still in planning, and he immediately involved himself in all the subsequent developmental stages. Now we are again living through a stage of major reconstruction and expansion within the context of the "LKH 2000" project which also encompasses the surgical department and wards, most of which have generally remained unchanged since Hacker's time. During his 21 years as chairman of the department, Hacker made major contributions in the fields of gastro-intestinal surgery, esophageal surgery and especially esophagoscopy, as well as plastic surgery. Towards the end of his career, 70 years ago, Viktor von Hacker was named an honorary member of the German Society of Surgery. For these reasons, the man and his work should be recalled.
Visual behavior characterization for intrusion and misuse detection
NASA Astrophysics Data System (ADS)
Erbacher, Robert F.; Frincke, Deborah
2001-05-01
As computer and network intrusions become more and more of a concern, the need for better capabilities, to assist in the detection and analysis of intrusions also increase. System administrators typically rely on log files to analyze usage and detect misuse. However, as a consequence of the amount of data collected by each machine, multiplied by the tens or hundreds of machines under the system administrator's auspices, the entirety of the data available is neither collected nor analyzed. This is compounded by the need to analyze network traffic data as well. We propose a methodology for analyzing network and computer log information visually based on the analysis of the behavior of the users. Each user's behavior is the key to determining their intent and overriding activity, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate activities, which hinders the reliability of log file analysis. Visually analyzing the users''s behavior however, is much more adaptable and difficult to counteract.
Research and Design of Rootkit Detection Method
NASA Astrophysics Data System (ADS)
Liu, Leian; Yin, Zuanxing; Shen, Yuli; Lin, Haitao; Wang, Hongjiang
Rootkit is one of the most important issues of network communication systems, which is related to the security and privacy of Internet users. Because of the existence of the back door of the operating system, a hacker can use rootkit to attack and invade other people's computers and thus he can capture passwords and message traffic to and from these computers easily. With the development of the rootkit technology, its applications are more and more extensive and it becomes increasingly difficult to detect it. In addition, for various reasons such as trade secrets, being difficult to be developed, and so on, the rootkit detection technology information and effective tools are still relatively scarce. In this paper, based on the in-depth analysis of the rootkit detection technology, a new kind of the rootkit detection structure is designed and a new method (software), X-Anti, is proposed. Test results show that software designed based on structure proposed is much more efficient than any other rootkit detection software.
Empowered citizen 'health hackers' who are not waiting.
Omer, Timothy
2016-08-17
Due to the easier access to information, the availability of low cost technologies and the involvement of well educated, passionate patients, a group of citizen 'Health Hackers', who are building their own medical systems to help them overcome the unmet needs of their conditions, is emerging. This has recently been the case in the type 1 diabetes community, under the movement #WeAreNotWaiting, with innovative use of current medical devices hacked to access data and Open-Source code producing solutions ranging from remote monitoring of diabetic children to producing an Artificial Pancreas System to automate the management and monitoring of a patient's condition. Timothy Omer is working with the community to utilise the technology already in his pocket to build a mobile- and smartwatch-based Artificial Pancreas System.
Education and the Degree of Data Security
ERIC Educational Resources Information Center
Spears, Phillip Dewitt
2013-01-01
New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…
ERIC Educational Resources Information Center
Bolch, Matt
2008-01-01
For the school chief information officer (CIO), safeguarding students and facilities is as much a part of the job description as keeping the data networks running and the servers protected from hackers. This article describes how two districts, Miami-Dade County Public Schools and Taos Municipal Schools, secured their surveillance systems. The…
Data Security: Locked Down, Not out
ERIC Educational Resources Information Center
Waters, John K.
2007-01-01
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
NASA Astrophysics Data System (ADS)
Rehan, S. C.
This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.
ERIC Educational Resources Information Center
Panettieri, Joseph C.
2007-01-01
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
ERIC Educational Resources Information Center
Ramaswami, Rama
2010-01-01
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Network Security Validation Using Game Theory
NASA Astrophysics Data System (ADS)
Papadopoulou, Vicky; Gregoriades, Andreas
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive process. This however, limited the immunity property of the distributed systems that depended on these networks. Security requirements specification need a proactive approach. Networks' infrastructure is constantly under attack by hackers and malicious software that aim to break into computers. To combat these threats, network designers need sophisticated security validation techniques that will guarantee the minimum level of security for their future networks. This paper presents a game-theoretic approach to security requirements validation. An introduction to game theory is presented along with an example that demonstrates the application of the approach.
StressHacker: Towards Practical Stress Monitoring in the Wild with Smartwatches.
Hao, Tian; Walter, Kimberly N; Ball, Marion J; Chang, Hung-Yang; Sun, Si; Zhu, Xinxin
2017-01-01
In modern life, the nonstop and pervasive stress tends to keep us on long-lasting high alert, which over time, could lead to a broad range of health problems from depression, metabolic disorders to heart diseases. However, there is a stunning lack of practical tools for effective stress management that can help people navigate through their daily stress. This paper presents the feasibility evaluation of StressHacker, a smartwatch-based system designed to continuously and passively monitor one's stress level using bio-signals obtained from the on-board sensors. With the proliferation of smartwatches, StressHacker is highly accessible and suited for daily use. Our preliminary evaluation is based on 300 hours of data collected in a real-life setting (12 subjects, 29 days). The result suggests that StressHacker is capable of reliably capturing daily stress dynamics (precision = 86.1%, recall = 91.2%), thus with great potential to enable seamless and personalized stress management.
Offensive Cybersecurity in the NIST Cybersecurity Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bulyk, Mykhaylo; Evans, Dr. Nathaniel
Government and corporate computer systems are attacked, networks are penetrated by hackers, and enterprises are protected by demilitarized zones. Language that until recently was used to describe security and warfare in military settings has now become common-place in cybersecurity discussions. The concepts of pre-emptive attack, counterattack and offensive defense fit the linguistic cultural thread of security in cyberspace, at least in part due to the taxonomy adopted by cybersecurity as a discipline.
ERIC Educational Resources Information Center
Archer, Chalmers, Jr.; Archer, A. J. Finch
1986-01-01
Examines the susceptibility of computerized institutional records to security violations by "hackers," wishing to change grades/records or merely demonstrate their ability to access the systems. Points to practices that encourage security abuses and risk confidentiality. Outlines procedures used by Northern Virginia Community College to…
Finding Malicious Cyber Discussions in Social Media
2015-12-11
automatically filter cyber discussions from Stack Exchange, Reddit, and Twitter posts written in English. Criminal hackers often use social media...monitoring hackers on Facebook and in private chat rooms. As a result, system administrators were prepared to counter distributed denial-of-service
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
2010-04-01
erupt in the region. 29 Media reports of the “Titan Rain” espionage operation highlighted the ability of alleged state-sponsored Chinese hackers to...February 2010. Mordini, Emilio and Massari, Sonia, “Body, Biometrics and Identity”, In Bioethics , Volume 22, Number 9 2008, p488-498. Mostrous
Information Security in the 1990s: Keeping the Locks on.
ERIC Educational Resources Information Center
Kovac, Ron J.
1999-01-01
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
A preliminary analysis of quantifying computer security vulnerability data in "the wild"
NASA Astrophysics Data System (ADS)
Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George
2016-05-01
A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.
Army Communicator. Volume 33, Number 1, Winter 2008
2008-01-01
1983, with the Cold War still going strong, a movie called “War Games” de- picted an eccentric computer hacker named David Lightman, played by Matthew...After an abbreviated, but successful, reception and staging operations, including another small COMMEX, in the “dustbowl;” the Regiment began a phased...stationed at Fort Riley Kan., STB 3HBCT 1AR Division. JNN training: 25Q, PFC Logan Davis, tests his knowledge on a Ku satellite transportable trailer
Health information security: a case study of three selected medical centers in iran.
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-03-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.
Health Information Security: A Case Study of Three Selected Medical Centers in Iran
Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas
2013-01-01
Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861
Teachers as Hackers: Implications for 21st Century Teacher Education
ERIC Educational Resources Information Center
Wizel, Maya
2017-01-01
This qualitative study introduces a new framework for describing teachers who act innovatively in public schools--teachers as "hackers." It examines the characteristics and conditions under which teachers "hack" their classroom pedagogy to create disruptive innovation in the public education system and identify implications for…
Continuous-variable quantum computing on encrypted data.
Marshall, Kevin; Jacobsen, Christian S; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L
2016-12-14
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
Continuous-variable quantum computing on encrypted data
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks. PMID:27966528
Continuous-variable quantum computing on encrypted data
NASA Astrophysics Data System (ADS)
Marshall, Kevin; Jacobsen, Christian S.; Schäfermeier, Clemens; Gehring, Tobias; Weedbrook, Christian; Andersen, Ulrik L.
2016-12-01
The ability to perform computations on encrypted data is a powerful tool for protecting a client's privacy, especially in today's era of cloud and distributed computing. In terms of privacy, the best solutions that classical techniques can achieve are unfortunately not unconditionally secure in the sense that they are dependent on a hacker's computational power. Here we theoretically investigate, and experimentally demonstrate with Gaussian displacement and squeezing operations, a quantum solution that achieves the security of a user's privacy using the practical technology of continuous variables. We demonstrate losses of up to 10 km both ways between the client and the server and show that security can still be achieved. Our approach offers a number of practical benefits (from a quantum perspective) that could one day allow the potential widespread adoption of this quantum technology in future cloud-based computing networks.
Cyber Operations and Cyber Terrorism, Handbook Number 1.02
2005-08-15
Quinn, “Teen Hackers Plead Guilty to Stunning Pentagon Attacks,” Reuters, 31 July 1998, 1; available from http://www.geocities.com/ Area51 ...Hackers Plead Guilty to Stunning Pentagon Attacks.” Reuters, 31 July 1998, 1. Available from http://www.geocities.com/ Area51 /Shadowlands/6583
SafeSlinger: An Easy-to-use and Secure Approach for Human Trust Establishment
2012-03-12
communication modalities (Bluetooth, WiFi , 4G), camera, and sensors. Unfortunately, smartphone platforms suffer from many risks. Vulnerabilities exist in...December 2010. [31] Dave Neal. Defcon hackers get hacked over 4G. http://www.theinquirer.net/inquirer/news/ 16 2100989/defcon-hackers- hacked -4g
Addressing Issues Related to Technology and Engineering
ERIC Educational Resources Information Center
Technology Teacher, 2008
2008-01-01
This article presents an interview with Michael Hacker and David Burghardt, codirectors of Hoftra University's Center for Technological Literacy. Hacker and Burghardt address issues related to technology and engineering. They argue that teachers need to be aware of the problems kids are facing, and how to present these problems in an engaging…
ERIC Educational Resources Information Center
Perry, Elisabeth Israels; Hacker, Harold
The position taken is that convenient free access to information from all types of libraries is one guarantee that we will have the kind of society we want. Private endowments, foundation support, and federal funds should be sought. Specialized libraries ought to be considered national resources and funded accordingly. Other access problems…
ERIC Educational Resources Information Center
Jabbour, Ghassan
2010-01-01
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
NASA Astrophysics Data System (ADS)
Abdi, Abdi M.; Szu, Harold H.
2003-04-01
With the growing rate of interconnection among computer systems, network security is becoming a real challenge. Intrusion Detection System (IDS) is designed to protect the availability, confidentiality and integrity of critical network information systems. Today"s approach to network intrusion detection involves the use of rule-based expert systems to identify an indication of known attack or anomalies. However, these techniques are less successful in identifying today"s attacks. Hackers are perpetually inventing new and previously unanticipated techniques to compromise information infrastructure. This paper proposes a dynamic way of detecting network intruders on time serious data. The proposed approach consists of a two-step process. Firstly, obtaining an efficient multi-user detection method, employing the recently introduced complexity minimization approach as a generalization of a standard ICA. Secondly, we identified unsupervised learning neural network architecture based on Kohonen"s Self-Organizing Map for potential functional clustering. These two steps working together adaptively will provide a pseudo-real time novelty detection attribute to supplement the current intrusion detection statistical methodology.
Birney, Amelia J; Gunn, Rebecca; Russell, Jeremy K; Ary, Dennis V
2016-01-26
Worldwide, depression is rated as the fourth leading cause of disease burden and is projected to be the second leading cause of disability by 2020. Annual depression-related costs in the United States are estimated at US $210.5 billion, with employers bearing over 50% of these costs in productivity loss, absenteeism, and disability. Because most adults with depression never receive treatment, there is a need to develop effective interventions that can be more widely disseminated through new channels, such as employee assistance programs (EAPs), and directly to individuals who will not seek face-to-face care. This study evaluated a self-guided intervention, using the MoodHacker mobile Web app to activate the use of cognitive behavioral therapy (CBT) skills in working adults with mild-to-moderate depression. It was hypothesized that MoodHacker users would experience reduced depression symptoms and negative cognitions, and increased behavioral activation, knowledge of depression, and functioning in the workplace. A parallel two-group randomized controlled trial was conducted with 300 employed adults exhibiting mild-to-moderate depression. Participants were recruited from August 2012 through April 2013 in partnership with an EAP and with outreach through a variety of additional non-EAP organizations. Participants were blocked on race/ethnicity and then randomly assigned within each block to receive, without clinical support, either the MoodHacker intervention (n=150) or alternative care consisting of links to vetted websites on depression (n=150). Participants in both groups completed online self-assessment surveys at baseline, 6 weeks after baseline, and 10 weeks after baseline. Surveys assessed (1) depression symptoms, (2) behavioral activation, (3) negative thoughts, (4) worksite outcomes, (5) depression knowledge, and (6) user satisfaction and usability. After randomization, all interactions with subjects were automated with the exception of safety-related follow-up calls to subjects reporting current suicidal ideation and/or severe depression symptoms. At 6-week follow-up, significant effects were found on depression, behavioral activation, negative thoughts, knowledge, work productivity, work absence, and workplace distress. MoodHacker yielded significant effects on depression symptoms, work productivity, work absence, and workplace distress for those who reported access to an EAP, but no significant effects on these outcome measures for those without EAP access. Participants in the treatment arm used the MoodHacker app an average of 16.0 times (SD 13.3), totaling an average of 1.3 hours (SD 1.3) of use between pretest and 6-week follow-up. Significant effects on work absence in those with EAP access persisted at 10-week follow-up. This randomized effectiveness trial found that the MoodHacker app produced significant effects on depression symptoms (partial eta(2) = .021) among employed adults at 6-week follow-up when compared to subjects with access to relevant depression Internet sites. The app had stronger effects for individuals with access to an EAP (partial eta(2) = .093). For all users, the MoodHacker program also yielded greater improvement on work absence, as well as the mediating factors of behavioral activation, negative thoughts, and knowledge of depression self-care. Significant effects were maintained at 10-week follow-up for work absence. General attenuation of effects at 10-week follow-up underscores the importance of extending program contacts to maintain user engagement. This study suggests that light-touch, CBT-based mobile interventions like MoodHacker may be appropriate for implementation within EAPs and similar environments. In addition, it seems likely that supporting MoodHacker users with guidance from counselors may improve effectiveness for those who seek in-person support. ClinicalTrials.gov NCT02335554; https://clinicaltrials.gov/ct2/show/NCT02335554 (Archived by WebCite at http://www.webcitation.org/6dGXKWjWE).
Gunn, Rebecca; Russell, Jeremy K; Ary, Dennis V
2016-01-01
Background Worldwide, depression is rated as the fourth leading cause of disease burden and is projected to be the second leading cause of disability by 2020. Annual depression-related costs in the United States are estimated at US $210.5 billion, with employers bearing over 50% of these costs in productivity loss, absenteeism, and disability. Because most adults with depression never receive treatment, there is a need to develop effective interventions that can be more widely disseminated through new channels, such as employee assistance programs (EAPs), and directly to individuals who will not seek face-to-face care. Objective This study evaluated a self-guided intervention, using the MoodHacker mobile Web app to activate the use of cognitive behavioral therapy (CBT) skills in working adults with mild-to-moderate depression. It was hypothesized that MoodHacker users would experience reduced depression symptoms and negative cognitions, and increased behavioral activation, knowledge of depression, and functioning in the workplace. Methods A parallel two-group randomized controlled trial was conducted with 300 employed adults exhibiting mild-to-moderate depression. Participants were recruited from August 2012 through April 2013 in partnership with an EAP and with outreach through a variety of additional non-EAP organizations. Participants were blocked on race/ethnicity and then randomly assigned within each block to receive, without clinical support, either the MoodHacker intervention (n=150) or alternative care consisting of links to vetted websites on depression (n=150). Participants in both groups completed online self-assessment surveys at baseline, 6 weeks after baseline, and 10 weeks after baseline. Surveys assessed (1) depression symptoms, (2) behavioral activation, (3) negative thoughts, (4) worksite outcomes, (5) depression knowledge, and (6) user satisfaction and usability. After randomization, all interactions with subjects were automated with the exception of safety-related follow-up calls to subjects reporting current suicidal ideation and/or severe depression symptoms. Results At 6-week follow-up, significant effects were found on depression, behavioral activation, negative thoughts, knowledge, work productivity, work absence, and workplace distress. MoodHacker yielded significant effects on depression symptoms, work productivity, work absence, and workplace distress for those who reported access to an EAP, but no significant effects on these outcome measures for those without EAP access. Participants in the treatment arm used the MoodHacker app an average of 16.0 times (SD 13.3), totaling an average of 1.3 hours (SD 1.3) of use between pretest and 6-week follow-up. Significant effects on work absence in those with EAP access persisted at 10-week follow-up. Conclusions This randomized effectiveness trial found that the MoodHacker app produced significant effects on depression symptoms (partial eta2 = .021) among employed adults at 6-week follow-up when compared to subjects with access to relevant depression Internet sites. The app had stronger effects for individuals with access to an EAP (partial eta2 = .093). For all users, the MoodHacker program also yielded greater improvement on work absence, as well as the mediating factors of behavioral activation, negative thoughts, and knowledge of depression self-care. Significant effects were maintained at 10-week follow-up for work absence. General attenuation of effects at 10-week follow-up underscores the importance of extending program contacts to maintain user engagement. This study suggests that light-touch, CBT-based mobile interventions like MoodHacker may be appropriate for implementation within EAPs and similar environments. In addition, it seems likely that supporting MoodHacker users with guidance from counselors may improve effectiveness for those who seek in-person support. Trial Registration ClinicalTrials.gov NCT02335554; https://clinicaltrials.gov/ct2/show/NCT02335554 (Archived by WebCite at http://www.webcitation.org/6dGXKWjWE) PMID:26813737
Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques
2008-06-01
Hide Things from Hackers: Processes, Principles, and Techniques,” Journal of Information Warfare , 5 (3): 26-40 (2006). 20. Rosenau, William ...54 Additional Sources Apel , Thomas. Generating Fingerprints of Network Servers and their Use in Honeypots. Thesis. Aachen University, Aachen...Paul Williams , PhD (ENG) REPORT U ABSTRACT U c. THIS PAGE U 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 55
Fernández-Berni, Jorge; Carmona-Galán, Ricardo; del Río, Rocío; Kleihorst, Richard; Philips, Wilfried; Rodríguez-Vázquez, Ángel
2014-01-01
The capture, processing and distribution of visual information is one of the major challenges for the paradigm of the Internet of Things. Privacy emerges as a fundamental barrier to overcome. The idea of networked image sensors pervasively collecting data generates social rejection in the face of sensitive information being tampered by hackers or misused by legitimate users. Power consumption also constitutes a crucial aspect. Images contain a massive amount of data to be processed under strict timing requirements, demanding high-performance vision systems. In this paper, we describe a hardware-based strategy to concurrently address these two key issues. By conveying processing capabilities to the focal plane in addition to sensing, we can implement privacy protection measures just at the point where sensitive data are generated. Furthermore, such measures can be tailored for efficiently reducing the computational load of subsequent processing stages. As a proof of concept, a full-custom QVGA vision sensor chip is presented. It incorporates a mixed-signal focal-plane sensing-processing array providing programmable pixelation of multiple image regions in parallel. In addition to this functionality, the sensor exploits reconfigurability to implement other processing primitives, namely block-wise dynamic range adaptation, integral image computation and multi-resolution filtering. The proposed circuitry is also suitable to build a granular space, becoming the raw material for subsequent feature extraction and recognition of categorized objects. PMID:25195849
Fernández-Berni, Jorge; Carmona-Galán, Ricardo; del Río, Rocío; Kleihorst, Richard; Philips, Wilfried; Rodríguez-Vázquez, Ángel
2014-08-19
The capture, processing and distribution of visual information is one of the major challenges for the paradigm of the Internet of Things. Privacy emerges as a fundamental barrier to overcome. The idea of networked image sensors pervasively collecting data generates social rejection in the face of sensitive information being tampered by hackers or misused by legitimate users. Power consumption also constitutes a crucial aspect. Images contain a massive amount of data to be processed under strict timing requirements, demanding high-performance vision systems. In this paper, we describe a hardware-based strategy to concurrently address these two key issues. By conveying processing capabilities to the focal plane in addition to sensing, we can implement privacy protection measures just at the point where sensitive data are generated. Furthermore, such measures can be tailored for efficiently reducing the computational load of subsequent processing stages. As a proof of concept, a full-custom QVGA vision sensor chip is presented. It incorporates a mixed-signal focal-plane sensing-processing array providing programmable pixelation of multiple image regions in parallel. In addition to this functionality, the sensor exploits reconfigurability to implement other processing primitives, namely block-wise dynamic range adaptation, integral image computation and multi-resolution filtering. The proposed circuitry is also suitable to build a granular space, becoming the raw material for subsequent feature extraction and recognition of categorized objects.
A Framework for Programming and Budgeting for Cybersecurity
2016-01-01
environment in which hackers operate and extends beyond the confines of a single organization. Reducing the incen- tive for hacking and availability of...convey- ing to hackers that going after their organization entails a great deal of frustration (deterrence by denial) or risk (e.g., via hack -backs...components in the network: Systems are hacked because they have vulnerabilities (although a vulnerability-free system may be encounter risks from protocol
Hackers ring up big phone bills for hospitals.
Gardner, E
1992-11-02
A big telephone bill--possibly in six figures--can be a painful way for a hospital to find out its phone system isn't secure. When unusually large long-distance bills start to show up, chances are a professional telephone hacker has broken in. According to experts, one in 15 businesses has been victimized by long-distance toll fraud, and loss estimates range from $900 million to $4 billion a year.
Contemporary issues in HIM. Software engineering--what does it mean to you?
Wear, L L
1994-02-01
There have been significant advances in the way we develop software in the last two decades. Many companies are using the new process oriented approach to software development. Companies that use the new techniques and tools have reported improvements in both productivity and quality, but there are still companies developing software the way we did 30 years ago. If you saw the movie Jurassic Park, you saw the perfect way not to develop software. The programmer in the movie was the only person who knew the details of the system. No processes were followed, and there was no documentation. This was an absolutely perfect prescription for failure. Some of you are probably familiar with the term hacker which describes a person who spends hours sitting at a terminal hacking out code. Hackers have created some outstanding software products, but with today's complex systems, most companies are trying to get away from their dependence on hackers. They are instead turning to the process-oriented approach. When selecting software vendors, don't just look at the functionality of a product. Try to determine how the vendor develops software, and determine if you are dealing with hackers or a process-driven company. In the long run, you should get better, more reliable products from the latter.
Declawing the Dragon: Why the U.S. Must Counter Chinese Cyber-Warriors
2009-06-12
underground civilian organizations, from The Green Army to the likely state-sponsored Red Hacker Alliance (RHA), have participated in corporate and...for situational awareness… or the Sailor relying on Naval Tactical Data Systems (NTDS) for over-the-horizon targeting, Bridge to Bridge ( B2B ) for...of China, the Red Hacker Alliance , and the Chinese Red Guest Network Security Technology Alliance would seek out targets of opportunity to attack
Managing Errors to Reduce Accidents in High Consequence Networked Information Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ganter, J.H.
1999-02-01
Computers have always helped to amplify and propagate errors made by people. The emergence of Networked Information Systems (NISs), which allow people and systems to quickly interact worldwide, has made understanding and minimizing human error more critical. This paper applies concepts from system safety to analyze how hazards (from hackers to power disruptions) penetrate NIS defenses (e.g., firewalls and operating systems) to cause accidents. Such events usually result from both active, easily identified failures and more subtle latent conditions that have resided in the system for long periods. Both active failures and latent conditions result from human errors. We classifymore » these into several types (slips, lapses, mistakes, etc.) and provide NIS examples of how they occur. Next we examine error minimization throughout the NIS lifecycle, from design through operation to reengineering. At each stage, steps can be taken to minimize the occurrence and effects of human errors. These include defensive design philosophies, architectural patterns to guide developers, and collaborative design that incorporates operational experiences and surprises into design efforts. We conclude by looking at three aspects of NISs that will cause continuing challenges in error and accident management: immaturity of the industry, limited risk perception, and resource tradeoffs.« less
Markets for Cybercrime Tools and Stolen Information: Hackers’ Bazaar
2014-01-01
Bitcoin . Others include Pecunix, AlertPay, PPcoin, Litecoin, Feathercoin, and Bitcoin extensions, such as Zerocoin. There is no consensus on which form...purpose of targeting wallets and bitcoins . It is difficult to assess trends for different products; product/price relationships can be quite nuanced and...for DDoS attacks against digital currencies (e.g., Bitcoin ) DDoS-for-hire services begin Renewed interest in DDoS-for-hire services General Spam
NATO’s Options for Defensive Cyber Against Non-State Actors
2013-04-01
services to cyber criminals and hacker patriots.”33 The FSB had maintained an unsavory relationship with hackers since the early 1990s; 9 Oleg...responsibility under international law to stop the DDOS being facilitated by botnet controllers located within its geographic borders, and prosecute the cyber ... criminals involved. “Rule 5” of the Tallinn Manual addresses the cyber responsibility of a nation-state: “A State shall not knowingly allow the
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stevens, D.F.
1987-04-01
On August 23, 1986, it was noticed that the accounting files for one of LBL's computing systems failed to balance. On August 24, we received word that an unauthorized person was attempting entry into a US Navy computer from LBL. Preliminary investigation indicated that LBL was the victim of a benign hacker, where ''benign'' is used in the medical sense. It was thought that the perpetrator was a graduate student from a neighboring university, and that it would provide a useful object lesson to other such folk if he were caught and admonished. LBL therefore embarked upon a journey ofmore » detection and containment instead of prevention. That journey continues today, having led first across the country, then across the Atlantic. In the course of the journey we have gathered a number of observations that should be of interest to anyone running a computer with any connection to the outside world.« less
Gardner, Jax Lee
2013-01-01
This article explores Marilyn Hacker's 1986 sonnet sequence, Love, Death, and the Changing of the Seasons, for its depiction of lesbian parenting. Hacker moves beyond the simply erotic to focus on a truly subversive act present within the queer community, namely that of child-rearing. Lesbian parenting is a private world, one not subject to the male gaze in the ways that other seemingly private worlds (like sex) are still commodified. The daughter character of Iva exemplifies the construction of self in a queer environment. Children of queer parents have the unique subject position of being "queered" themselves regardless of their ultimate sexual orientation. While this queering would seem to primarily affect their understandings of gender and sexuality, this article argues that such early "othering" serves to deconstruct one's understanding of binaries and social conformity on a large scale, thereby encouraging qualities of acceptance and compassion and increasing the intimate family bond.
Workarounds to computer access in healthcare organizations: you want my password or a dead patient?
Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay
2015-01-01
Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.
A theory for aftercare of human trafficking survivors for nursing practice in low resource settings.
Curran, R L; Naidoo, J R; Mchunu, G
2017-06-01
Research on aftercare for human trafficking survivors highlights the limited knowledge of the needs of survivors; the evaluation of current aftercare; and the process of recovery navigated by the survivor in aftercare (Oram et al., 2012; Locke, 2010; Hacker & Cohen, 2012). Furthermore there has been a transition in aftercare where the victim or survivor, who before was seen as a passive victim of circumstance of their life and in need of therapeutic intervention, is now seen as having an active role in their recovery, thus facilitating recovery (Hacker & Cohen, 2012). The need for a theory grounded in survivor's voices therefore motivated this grounded theory study underpinned by Freire's (1970) Pedagogy of the oppressed. The aim of the theory is to inform nursing care of human trafficking survivors in low resource settings. The findings elicit a theoretical model of the renewed self, and the conditions that facilitate this process in care of human trafficking survivors. The recommendations of this paper may improve the nursing care provided to human trafficking survivors and equip nurses and other health professionals with the knowledge and skills to promote the renewing of human trafficking survivors. Copyright © 2017 Elsevier Inc. All rights reserved.
Top Cyber: Developing the Top One Percent to Defeat the Advanced Persistent Threat
2014-02-13
Critical Infrastructure.” V3-CO-UK, 7 May 2013. http://www.v3.co.uk/v3-uk/news/2266397/us- government-chinese- hackers -have-the-skills-to-take-down...it is a source of great risk; and, for hackers , it is the super-highway to a target-rich environment. For the U.S. Government (USG), cyberspace is...worldwide. Ultimately, for all its benefits, the Internet presents an “Achilles’ Heel” in the defense of the nation’s Critical Infrastructure and Key
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
Two examples of intelligent systems based on smart materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Unsworth, J.
1994-12-31
Two intelligent systems are described which are based on smart materials. The operation of the systems also rely on conventional well known technologies such as electronics, signal conditioning, signal processing, microprocessors and engineering design. However without the smart materials the development and integration into the intelligent systems would not have been possible. System 1 is a partial discharge monitor for on-line continuous checking of the condition of electrical power transformers. The ultrasonic and radio frequency detectors in this system rely on special piezoelectric composite integrated with a compact annular metal ring. Partial discharges set up ultrasonic and radio frequency signalsmore » which are received by the integrated detectors. The signals are amplified, conditioned, signal processed, the time interval between the two signals measured and the level of partial discharge activity averaged and assessed for numerous pairs and alarms triggered on remote control panels if the level is dangerous. The system has the capability of initiating automatic shutdown of the transformer once it is linked into the control computers of the electrical power authority. System 2 is called a Security Cradle and is an intelligent 3D shield designed to use the properties of electro active polymers to prevent hardware hackers from stealing valuable of sensitive information from memory devices (e.g., EPROMS) housed in computer or microprocessor installations.« less
Mean-Field-Game Model for Botnet Defense in Cyber-Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kolokoltsov, V. N., E-mail: v.kolokoltsov@warwick.ac.uk; Bensoussan, A.
We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customersmore » (say, switch on or out the defence system) is much faster that the infection rates.« less
Defending the Power Grid from Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eber, Kevin
A new initiative underway at the National Renewable Energy Laboratory is intended to prevent hackers from gaining control of parts of the nation's power grid, potentially damaging electrical equipment and causing localized power outages. Our nation's power grid is evolving to be more responsive to changing power needs, more able to integrate renewable energy, more efficient, and more reliable. One key element of this evolution is adding communication and control devices to the power grid, closer to the end user, so that utilities have greater situational awareness of the grid and can respond quickly to disturbances. But these new devicesmore » and their communications requirements can also open up the power grid to potential cyber attacks.« less
Comment on id-based remote data integrity checking with data privacy preserving
NASA Astrophysics Data System (ADS)
Zhang, Jianhong; Meng, Hongxin
2017-09-01
Recently, an ID-based remote data integrity checking protocol with perfect data privacy preserving (IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS.2016.2615853) was proposed to achieve data privacy protection and integrity checking. Unfortunately, in this letter, we demonstrate that their protocol is insecure. An active hacker can modify the stored data without being detected by the verifier in the auditing. And we also show malicious cloud server can convince the verifier that the stored data are kept intact after the outsourced data blocks are deleted. Finally, the reasons to produce such attacks are given.
Khera, Mandeep
2017-03-01
Ready or not, the Internet of things (IoT) is here. No longer just a buzz term, it'll continue to grow at an unprecedented pace over the next few years expecting to reach over 25 billion connected devices by 2020. History shows us that most fast growth technology solutions focus on solving business problems first and security is an afterthought. Unfortunately, IoT is following the same trend. Most IoT devices, apps, and infrastructure were developed without security in mind and are likely going to become targets of hackers. According to some security experts, major cyberattacks against the IoT devices are looming. According to the FBI, criminals can gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispensed medicines. Once criminals have breached such devices, they gain access to any personal or medical information stored on the devices, as well as the power to change the coding that controls the dispense mechanism of medicines or health data collection. This can result in major health issues and potential loss of lives. Are organizations ready to protect themselves? What are the key vulnerable points? There are various steps that companies can take to raise the barrier. In this article, we'll talk about the background, issues, potential attack vectors liable to be hacked, protection strategies, and more.
Khera, Mandeep
2017-01-01
Ready or not, the Internet of things (IoT) is here. No longer just a buzz term, it’ll continue to grow at an unprecedented pace over the next few years expecting to reach over 25 billion connected devices by 2020. History shows us that most fast growth technology solutions focus on solving business problems first and security is an afterthought. Unfortunately, IoT is following the same trend. Most IoT devices, apps, and infrastructure were developed without security in mind and are likely going to become targets of hackers. According to some security experts, major cyberattacks against the IoT devices are looming. According to the FBI, criminals can gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispensed medicines. Once criminals have breached such devices, they gain access to any personal or medical information stored on the devices, as well as the power to change the coding that controls the dispense mechanism of medicines or health data collection. This can result in major health issues and potential loss of lives. Are organizations ready to protect themselves? What are the key vulnerable points? There are various steps that companies can take to raise the barrier. In this article, we’ll talk about the background, issues, potential attack vectors liable to be hacked, protection strategies, and more. PMID:27920270
NASA Astrophysics Data System (ADS)
Rutte, Daniel; Fox, Matthew; Ratschbacher, Lothar
2017-04-01
Miocene gneiss domes in the Pamir allow unique insight into crustal-scale processes forming the Asian crust of the Pamir-Tibet Plateau. They were exhumed along normal-sense shear zones in an intermittent phase of N-S extension while earlier and later structures document N-S shortening. Recently, Schmidt et al. (2011), Stearns et al., (2013; 2015), Rutte et al. (a & b, accepted), and Hacker et al. (submitted) established a vast structural, petrologic, and geochronologic dataset for the Central Pamir domes. These studies interpreted the domes as a product of gravitational collapse. The dataset includes (micro)structural observations constraining the mechanism of exhumation, thermobarometry of the metamorphic rocks, petrochronologic data constraining timing of pro- and retrogression, a vast multi-method thermochronometric dataset including age-elevation and age-distance data, dates for normal-sense shear zones and barometric data on intrusive rocks. These data constrain the time-temperature, pressure-temperature, and time-pressure history of the dome rocks. We explore the dataset using one-dimensional thermal models. Our code solves the heat transfer equation and gives a transient solution allowing for variation of the geothermal gradient and thermal diffusivity. At this stage, our models suggest that exponential decay of an initially high exhumation rate of 6 km/Myr at 22 Ma to 0.5km/Myr at 13 Ma best explains the dataset. This suggests a one-time input of gravitational potential energy (GPE) that is successively decaying through crustal extension. Both, Asian crustal foundering or Indian slab breakoff may concur with this result. While the Central Pamir domes extend >400 km along strike of the orogen, little variation in timing of most of exhumation during N-S extension is observed. This suggests that the underlying mechanism - be it crustal foundering or slab breakoff - varied little along strike as well. References Hacker, B.R., Ratschbacher, L., Rutte, D., Stearns, M. A., Malz, N., Stübner, K., Kylander-Clark, A. R. C., Pfänder, J. A., and Everson, A. (submitted) Building the Pamir-Tibet Plateau—Crustal stacking, extensional collapse, and lateral extrusion in the Pamir: 3. Thermobarometry and Petrochronology of Deep Asian Crust. Tectonics Rutte, D., Ratschbacher, L., Schneider, S., Stübner, K., Stearns, M. A., Gulzar, M.A., and Hacker, B. R. (accepted a) Building the Pamir-Tibet Plateau-Crustal Stacking, Extensional Collapse, and Lateral Extrusion in the Central Pamir: 1. Geometry and kinematics. Tectonics Rutte, D., Ratschbacher, L., Khan, J., Stübner, K., Jonckheere, R., Pfänder, J. A., Hacker, B. R., Stearns, M. A., Enkelmann, E., Sperner, B., Tichomirowa, M. (accepted b) Building the Pamir-Tibet Plateau-Crustal Stacking, Extensional Collapse, and Lateral Extrusion in the Central Pamir: 2. Timing and Rates. Tectonics Schmidt J., Hacker B. R., Ratschbacher L., Stübner K., Stearns M., Kylander-Clark A., Cottle J. M., Alexander A., Webb G., Gehrels G. and Minaev V. (2011) Cenozoic deep crust in the Pamir. Earth Planet. Sci. Lett. 312, 411-421. Available at: http://linkinghub.elsevier.com/retrieve/pii/S0012821X11006327. Stearns M. A., Hacker B. R., Ratschbacher L., Lee J., Cottle J. M. and Kylander-Clark A. (2013) Synchronous oligocene-miocene metamorphism of the pamir and the north himalaya driven by plate-scale dynamics. Geology 41, 1071-1074. Stearns M. A., Hacker B. R., Ratschbacher L., Rutte D. and Kylander-Clark A. R. C. (2015) Titanite petrochronology of the Pamir gneiss domes: Implications for middle to deep crust exhumation and titanite closure to Pb and Zr diffusion. Tectonics 34, 1-19.
Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl
2004-10-01
This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.
Between control and hacker activism: the political actions of Anonymous Brasil.
Machado, Murilo Bansi
2015-12-01
This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.
Weighted link graphs: a distributed IDS for secondary intrusion detection and defense
NASA Astrophysics Data System (ADS)
Zhou, Mian; Lang, Sheau-Dong
2005-03-01
While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.
Prenatal care in your second trimester
... SG, Niebyl JR, Simpson JL, et al, eds. Obstetrics: Normal and Problem Pregnancies . 7th ed. Philadelphia, PA: ... JC, Hobel CJ, eds. Hacker & Moore's Essentials of Obstetrics and Gynecology . 6th ed. Philadelphia, PA: Elsevier; 2016: ...
Cataloging in Publication; An LJ Mini-Symposium
ERIC Educational Resources Information Center
Dunlap, Connie R.; And Others
1974-01-01
A report, including statistics, on the status of the Library of Congress Cataloging in Publication (CIP) program is presented followed by commentaries by Maurice Freedman, Herbert S. Bailey, Jr., Lois Hacker, and Marvin H. Scilken. (PF)
Legal dimensions of neural antecedents to voluntary action.
Patterson, Dennis
2014-01-01
This article considers the arguments of Nachev and Hacker in the context of claims that Libet's experiments regarding the readiness potential pose challenges for the criminal law, specifically for the distinction between voluntary and involuntary acts.
NASA Astrophysics Data System (ADS)
Anitha Devi, M. D.; ShivaKumar, K. B.
2017-08-01
Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters
Silver, Julie K; Binder, David S; Zubcevik, Nevena; Zafonte, Ross D
2016-07-01
Physicians and other healthcare professionals are often the end users of medical innovation; however, they are rarely involved in the beginning design stages. This often results in ineffective healthcare solutions with poor adoption rates. At the early design stage, innovation would benefit from input from healthcare professionals. This report describes the first-ever rehabilitation hackathon-an interdisciplinary and competitive team event aimed at accelerating and improving healthcare solutions and providing an educational experience for participants. Hackathons are gaining traction as a way to accelerate innovation by bringing together a diverse group of interdisciplinary professionals from different industries who work collaboratively in teams and learn from each other, focus on a specific problem ("pain point"), develop a solution using design thinking techniques, pitch the solution to participants, gather fast feedback and quickly alter the prototype design ("pivoting"). 102 hackers including 19 (18.6 %) physicians and other professionals participated, and over the course of 2 days worked in teams, pitched ideas and developed design prototypes. Three awards were given for prototypes that may improve function in persons with disabilities. 43 hackers were women (42.2 %) and 59 men (57.8 %); they ranged in age from 16 to 79 years old; and, of the 75 hackers who reported their age, 63 (84 %) were less than 40 years old and 12 (16 %) were 40 years or older. This report contributes to the emerging literature on healthcare hackathons as a means of providing interdisciplinary education and training and supporting innovation.
Approaches for scalable modeling and emulation of cyber systems : LDRD final report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mayo, Jackson R.; Minnich, Ronald G.; Armstrong, Robert C.
2009-09-01
The goal of this research was to combine theoretical and computational approaches to better understand the potential emergent behaviors of large-scale cyber systems, such as networks of {approx} 10{sup 6} computers. The scale and sophistication of modern computer software, hardware, and deployed networked systems have significantly exceeded the computational research community's ability to understand, model, and predict current and future behaviors. This predictive understanding, however, is critical to the development of new approaches for proactively designing new systems or enhancing existing systems with robustness to current and future cyber threats, including distributed malware such as botnets. We have developed preliminarymore » theoretical and modeling capabilities that can ultimately answer questions such as: How would we reboot the Internet if it were taken down? Can we change network protocols to make them more secure without disrupting existing Internet connectivity and traffic flow? We have begun to address these issues by developing new capabilities for understanding and modeling Internet systems at scale. Specifically, we have addressed the need for scalable network simulation by carrying out emulations of a network with {approx} 10{sup 6} virtualized operating system instances on a high-performance computing cluster - a 'virtual Internet'. We have also explored mappings between previously studied emergent behaviors of complex systems and their potential cyber counterparts. Our results provide foundational capabilities for further research toward understanding the effects of complexity in cyber systems, to allow anticipating and thwarting hackers.« less
Secure real-time wireless video streaming in the aeronautical telecommunications network
NASA Astrophysics Data System (ADS)
Czernik, Pawel; Olszyna, Jakub
2010-09-01
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
ERIC Educational Resources Information Center
Council of Europe Forum, 1985
1985-01-01
Highlighting the issue of violence, this Forum issue contains 12 essays. Titles and authors are: "Passivity in the Face of Violence" (Henri Laborit); "Democratisation without Violence?" (Friedrich Hacker); "Ritualised Violence in Sport" (Christian Bromberger); "Violence in Prisons" (Luige Daga); "Racial Aggression" (Geoffrey Bindman); "Violence in…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-27
... received a certification of eligibility to apply for trade adjustment assistance benefits and such supply...; Coastal Lumber Company, Hacker Valley, WV: September 7, 2010 TA-W-80,422F; Coastal Lumber Company...
Security on the Internet: is your system vulnerable?
Neray, P
1997-07-01
Internet technology does not discriminate. Whether or not your system is an intentional target really doesn't matter; you have a duty to ensure its safekeeping. Ten simple steps are given to protect your system from viruses, hackers, etc.
Design and implementation of dynamic hybrid Honeypot network
NASA Astrophysics Data System (ADS)
Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang
2013-05-01
The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-26
... received a certification of eligibility to apply for trade adjustment assistance benefits and such supply...-80,422E; Coastal Lumber Company, Hacker Valley, WV: September 7, 2010 TA-W-80,422F; Coastal Lumber...
Better Safe (Online) Than Sorry | Poster
Online safety has never been more crucial than it is today. Hackers, identity thieves, and cyber bullies are continually improving their methods, and people can easily become unwitting victims, even when they do not think they are doing anything wrong. Read more...
ERIC Educational Resources Information Center
Hutchins, Leonard
1993-01-01
The author reminisces about his educational experience at a small school in Maine during the late 1930s, revealing the respect he extended toward his teachers, what it was like to grow up during this time period, and his feelings upon returning to the now vacant school. (LP)
Building a Secure Library System.
ERIC Educational Resources Information Center
Benson, Allen C.
1998-01-01
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Assessing the Security of Connected Diabetes Devices.
Out, Dirk-Jan; Tettero, Olaf
2017-03-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.
Network traffic anomaly prediction using Artificial Neural Network
NASA Astrophysics Data System (ADS)
Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea
2017-03-01
As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.
Evans, Philip; Wolf, Bob
2005-01-01
Corporate leaders seeking to boost growth, learning, and innovation may find the answer in a surprising place: the Linux open-source software community. Linux is developed by an essentially volunteer, self-organizing community of thousands of programmers. Most leaders would sell their grandmothers for workforces that collaborate as efficiently, frictionlessly, and creatively as the self-styled Linux hackers. But Linux is software, and software is hardly a model for mainstream business. The authors have, nonetheless, found surprising parallels between the anarchistic, caffeinated, hirsute world of Linux hackers and the disciplined, tea-sipping, clean-cut world of Toyota engineering. Specifically, Toyota and Linux operate by rules that blend the self-organizing advantages of markets with the low transaction costs of hierarchies. In place of markets' cash and contracts and hierarchies' authority are rules about how individuals and groups work together (with rigorous discipline); how they communicate (widely and with granularity); and how leaders guide them toward a common goal (through example). Those rules, augmented by simple communication technologies and a lack of legal barriers to sharing information, create rich common knowledge, the ability to organize teams modularly, extraordinary motivation, and high levels of trust, which radically lowers transaction costs. Low transaction costs, in turn, make it profitable for organizations to perform more and smaller transactions--and so increase the pace and flexibility typical of high-performance organizations. Once the system achieves critical mass, it feeds on itself. The larger the system, the more broadly shared the knowledge, language, and work style. The greater individuals' reputational capital, the louder the applause and the stronger the motivation. The success of Linux is evidence of the power of that virtuous circle. Toyota's success is evidence that it is also powerful in conventional companies.
Unintentional Insider Threats: A Review of Phishing and Malware Incidents
2014-07-01
their agency as deliberate, malicious hackers [1]. This research supports the conclusions in the 2013 Verizon Data Breach Report that 47% of...References [1] SolarWinds. SolarWinds Federal Cybersecurity Survey Summary Report. SolarWinds, 2014. [2] Verizon. 2013 Data Breach Investigations
Brandishing Cyberattack Capabilities
2013-01-01
contribution to the analysis contained in this report made by Roger C. Molander, who passed away on March 25, 2012. Dr. Molan- der spent a full career ...its freelance and “patriotic” hackers). Ironically, moves to legitimize such weapons may make it easier for other countries to take ownership, hence
Protecting SSD Data Against Attacks
NASA Astrophysics Data System (ADS)
Marelli, A.; Micheloni, R.
When a drive is broken and we have to throw it away, we want to be sure that no hackers can recover the data stored in that disk, especially in the enterprise environment where sensitive date are stored on the drive, such as financial transactions or military applications.
Assessing the Security of Connected Diabetes Devices
Out, Dirk-Jan; Tettero, Olaf
2017-01-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190
ERIC Educational Resources Information Center
Panettieri, Joseph C.
2007-01-01
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
How Much Security Does Your Library Need?
ERIC Educational Resources Information Center
Banerjee, Kyle
2003-01-01
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Ashdown, Brien K; Hackathorn, Jana M; Daniels, Jordan
2018-04-06
In 2015, AshleyMadison.com (AshleyMadison) was hacked, leading to the release of site members' personal information. The exposed members faced public scrutiny, judgment, and other negative outcomes. In this study, we examined predictors of the demonization of the AshleyMadison participants (i.e., AshleyMadison members, owners, hackers) to help explain victim derogation. We attempted to discern the role religiosity and sexual guilt played in the demonization of the AshleyMadison hacking participants. We predicted sexual guilt would mediate between religiosity and demonization of the AshleyMadison hacking participants. Our findings indicate that religiosity alone does not predict demonization. Instead, sex guilt was a necessary part of the equation and mediated between participants' religiosity and the amount they demonized the different groups.
Novel Inhibitors of Protein-Protein Interaction for Prostate Cancer Therapy
2011-04-01
medical need. 7 REFERENCES 1. Babbar N, Hacker A, Huang Y, Casero RA Jr. Tumor necrosis factor alpha induces spermidine /spermine N-acetyl...PCa development and progression. We have published that activated androgen receptor (AR)-JunD complex induces spermidine /spermine N1-acetyl transferase
Promoting World Citizenship: A Crucial Area of Study
ERIC Educational Resources Information Center
Hacker, Barbara L.
2015-01-01
This article probes the vicissitudes of racism and how the multicultural perspectives of a Montessori preschool environment can prevent prejudices. Barbara Hacker is whole-heartedly committed to human unity transcending color differences. Racism is incompatible with a Montessori classroom that shares different holidays and cultures, builds social…
All-optical video-image encryption with enforced security level using independent component analysis
NASA Astrophysics Data System (ADS)
Alfalou, A.; Mansour, A.
2007-10-01
In the last two decades, wireless communications have been introduced in various applications. However, the transmitted data can be, at any moment, intercepted by non-authorized people. That could explain why data encryption and secure transmission have gained enormous popularity. In order to secure data transmission, we should pay attention to two aspects: transmission rate and encryption security level. In this paper, we address these two aspects by proposing a new video-image transmission scheme. This new system consists in using the advantage of optical high transmission rate and some powerful signal processing tools to secure the transmitted data. The main idea of our approach is to secure transmitted information at two levels: at the classical level by using an adaptation of standard optical techniques and at a second level (spatial diversity) by using independent transmitters. In the second level, a hacker would need to intercept not only one channel but all of them in order to retrieve information. At the receiver, we can easily apply ICA algorithms to decrypt the received signals and retrieve information.
Chinese National Strategy of Total War
2008-06-01
Cyber Warfare Michael J. Good, BA Major, USA June 2008 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS...who allowed me into the Cyber Warfare , my fellow students in the Cyber Warfare IDE program who have been great friends and mentors, and my fellow...Hackers and Other Cyber Criminals .............................................................................41 PLA Cyber Warfare
Critiche a Noam Chomsky: ieri e oggi (Criticism of Noam Chomsky: Yesterday and Today).
ERIC Educational Resources Information Center
Titone, Renzo
1991-01-01
For the past 30 years, much has been written about the works of Noam Chomsky. A comparison is presented of the latest writings about Chomsky (in particular P.M.S. Hacker's 1990 work) with those written in the early 1960s. (CFM)
Online Ethics: What's a Teacher to Do?
ERIC Educational Resources Information Center
Carpenter, Cal
1996-01-01
Considers ethics issues involved with using online resources like the Internet in elementary and secondary education and suggests that educators initiate and model a standardized role of ethical behavior for Internet users. Topics include hackers; privacy, piracy, and security; screening electronic sites; ethics education; and an ethics model.…
Technical Documentation and Legal Liability.
ERIC Educational Resources Information Center
Caher, John M.
1995-01-01
States that litigation over the interpretation and sufficiency of technical documentation is increasingly common as a number of suits have been filed in state and federal courts. Describes the case of "Martin versus Hacker," a recent case in which New York's highest court analyzed a technical writer's prose in the context of a lawsuit…
Creating Trading Networks of Digital Archives.
ERIC Educational Resources Information Center
Cooper, Brian; Garcia-Molina, Hector
Digital materials are vulnerable to a number of different kinds of failures, including decay of the digital media, loss due to hackers and viruses, accidental deletions, natural disasters, and bankruptcy of the institution holding the collection. Digital archives can best survive failures if they have made several copies of their collections at…
Cyberspace: Time to Reassess, Reorganize, and Resource for Evolving Threats
2012-03-15
reflecting on what types of cyber activities have the potential to change the strategic landscape. Arguably an attack by cyber criminals on the...their ability to hire or develop hacker talent.18 Nation states can use cyber criminals as a proxy to commit crimes against other nations in an
Leadership in the Context of Conflict: A Response to Implied Allegations of Cheating
ERIC Educational Resources Information Center
Schultz, Rosemary
2006-01-01
In December 2004, the "Amarillo Globe News" reported on a "Dallas Morning News" story that analyzed state-mandated test scores from across Texas (Benton & Hacker, 2004; Wilson, 2004). According the "Amarillo Globe News," "the Dallas Morning News" study implicated Sunrise Elementary School, in Amarillo,…
Campus network security model study
NASA Astrophysics Data System (ADS)
Zhang, Yong-ku; Song, Li-ren
2011-12-01
Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.
Teaching Game Theory to Improve Adversarial Thinking in Cybersecurity Students
ERIC Educational Resources Information Center
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E.
2017-01-01
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Multiple Exposure of Rendezvous Docking Simulator - Gemini Program
1964-02-07
Multiple exposure of Rendezvous Docking Simulator. Francis B. Smith, described the simulator as follows: The rendezvous and docking operation of the Gemini spacecraft with the Agena and of the Apollo Command Module with the Lunar Excursion Module have been the subject of simulator studies for several years. This figure illustrates the Gemini-Agena rendezvous docking simulator at Langley. The Gemini spacecraft was supported in a gimbal system by an overhead crane and gantry arrangement which provided 6 degrees of freedom - roll, pitch, yaw, and translation in any direction - all controllable by the astronaut in the spacecraft. Here again the controls fed into a computer which in turn provided an input to the servos driving the spacecraft so that it responded to control motions in a manner which accurately simulated the Gemini spacecraft. -- Published in Barton C. Hacker and James M. Grimwood, On the Shoulders of Titans: A History of Project Gemini, NASA SP-4203 Francis B. Smith, Simulators for Manned Space Research, Paper presented at the 1966 IEEE International convention, March 21-25, 1966.
Encryption and the loss of patient data.
Miller, Amalia R; Tucker, Catherine E
2011-01-01
Fast-paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment.
NASA Astrophysics Data System (ADS)
Kusyk, Janusz; Eskicioglu, Ahmet M.
2005-10-01
Digital watermarking is considered to be a major technology for the protection of multimedia data. Some of the important applications are broadcast monitoring, copyright protection, and access control. In this paper, we present a semi-blind watermarking scheme for embedding a logo in color images using the DFT domain. After computing the DFT of the luminance layer of the cover image, the magnitudes of DFT coefficients are compared, and modified. A given watermark is embedded in three frequency bands: Low, middle, and high. Our experiments show that the watermarks extracted from the lower frequencies have the best visual quality for low pass filtering, adding Gaussian noise, JPEG compression, resizing, rotation, and scaling, and the watermarks extracted from the higher frequencies have the best visual quality for cropping, intensity adjustment, histogram equalization, and gamma correction. Extractions from the fragmented and translated image are identical to extractions from the unattacked watermarked image. The collusion and rewatermarking attacks do not provide the hacker with useful tools.
Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities
ERIC Educational Resources Information Center
Li, Weifeng
2017-01-01
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
ERIC Educational Resources Information Center
Horspool, Agi
2013-01-01
Organizations have started using social media to support activities such as team collaboration and knowledge sharing, yet few researchers have systematically investigated the context and culture within which these implementations occur, nor the perceived impact according to organizational users. Additionally, researchers have not yet considered…
The Promise of the Maker Movement for Education
ERIC Educational Resources Information Center
Martin, Lee
2015-01-01
The Maker Movement is a community of hobbyists, tinkerers, engineers, hackers, and artists who creatively design and build projects for both playful and useful ends. There is growing interest among educators in bringing making into K-12 education to enhance opportunities to engage in the practices of engineering, specifically, and STEM more…
Using Strategy Instruction and Confidence Judgments to Improve Metacognitive Monitoring
ERIC Educational Resources Information Center
Huff, Jessica D.; Nietfeld, John L.
2009-01-01
Current models of self-regulated learning emphasize the pervasive need for metacognitive monitoring skills at all phases of the learning process (Winne and Hadwin in "Studying as self-regulated learning." In D. J. Hacker, J. Dunlosky, & A. C. Graesser (Eds.), "Metacognition in educational theory and practice" (pp. 227-304). Mahwah, NJ: Erlbaum,…
ERIC Educational Resources Information Center
Brooks, Tyson T.
2013-01-01
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
NASA Technical Reports Server (NTRS)
Nichols, Kelvin F.; Best, Susan; Schneider, Larry
2004-01-01
With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.
2010-05-17
System), or American company with factory in Malaysia (Smart Modular) Technology Is A Focal Point Of Attacks Who is behind data breaches ? 74% resulted...military style community of hackers learning from each other. 8 8 * Source – 2009 Verizon Data Breach Investigations Report 38% 32% There are also 100,000
Return of the Hacker as Hero: Fictions and Realities of Teenage Technological Experts
ERIC Educational Resources Information Center
Dudek, Debra; Johnson, Nicola F.
2011-01-01
When critics consider young people's practices within cyberspace, the focus is often on negative aspects, namely cyber-bullying, obsessive behaviour, and the lack of a balanced life. Such analyses, however, may miss the agency and empowerment young people experience not only to make decisions but to have some degree of control over their lives…
What Ohio U. Learned from a Major IT Crisis
ERIC Educational Resources Information Center
McDavis, Roderick J.
2008-01-01
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Frank Talk about Hacker Attacks, Emergency Notification, and Online Piracy
ERIC Educational Resources Information Center
Fischman, Josh; Carlson, Scott; Young, Jeffrey R.
2008-01-01
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Using GeoRSS feeds to distribute house renting and selling information based on Google map
NASA Astrophysics Data System (ADS)
Nong, Yu; Wang, Kun; Miao, Lei; Chen, Fei
2007-06-01
Geographically Encoded Objects RSS (GeoRSS) is a way to encode location in RSS feeds. RSS is a widely supported format for syndication of news and weblogs, and is extendable to publish any sort of itemized data. When Weblogs explode since RSS became new portals, Geo-tagged feed is necessary to show the location that story tells. Geographically Encoded Objects adopts the core of RSS framework, making itself the map annotations specified in the RSS XML format. The case studied illuminates that GeoRSS could be maximally concise in representation and conception, so it's simple to manipulate generation and then mashup GeoRSS feeds with Google Map through API to show the real estate information with other attribute in the information window. After subscribe to feeds of concerned subjects, users could easily check for new bulletin showing on map through syndication. The primary design goal of GeoRSS is to make spatial data creation as easy as regular Web content development. However, it does more for successfully bridging the gap between traditional GIS professionals and amateurs, Web map hackers, and numerous services that enable location-based content for its simplicity and effectiveness.
Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization
Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Olivares-Mercado, Jesus; Sanchez, Victor
2018-01-01
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ1 regularization. PMID:29710833
Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization.
Hernandez-Suarez, Aldo; Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Perez-Meana, Hector; Olivares-Mercado, Jesus; Sanchez, Victor
2018-04-29
In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.
ERIC Educational Resources Information Center
Carter, D. S. G.
1990-01-01
Analyzes three case studies, each representing one of the social studies teaching styles identified by D. S. G. Carter and R. G. Hacker: the knowledge transmitter, emphasizing content; the social scientist concerned with student development; and the reflective thinker, favoring process. Purpose of study was to ascribe meaning to the typology. Used…
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
Phishing E-Mails--Six Month Investigation into What People Click
ERIC Educational Resources Information Center
Lehrfeld, Michael R.
2014-01-01
Phishing and SPAM emails have been used by marketers and hackers alike since the inception of email and the Internet. Phishing messages have become so common that many legitimate emails often get flagged and placed in a user's spam bucket. No one is denying that these messages are at a minimum a nuisance, and in many cases malicious. But what is…
Automated Status Notification System
NASA Technical Reports Server (NTRS)
2005-01-01
NASA Lewis Research Center's Automated Status Notification System (ASNS) was born out of need. To prevent "hacker attacks," Lewis' telephone system needed to monitor communications activities 24 hr a day, 7 days a week. With decreasing staff resources, this continuous monitoring had to be automated. By utilizing existing communications hardware, a UNIX workstation, and NAWK (a pattern scanning and processing language), we implemented a continuous monitoring system.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Design of an experimental apparatus for measurement of the surface tension of metastable fluids
NASA Astrophysics Data System (ADS)
Vinš, V.; Hrubý, J.; Hykl, J.; Blaha, J.; Šmíd, B.
2013-04-01
A unique experimental apparatus for measurement of the surface tension of aqueous mixtures has been designed, manufactured, and tested in our laboratory. The novelty of the setup is that it allows measurement of surface tension by two different methods: a modified capillary elevation method in a long vertical capillary tube and a method inspired by the approach of Hacker (National Advisory Committee for Aeronautics, Technical Note 2510, 1-20, 1951), i.e. in a short horizontal capillary tube. Functionality of all main components of the apparatus, e.g., glass chamber with the capillary tube, temperature control unit consisting of two thermostatic baths with special valves for rapid temperature jumps, helium distribution setup allowing pressure variation above the liquid meniscus inside the capillary tube, has been successfully tested. Preliminary results for the surface tension of the stable and metastable supercooled water measured by the capillary elevation method at atmospheric pressure are provided. The surface tension of water measured at temperatures between +26 °C and -11 °C is in good agreement with the extrapolated IAPWS correlation (IAPWS Release on Surface Tension of Ordinary Water Substance, September 1994); however it disagrees with data by Hacker.
Gemini Rendezvous Docking Simulator
1964-05-11
Gemini Rendezvous Docking Simulator suspended from the roof of the Langley Research Center s aircraft hangar. Francis B. Smith wrote: The rendezvous and docking operation of the Gemini spacecraft with the Agena and of the Apollo Command Module with the Lunar Excursion Module have been the subject of simulator studies for several years. This figure illustrates the Gemini-Agena rendezvous docking simulator at Langley. The Gemini spacecraft was supported in a gimbal system by an overhead crane and gantry arrangement which provided 6 degrees of freedom - roll, pitch, yaw, and translation in any direction - all controllable by the astronaut in the spacecraft. Here again the controls fed into a computer which in turn provided an input to the servos driving the spacecraft so that it responded to control motions in a manner which accurately simulated the Gemini spacecraft. -- Published in Barton C. Hacker and James M. Grimwood, On the Shoulders of Titans: A History of Project Gemini, NASA SP-4203 Francis B. Smith, Simulators for Manned Space Research, Paper presented at the 1966 IEEE International convention, March 21-25, 1966.
Some scale-free networks could be robust under selective node attacks
NASA Astrophysics Data System (ADS)
Zheng, Bojin; Huang, Dan; Li, Deyi; Chen, Guisheng; Lan, Wenfei
2011-04-01
It is a mainstream idea that scale-free network would be fragile under the selective attacks. Internet is a typical scale-free network in the real world, but it never collapses under the selective attacks of computer viruses and hackers. This phenomenon is different from the deduction of the idea above because this idea assumes the same cost to delete an arbitrary node. Hence this paper discusses the behaviors of the scale-free network under the selective node attack with different cost. Through the experiments on five complex networks, we show that the scale-free network is possibly robust under the selective node attacks; furthermore, the more compact the network is, and the larger the average degree is, then the more robust the network is; with the same average degrees, the more compact the network is, the more robust the network is. This result would enrich the theory of the invulnerability of the network, and can be used to build robust social, technological and biological networks, and also has the potential to find the target of drugs.
Active Authentication: Beyond Passwords
2011-11-18
103m 26-Jul-07 208k 27-Dec-10 4.9m Source: www.privacyrights.org/data-breach Hackers broke into a Gannett Co database containing personal...Pattern • Knuckle Pattern • Lip Pattern • Nail bed Pattern • Nose Pattern • Oto-acoustic Emissions • Palmprint • Retina Pattern • Skin... Palmprint Knuckle Pattern Pulse Electrocardiogram Electroencephalogram Face Geometry Lip Pattern Blue may be suitable for continuous monitoring
Effects of TEL Confusers on Operator Target Acquisition Performance with SAR Imagery
1998-12-01
processing known as the theory of signal detection (TSD) (Gescheider, 1985; Green & Swets, 1966; Macmillan & Creelman , 1991; Wilson, 1992). A TSD...localizations (Hacker & Ratcliff, 1979; Macmillan & Creelman , 1991). The index of bias in a target localization task provides a measure of the operator’s...of correct localizations substituted for hits (Macmillan & Creelman , 1991). Receiver Operating Characteristic Curves. In addition to the calculation
1997-11-01
tasks (Gescheider, 1985; Green & Swets, 1966; Macmillan & Creelman , 1991; See & Kuperman, 1995; See, Riegler, Fitzhugh, & Kuperman, 1996; See, Warm...available for designation and the operator’s ensuing proportion of correct localization responses (Hacker & Ratcliff, 1979; Macmillan & Creelman ...substituted for hits (Macmillan & Creelman , 1991). The Present Study The techniques of signal detection theory were applied in the present study in
Learning from hackers: open-source clinical trials.
Dunn, Adam G; Day, Richard O; Mandl, Kenneth D; Coiera, Enrico
2012-05-02
Open sharing of clinical trial data has been proposed as a way to address the gap between the production of clinical evidence and the decision-making of physicians. A similar gap was addressed in the software industry by their open-source software movement. Here, we examine how the social and technical principles of the movement can guide the growth of an open-source clinical trial community.
ERIC Educational Resources Information Center
Simpson, James Daniel
2014-01-01
Free, libre, and open source software (FLOSS) is software that is collaboratively developed. FLOSS provides end-users with the source code and the freedom to adapt or modify a piece of software to fit their needs (Deek & McHugh, 2008; Stallman, 2010). FLOSS has a 30 year history that dates to the open hacker community at the Massachusetts…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
2007-09-01
Findings______________________________________________________________________ Chinese hackers forced one of its bureaus to cut off Internet access and discard virus -infected...Vulnerability ( IAV ) Management (IAVM) process was created to prepare and rapidly disseminate mitigating actions for potentially critical software...vulnerabilities to DoD Components. IAVM notices have three criticality levels: • IAV Alert (IAVA) – most critical – a vulnerability posing an immediate
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
Cybersecurity in the Clinical Setting: Nurses' Role in the Expanding "Internet of Things".
Billingsley, Luanne; McKee, Shawn A
2016-08-01
Nurses face growing complexity in their work. The expanding "Internet of Things" with "smart" technologies can reduce the burden. However, equipment and devices that connect to patients, the network, or to the Internet can be exploited by hackers. Nurses should be able to identify, understand, and protect against cybersecurity risks to safeguard patients. J Contin Educ Nurs. 2016;47(8):347-349. Copyright 2016, SLACK Incorporated.
Safe and efficient use of the Internet.
Downes, P K
2007-07-14
A minority of people abuse the freedom of the Internet to the detriment of the vast majority. Many people feel that the Internet requires more regulation to reduce the burden of hackers, viruses, hoaxes, adverts and spam that continue to proliferate unabated. Until this ever happens, it is down to the individual person or business to protect themselves against malicious attacks and to use the Internet in a safe and efficient manner.
The influence of omniscient technology on cryptography
NASA Astrophysics Data System (ADS)
Huang, Weihong; Li, Jian
2009-07-01
Scholars agree that concurrent algorithms are an interesting new topic in the field of cyberinformatics, and hackers worldwide concur. In fact, few end-users would disagree with the evaluation of architecture. We propose a Bayesian tool for harnessing massive multiplayer online role-playing games (FIRER), which we use to prove that the well-known ubiquitous algorithm for the improvement of wide-area networks by Karthik Lakshminarayanan is in Co-NP.
Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining
ERIC Educational Resources Information Center
Cheng, Kirby
2005-01-01
When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…
NASA Astrophysics Data System (ADS)
Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil
2017-11-01
Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.
Unluturk, Mehmet S
2012-06-01
Nurse call system is an electrically functioning system by which patients can call upon from a bedside station or from a duty station. An intermittent tone shall be heard and a corridor lamp located outside the room starts blinking with a slow or a faster rate depending on the call origination. It is essential to alert nurses on time so that they can offer care and comfort without any delay. There are currently many devices available for a nurse call system to improve communication between nurses and patients such as pagers, RFID (radio frequency identification) badges, wireless phones and so on. To integrate all these devices into an existing nurse call system and make they communicate with each other, we propose software client applications called bridges in this paper. We also propose a window server application called SEE (Supervised Event Executive) that delivers messages among these devices. A single hardware dongle is utilized for authentication and copy protection for SEE. Protecting SEE with securities provided by dongle only is a weak defense against hackers. In this paper, we develop some defense patterns for hackers such as calculating checksums in runtime, making calls to dongle from multiple places in code and handling errors properly by logging them into database.
Browsing the World Wide Web from behind a firewall
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simons, R.W.
1995-02-01
The World Wide Web provides a unified method of access to various information services on the Internet via a variety of protocols. Mosaic and other browsers give users a graphical interface to the Web that is easier to use and more visually pleasing than any other common Internet information service today. The availability of information via the Web and the number of users accessing it have both grown rapidly in the last year. The interest and investment of commercial firms in this technology suggest that in the near future, access to the Web may become as necessary to doing businessmore » as a telephone. This is problematical for organizations that use firewalls to protect their internal networks from the Internet. Allowing all the protocols and types of information found in the Web to pass their firewall will certainly increase the risk of attack by hackers on the Internet. But not allowing access to the Web could be even more dangerous, as frustrated users of the internal network are either unable to do their jobs, or find creative new ways to get around the firewall. The solution to this dilemma adopted at Sandia National Laboratories is described. Discussion also covers risks of accessing the Web, design alternatives considered, and trade-offs used to find the proper balance between access and protection.« less
Secure Communication Based on a Hybrid of Chaos and Ica Encryptions
NASA Astrophysics Data System (ADS)
Chen, Wei Ching; Yuan, John
Chaos and independent component analysis (ICA) encryptions are two novel schemes for secure communications. In this paper, a new scheme combining chaos and ICA techniques is proposed to enhance the security level during communication. In this scheme, a master chaotic system is embedded at the transmitter. The message signal is mixed with a chaotic signal and a Gaussian white noise into two mixed signals and then transmitted to the receiver through the public channels. A signal for synchronization is transmitted through another public channel to the receiver where a slave chaotic system is embedded to reproduce the chaotic signal. A modified ICA is used to recover the message signal at the receiver. Since only two of the three transmitted signals contain the information of message signal, a hacker would not be able to retrieve the message signal by using ICA even though all the transmitted signals are intercepted. Spectrum analyses are used to prove that the message signal can be securely hidden under this scheme.
The Literature of Aeronautics, Astronautics, and Air Power
1984-01-01
Century Aviator," Technology and Culture, 19, No. 2 ( Spring 1961) and "Medieval Uses of Air," Scientific American, 223, No. 12 (August, 1970). The...An Illustrated Guide to the Air War Over Vietnam: Aircraft of the Southeast Asia Conflict (New York: Arco/ Salamander , 1981) is a useful and reliable...of Project Mercury (Washington: NASA, 1966): Barton C. Hacker and James M. Grimwood, On the Shoulders of Titans: A History of Project Gemini
The CAFE Experiment: A Joint Seismic and MT Investigation of the Cascadia Subduction System
2013-02-01
In this thesis we present results from inversion of data using dense arrays of collocated seismic and magnetotelluric stations located in the Cascadia...implicit in the standard MT inversion provides tools that enable us to generate a more accurate MT model. This final MT model clearly demonstrates...references within, Hacker, 2008) have given us the tools to better interpret geophysical evidence. Improvements in the thermal modeling of subduction zones
Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace
2012-02-15
instruments of power. It is an evolving landscape of electronic and kinetic threats that may merely scratch the surface of what might be at an...communications satellite; and in 2008, during two separate attacks, hackers accessed National Aeronautics and Space Administration ( NASA ) telemetry...unacceptable and to be avoided.23,24 Deterrence between the United States and the Soviet Union was bi-polar, between known adversaries. This is not
NASA Astrophysics Data System (ADS)
Zhu, Lijuan; Liu, Jingao
2013-07-01
This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.
Fumigation success for California facility.
Hacker, Robert
2010-02-01
As Robert Hacker, at the time director of facilities management at the St John's Regional Medical Center in Oxnard, California, explains, the hospital, one of the area's largest, recently successfully utilised a new technology to eliminate mould, selecting a cost and time-saving fumigation process in place of the traditional "rip and tear" method. Although hospital managers knew the technology had been used extremely effectively in other US buildings, this was reportedly among the first ever healthcare applications.
Neural Network Based Intrusion Detection System for Critical Infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Todd Vollmer; Ondrej Linda; Milos Manic
2009-07-01
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recordedmore » from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.« less
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 2
2012-04-01
attacks is expanding to engulf the compact world of smartphones . by Aditya K. Sood and Richard J. Enbody A Practical Approach to Securing and Managing...provide a vulnerable entry point to our mobile device informa- tion systems. As a result, hackers are able to quickly exploit software on smartphones ...MOBILE WORLD 4 CrossTalk—March/April 2012 Abstract. The sphere of malware attacks is expanding to engulf the compact world of smartphones . This paper
2015-01-01
Medicine , Vietnam vets, among other servicemembers, receive the largest share of mental health services, including cognitive processing and prolonged...of Internal Medicine ,167, 476-482. 32 Iversen, A. C., Fear, N. T., Ehlers, A., Hacker Hughes, J., Hull, L., Earnshaw, M., et al. (2008). Risk...factors for post-traumatic stress disorder among UK armed forces personnel. Psychological Medicine , 38, 511-522 33 Ibid. 16 to either parent trauma or
2013-02-14
L acts to “provided resources for national and joint kinetic attack requirements.”24 Additionally, the Marine Corps Force Structure Review Group...for unusual system activity and searching for signs of known malware, unlike what is depicted in movies such as Hackers, where opposing cyber...never admitted involvement but the attacks originated in Russia. The FBI code name for the inquiry was Moonlight Maze. 29. Jeffrey Carr, Inside Cyber
What an open source clinical trial community can learn from hackers
Dunn, Adam G.; Day, Richard O.; Mandl, Kenneth D.; Coiera, Enrico
2014-01-01
Summary Open sharing of clinical trial data has been proposed as a way to address the gap between the production of clinical evidence and the decision-making of physicians. Since a similar gap has already been addressed in the software industry by the open source software movement, we examine how the social and technical principles of the movement can be used to guide the growth of an open source clinical trial community. PMID:22553248
Automatic analysis of attack data from distributed honeypot network
NASA Astrophysics Data System (ADS)
Safarik, Jakub; Voznak, MIroslav; Rezac, Filip; Partila, Pavol; Tomala, Karel
2013-05-01
There are many ways of getting real data about malicious activity in a network. One of them relies on masquerading monitoring servers as a production one. These servers are called honeypots and data about attacks on them brings us valuable information about actual attacks and techniques used by hackers. The article describes distributed topology of honeypots, which was developed with a strong orientation on monitoring of IP telephony traffic. IP telephony servers can be easily exposed to various types of attacks, and without protection, this situation can lead to loss of money and other unpleasant consequences. Using a distributed topology with honeypots placed in different geological locations and networks provides more valuable and independent results. With automatic system of gathering information from all honeypots, it is possible to work with all information on one centralized point. Communication between honeypots and centralized data store use secure SSH tunnels and server communicates only with authorized honeypots. The centralized server also automatically analyses data from each honeypot. Results of this analysis and also other statistical data about malicious activity are simply accessible through a built-in web server. All statistical and analysis reports serve as information basis for an algorithm which classifies different types of used VoIP attacks. The web interface then brings a tool for quick comparison and evaluation of actual attacks in all monitored networks. The article describes both, the honeypots nodes in distributed architecture, which monitor suspicious activity, and also methods and algorithms used on the server side for analysis of gathered data.
The Role of Vitamin D Stimulation of Mullerian Inhibiting Substance (MIS) in Prostate Cancer Therapy
2007-12-01
and cross - linked by addition of 1% formaldehyde. The chromatin was sheared by sonication to obtain DNA fragments of an average of 200-1000 bp in size...with elution buffer. The cross -links were reversed by incubation at 65°C overnight in elution buffer con ta in ing 200 mM NaCl . The...mitogen-activated protein kinase phosphatase 5: implications for prostate cancer prevention by vitamin D. Cancer Res 66:4516- 4524 43. Dresser DW, Hacker A
Naval War College Review. Volume 60, Number 3, Summer 2007
2007-06-01
you a new idea, and in that context it is interesting to think for a moment about the name of this beautiful , small town on the Narragansett Bay. It is...at everyone’s fingertips • Exploding Internet with bloggers , hackers, and chat rooms • Cell-phone cameras and recorders, making everyone a “reporter...simply The Road, and it is notable in every sense, most particularly for the heartbreaking beauty of its poetic language and as well for the utterly
Policing Toward a De-Clawed Jihad: Antiterrorism Intelligence Techniques for Law Enforcement
2006-12-01
particularly young Muslim adults who prefer the Internet as their primary news source over traditional print and broadcast media.35 Al-Qa’eda boasts a...first-hand knowledge and helped me give this thesis some real-world perspective. And whenever I’d feel the crunch, I’d reflect on Chuck Daenzer’s...Qa’eda hackers might disrupt an electronic commerce system or launch a denial of service attack, temporarily disabling part of a network, but such an
Design of Remote Heat-Meter System Based on Trusted Technology
NASA Astrophysics Data System (ADS)
Yu, Changgeng; Lai, Liping
2018-03-01
This article presents a proposal of a heat meter and remote meter reading system for the disadvantages of the hackers very easily using eavesdropping, tampering, replay attack of traditional remote meter reading system. The system selects trusted technology such as, the identity authentication, integrity verifying, and data protection. By the experiments, it is proved that the remote meter reading system of the heat meter can be used to verify the feasibility of the technology, and verify the practicability and operability of data protection technology.
The case for open-source software in drug discovery.
DeLano, Warren L
2005-02-01
Widespread adoption of open-source software for network infrastructure, web servers, code development, and operating systems leads one to ask how far it can go. Will "open source" spread broadly, or will it be restricted to niches frequented by hopeful hobbyists and midnight hackers? Here we identify reasons for the success of open-source software and predict how consumers in drug discovery will benefit from new open-source products that address their needs with increased flexibility and in ways complementary to proprietary options.
Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study
NASA Astrophysics Data System (ADS)
Romanov, Anton; Okamoto, Eiji
With the increasing demand for services provided by communication networks, quality and reliability of such services as well as confidentiality of data transfer are becoming ones of the highest concerns. At the same time, because of growing hacker's activities, quality of provided content and reliability of its continuous delivery strongly depend on integrity of data transmission and availability of communication infrastructure, thus on information security of a given IT landscape. But, the amount of resources allocated to provide information security (like security staff, technical countermeasures and etc.) must be reasonable from the economic point of view. This fact, in turn, leads to the need to employ a forecasting technique in order to make planning of IT budget and short-term planning of potential bottlenecks. In this paper we present an approach to make such a forecasting for a wide class of information security related incidents (ISRI) — unambiguously detectable ISRI. This approach is based on different auto regression models which are widely used in financial time series analysis but can not be directly applied to ISRI time series due to specifics related to information security. We investigate and address this specifics by proposing rules (special conditions) of collection and storage of ISRI time series, adherence to which improves forecasting in this subject field. We present an application of our approach to one type of unambiguously detectable ISRI — amount of spam messages which, if not mitigated properly, could create additional load on communication infrastructure and consume significant amounts of network capacity. Finally we evaluate our approach by simulation and actual measurement.
Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network
NASA Astrophysics Data System (ADS)
Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri
2017-12-01
Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.
Embedding multiple watermarks in the DFT domain using low- and high-frequency bands
NASA Astrophysics Data System (ADS)
Ganic, Emir; Dexter, Scott D.; Eskicioglu, Ahmet M.
2005-03-01
Although semi-blind and blind watermarking schemes based on Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) are robust to a number of attacks, they fail in the presence of geometric attacks such as rotation, scaling, and translation. The Discrete Fourier Transform (DFT) of a real image is conjugate symmetric, resulting in a symmetric DFT spectrum. Because of this property, the popularity of DFT-based watermarking has increased in the last few years. In a recent paper, we generalized a circular watermarking idea to embed multiple watermarks in lower and higher frequencies. Nevertheless, a circular watermark is visible in the DFT domain, providing a potential hacker with valuable information about the location of the watermark. In this paper, our focus is on embedding multiple watermarks that are not visible in the DFT domain. Using several frequency bands increases the overall robustness of the proposed watermarking scheme. Specifically, our experiments show that the watermark embedded in lower frequencies is robust to one set of attacks, and the watermark embedded in higher frequencies is robust to a different set of attacks.
2012-01-27
example is found in games converted to serve a purpose other than entertainment , such as the development and use of games for science, technology, and...These play-session histories can then be further modded via video editing or remixing with other media (e.g., adding music ) to better enable cinematic...available OSS (e.g., the Linux Kernel on the Sony PS3 game console2) that game system hackers seek to undo. Finally, games are one of the most commonly
Netz ohne doppelten Boden: Internet-Sicherheit
NASA Astrophysics Data System (ADS)
Fichtner, Johann
2002-07-01
Die Sicherheitslücken des heutigen Internets haben zwei Ursachen: sein ursprüngliches Design für rein militärische Zwecke sowie die gefährliche Sorglosigkeit der Entwickler und Betreiber von Internet-Komponenten. Dabei kann ein kleiner Kreis von Experten Angriffe auf die eigentlichen Netzknoten ausführen. Typische Hacker-Angriffe kommen von Endsystemen des Internets und richten sich auch gegen Endsysteme wie Firmen-Intranets oder einzelne PCs. Dagegen gibt es eine Reihe von Schutzmöglichkeiten. Es ist jedoch keine einfache Lösung zur Erhöhung der Internet-Sicherheit in Sicht.
Coherence, causation, and the future of cognitive neuroscience research.
Ramey, Christopher H; Chrysikou, Evangelia G
2014-01-01
Nachev and Hacker's conceptual analysis of the neural antecedents of voluntary action underscores the real danger of ignoring the meta-theoretical apparatus of cognitive neuroscience research. In this response, we temper certain claims (e.g., whether or not certain research questions are incoherent), consider a more extreme consequence of their argument against cognitive neuroscience (i.e., whether or not one can speak about causation with neural antecedents at all), and, finally, highlight recent methodological developments that exemplify cognitive neuroscientists' focus on studying the brain as a parallel, dynamic, and highly complex biological system.
Hacker within! Ehrlichia chaffeensis Effector Driven Phagocyte Reprogramming Strategy
Lina, Taslima T.; Farris, Tierra; Luo, Tian; Mitra, Shubhajit; Zhu, Bing; McBride, Jere W.
2016-01-01
Ehrlichia chaffeensis is a small, gram negative, obligately intracellular bacterium that preferentially infects mononuclear phagocytes. It is the etiologic agent of human monocytotropic ehrlichiosis (HME), an emerging life-threatening tick-borne zoonosis. Mechanisms by which E. chaffeensis establishes intracellular infection, and avoids host defenses are not well understood, but involve functionally relevant host-pathogen interactions associated with tandem and ankyrin repeat effector proteins. In this review, we discuss the recent advances in our understanding of the molecular and cellular mechanisms that underlie Ehrlichia host cellular reprogramming strategies that enable intracellular survival. PMID:27303657
Evaluation of Tools for Protection of Interest against Hacking and Cracking
NASA Astrophysics Data System (ADS)
Jahankhani, Hossein; Antonijevic, Branko; Walcott, Terry
The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.
Reducing software security risk through an integrated approach
NASA Technical Reports Server (NTRS)
Gilliam, D.; Powell, J.; Kelly, J.; Bishop, M.
2001-01-01
The fourth quarter delivery, FY'01 for this RTOP is a Property-Based Testing (PBT), 'Tester's Assistant' (TA). The TA tool is to be used to check compiled and pre-compiled code for potential security weaknesses that could be exploited by hackers. The TA Instrumenter, implemented mostly in C++ (with a small part in Java), parsels two types of files: Java and TASPEC. Security properties to be checked are written in TASPEC. The Instrumenter is used in conjunction with the Tester's Assistant Specification (TASpec)execution monitor to verify the security properties of a given program.
Pekarsky, Oleg
2012-01-01
Abstract The taxa of the Polymixis serpentina (Treitschke, 1825) species-group are revised. The external and genital features of all known taxa and a new species, Polymixis ivanchiki sp. n. (Lebanon, Israel, Turkey and Iran) are described and illustrated. Polymixis serpentina iatnana Hacker, 1996, is treated here as a species distinct from Polymixis serpentina (stat. n.). A diagnostic comparison of the members of the species-group is provided; descriptions of the genitalia of Polymixis serpentina minoica Fibiger, 1992 and Polymixis iatnana are given for the first time. PMID:22768001
Pekarsky, Oleg
2012-01-01
The taxa of the Polymixis serpentina (Treitschke, 1825) species-group are revised. The external and genital features of all known taxa and a new species, Polymixis ivanchikisp. n. (Lebanon, Israel, Turkey and Iran) are described and illustrated. Polymixis serpentina iatnana Hacker, 1996, is treated here as a species distinct from Polymixis serpentina (stat. n.). A diagnostic comparison of the members of the species-group is provided; descriptions of the genitalia of Polymixis serpentina minoica Fibiger, 1992 and Polymixis iatnana are given for the first time.
1983-04-04
Roland 11 Perry Nelson* Hacker Murray 6/79 NAVSTAR 11 Dineen’ Shorey’ Hessler’ Murray 11/79 Copperhead 11 LaBerge * Pinie Wacker Murray 1/SO FYS III... LaBerge ’ Danzig’ Uarshman’ Christie’* 10/80 FVS PR LaBerge ’ Danzig* Bting Cua 6/82 LAMPS III Wade* Leach’ Heth h % Not a principal. "no appointee, actg...to illustrate the situation: FVS Program Review 1/80 LaBerge *Danzig* Harshman*Christie* Program Review 10/80 LaBerge *Danzig* Borsting Murray TRIDENT
Distance bounded energy detecting ultra-wideband impulse radio secure protocol.
Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J
2014-01-01
We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks.
The cyber security threat stops in the boardroom.
Scully, Tim
The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.
NASA Astrophysics Data System (ADS)
Dimech, C.
2013-12-01
In this contribution, I present a critical evaluation of my experience as a research student conducting an interdisciplinary project that bridges the world of geoscience with that of astronomy. The major challenge consists in studying and modifying existing geophysical software to work with synthetic solar data not obtained by direct measurement but useful for testing and evaluation, and data released from the satellite HINODE and the Solar Dynamics Observatory. I have been fortunate to collaborate closely with multiple geoscientists keen to share their software codes and help me understand their implementations so I can extend the methodology to solve problems in solar physics. Moreover, two additional experiences have helped me develop my research and collaborative skills. First was an opportunity to involve an undergraduate student, and secondly, my participation at the GNU Hackers Meeting in Paris. Three aspects that need particular attention to enhance the collective productivity of any group of individuals keen to extend existing codes to achieve further interdisciplinary goals have been identified. (1) The production of easily reusable code that users can study and modify even when large sets of computations are involved. (2) The transformation of solutions into tools that are 100% free software. (3) The harmonisation of collaborative interactions that effectively tackle the two aforementioned tasks. Each one will be discussed in detail during this session based on my experience as a research student.
32nd International Austrian Winter Symposium : Zell am See, the Netherlands. 20-23 January 2016.
Langsteger, W; Rezaee, A; Loidl, W; Geinitz, H S; Fitz, F; Steinmair, M; Broinger, G; Pallwien-Prettner, L; Beheshti, M; Imamovic, L; Beheshti, M; Rendl, G; Hackl, D; Tsybrovsky, O; Steinmair, M; Emmanuel, K; Moinfar, F; Pirich, C; Langsteger, W; Bytyqi, A; Karanikas, G; Mayerhöfer, M; Koperek, O; Niederle, B; Hartenbach, M; Beyer, T; Herrmann, K; Czernin, J; Rausch, I; Rust, P; DiFranco, M D; Lassen, M; Stadlbauer, A; Mayerhöfer, M E; Hartenbach, M; Hacker, M; Beyer, T; Binzel, K; Magnussen, R; Wei, W; Knopp, M U; Flanigan, D C; Kaeding, C; Knopp, M V; Leisser, A; Nejabat, M; Hartenbach, M; Kramer, G; Krainer, M; Hacker, M; Haug, A; Lehnert, Wencke; Schmidt, Karl; Kimiaei, Sharok; Bronzel, Marcus; Kluge, Andreas; Wright, C L; Binzel, K; Zhang, J; Wuthrick, Evan; Maniawski, Piotr; Knopp, M V; Blaickner, M; Rados, E; Huber, A; Dulovits, M; Kulkarni, H; Wiessalla, S; Schuchardt, C; Baum, R P; Knäusl, B; Georg, D; Bauer, M; Wulkersdorfer, B; Wadsak, W; Philippe, C; Haslacher, H; Zeitlinger, M; Langer, O; Bauer, M; Feldmann, M; Karch, R; Wadsak, W; Zeitlinger, M; Koepp, M J; Asselin, M-C; Pataraia, E; Langer, O; Zeilinger, M; Philippe, C; Dumanic, M; Pichler, F; Pilz, J; Hacker, M; Wadsak, W; Mitterhauser, M; Nics, L; Steiner, B; Hacker, M; Mitterhauser, M; Wadsak, W; Traxl, A; Wanek, Thomas; Kryeziu, Kushtrim; Mairinger, Severin; Stanek, Johann; Berger, Walter; Kuntner, Claudia; Langer, Oliver; Mairinger, S; Wanek, T; Traxl, A; Krohn, M; Stanek, J; Filip, T; Sauberer, M; Kuntner, C; Pahnke, J; Langer, O; Svatunek, D; Denk, C; Wilkovitsch, M; Wanek, T; Filip, T; Kuntner-Hannes, C; Fröhlich, J; Mikula, H; Denk, C; Svatunek, D; Wanek, T; Mairinger, S; Stanek, J; Filip, T; Fröhlich, J; Mikula, H; Kuntner-Hannes, C; Balber, T; Singer, J; Fazekas, J; Rami-Mark, C; Berroterán-Infante, N; Jensen-Jarolim, E; Wadsak, W; Hacker, M; Viernstein, H; Mitterhauser, M; Denk, C; Svatunek, D; Sohr, B; Mikula, H; Fröhlich, J; Wanek, T; Kuntner-Hannes, C; Filip, T; Pfaff, S; Philippe, C; Mitterhauser, M; Hartenbach, M; Hacker, M; Wadsak, W; Wanek, T; Halilbasic, E; Visentin, M; Mairinger, S; Stieger, B; Kuntner, C; Trauner, M; Langer, O; Lam, P; Aistleitner, M; Eichinger, R; Artner, C; Eidherr, H; Vraka, C; Haug, A; Mitterhauser, M; Nics, L; Hartenbach, M; Hacker, M; Wadsak, W; Kvaternik, H; Müller, R; Hausberger, D; Zink, C; Aigner, R M; Cossío, U; Asensio, M; Montes, A; Akhtar, S; Te Welscher, Y; van Nostrum, R; Gómez-Vallejo, V; Llop, J; VandeVyver, F; Barclay, T; Lippens, N; Troch, M; Hehenwarter, L; Egger, B; Holzmannhofer, J; Rodrigues-Radischat, M; Pirich, C; Pötsch, N; Rausch, I; Wilhelm, D; Weber, M; Furtner, J; Karanikas, G; Wöhrer, A; Mitterhauser, M; Hacker, M; Traub-Weidinger, T; Cassou-Mounat, T; Balogova, S; Nataf, V; Calzada, M; Huchet, V; Kerrou, K; Devaux, J-Y; Mohty, M; Garderet, L; Talbot, J-N; Stanzel, S; Pregartner, G; Schwarz, T; Bjelic-Radisic, V; Liegl-Atzwanger, B; Aigner, R; Stanzel, S; Quehenberger, F; Aigner, R M; Marković, A Koljević; Janković, Milica; Jerković, V Miler; Paskaš, M; Pupić, G; Džodić, R; Popović, D; Fornito, M C; Familiari, D; Koranda, P; Polzerová, H; Metelková, I; Henzlová, L; Formánek, R; Buriánková, E; Kamínek, M; Thomson, W H; Lewis, C; Thomson, W H; O'Brien, J; James, G; Notghi, A; Huber, H; Stelzmüller, I; Wunn, R; Mandl, M; Fellner, F; Lamprecht, B; Gabriel, M; Fornito, M C; Leonardi, G; Thomson, W H; O'Brien, J; James, G; Hudzietzová, J; Sabol, J; Fülöp, M
2016-04-01
A1 68Ga-PSMA PET/CT in staging and restaging of Prostate Cancer Patients: comparative study with 18F-Choline PET/CTW Langsteger, A Rezaee, W Loidl, HS Geinitz, F Fitz, M Steinmair, G Broinger, L Pallwien-Prettner, M BeheshtiA2 F18 Choline PET - CT: an accurate diagnostic tool for the detection of parathyroid adenoma?L Imamovic, M Beheshti, G Rendl, D Hackl, O Tsybrovsky, M Steinmair, K Emmanuel, F Moinfar, C Pirich, W LangstegerA3 [18F]Fluoro-DOPA-PET/CT in the primary diagnosis of medullary thyroid carcinomaA Bytyqi, G Karanikas, M Mayerhöfer, O Koperek, B Niederle, M HartenbachA4 Variations of clinical PET/MR operations: An international survey on the clinical utilization of PET/MRIT Beyer, K Herrmann, J CzerninA5 Standard Dixon-based attenuation correction in combined PET/MRI: Reproducibility and the possibility of Lean body mass estimationI Rausch, P Rust, MD DiFranco, M Lassen, A Stadlbauer, ME Mayerhöfer, M Hartenbach, M Hacker, T BeyerA6 High resolution digital FDG PET/MRI imaging for assessment of ACL graft viabilityK Binzel, R Magnussen, W Wei, MU Knopp, DC Flanigan, C Kaeding, MV KnoppA7 Using pre-existing hematotoxicity as predictor for severe side effects and number of treatment cycles of Xofigo therapyA Leisser, M Nejabat, M Hartenbach, G Kramer, M Krainer, M Hacker, A HaugA8 QDOSE - comprehensive software solution for internal dose assessmentWencke Lehnert, Karl Schmidt, Sharok Kimiaei, Marcus Bronzel, Andreas KlugeA9 Clinical impact of Time-of-Flight on next-generation digital PET imaging of Yttrium-90 radioactivity following liver radioembolizationCL Wright, K Binzel, J Zhang, Evan Wuthrick, Piotr Maniawski, MV KnoppA10 Snakes in patients! Lessons learned from programming active contours for automated organ segmentationM Blaickner, E Rados, A Huber, M Dulovits, H Kulkarni, S Wiessalla, C Schuchardt, RP Baum, B Knäusl, D GeorgA11 Influence of a genetic polymorphism on brain uptake of the dual ABCB1/ABCG2 substrate [11C]tariquidarM Bauer, B Wulkersdorfer, W Wadsak, C Philippe, H Haslacher, M Zeitlinger, O LangerA12 Outcome prediction of temporal lobe epilepsy surgery from P-glycoprotein activity. Pooled analysis of (R)-[11C]-verapamil PET data from two European centresM Bauer, M Feldmann, R Karch, W Wadsak, M Zeitlinger, MJ Koepp, M-C Asselin, E Pataraia, O LangerA13 In-vitro and in-vivo characterization of [18F]FE@SNAP and derivatives for the visualization of the melanin concentrating hormone receptor 1M Zeilinger, C Philippe, M Dumanic, F Pichler, J Pilz, M Hacker, W Wadsak, M MitterhauserA14 Reducing time in quality control leads to higher specific radioactivity of short-lived radiotracersL Nics, B Steiner, M Hacker, M Mitterhauser, W WadsakA15 In vitro 11C-erlotinib binding experiments in cancer cell lines with epidermal growth factor receptor mutationsA Traxl, Thomas Wanek, Kushtrim Kryeziu, Severin Mairinger, Johann Stanek, Walter Berger, Claudia Kuntner, Oliver LangerA16 7-[11C]methyl-6-bromopurine, a PET tracer to measure brain Mrp1 function: radiosynthesis and first PET evaluation in miceS Mairinger, T Wanek, A Traxl, M Krohn, J Stanek, T Filip, M Sauberer, C Kuntner, J Pahnke, O LangerA17 18F labeled azidoglucose derivatives as "click" agents for pretargeted PET imagingD Svatunek, C Denk, M Wilkovitsch, T Wanek, T Filip, C Kuntner-Hannes, J Fröhlich, H MikulaA18 Bioorthogonal tools for PET imaging: development of radiolabeled 1,2,4,5-TetrazinesC Denk, D Svatunek, T Wanek, S Mairinger, J Stanek, T Filip, J Fröhlich, H Mikula, C Kuntner-HannesA19 Preclinical evaluation of [18F]FE@SUPPY- a new PET-tracer for oncologyT Balber, J Singer, J Fazekas, C Rami-Mark, N Berroterán-Infante, E Jensen-Jarolim, W Wadsak, M Hacker, H Viernstein, M MitterhauserA20 Investigation of Small [18F]-Fluoroalkylazides for Rapid Radiolabeling and In Vivo Click ChemistryC Denk, D Svatunek, B Sohr, H Mikula, J Fröhlich, T Wanek, C Kuntner-Hannes, T FilipA21 Microfluidic 68Ga-radiolabeling of PSMA-HBED-CC using a flow-through reactorS Pfaff, C Philippe, M Mitterhauser, M Hartenbach, M Hacker, W WadsakA22 Influence of 24-nor-ursodeoxycholic acid on hepatic disposition of [18F]ciprofloxacin measured with positron emission tomographyT Wanek, E Halilbasic, M Visentin, S Mairinger, B Stieger, C Kuntner, M Trauner, O LangerA23 Automated 18F-flumazenil production using chemically resistant disposable cassettesP Lam, M Aistleitner, R Eichinger, C ArtnerA24 Similarities and differences in the synthesis and quality control of 177Lu-DOTA-TATE, 177Lu -HA-DOTA-TATE and 177Lu-DOTA-PSMA (PSMA-617)H Eidherr, C Vraka, A Haug, M Mitterhauser, L Nics, M Hartenbach, M Hacker, W WadsakA25 68Ga- and 177Lu-labelling of PSMA-617H Kvaternik, R Müller, D Hausberger, C Zink, RM AignerA26 Radiolabelling of liposomes with 67Ga and biodistribution studies after administration by an aerosol inhalation systemU Cossío, M Asensio, A Montes, S Akhtar, Y te Welscher, R van Nostrum, V Gómez-Vallejo, J LlopA27 Fully automated quantification of DaTscan SPECT: Integration of age and gender differencesF VandeVyver, T Barclay, N Lippens, M TrochA28 Lesion-to-background ratio in co-registered 18F-FET PET/MR imaging - is it a valuable tool to differentiate between low grade and high grade brain tumor?L Hehenwarter, B Egger, J Holzmannhofer, M Rodrigues-Radischat, C PirichA29 [11C]-methionine PET in gliomas - a retrospective data analysis of 166 patientsN Pötsch, I Rausch, D Wilhelm, M Weber, J Furtner, G Karanikas, A Wöhrer, M Mitterhauser, M Hacker, T Traub-WeidingerA30 18F-Fluorocholine versus 18F-Fluorodeoxyglucose for PET/CT imaging in patients with relapsed or progressive multiple myeloma: a pilot studyT Cassou-Mounat, S Balogova, V Nataf, M Calzada, V Huchet, K Kerrou, J-Y Devaux, M Mohty, L Garderet, J-N TalbotA31 Prognostic benefit of additional SPECT/CT in sentinel lymph node mapping of breast cancer patientsS Stanzel, G Pregartner, T Schwarz, V Bjelic-Radisic, B Liegl-Atzwanger, R AignerA32 Evaluation of diagnostic value of TOF-18F-FDG PET/CT in patients with suspected pancreatic cancerS Stanzel, F Quehenberger, RM AignerA33 New quantification method for diagnosis of primary hyperpatahyroidism lesions and differential diagnosis vs thyropid nodular disease in dynamic scintigraphyA Koljević Marković, Milica Janković, V Miler Jerković, M Paskaš, G Pupić, R Džodić, D PopovićA34 A rare case of diffuse pancreatic involvement in patient with merkel cell carcinoma detected by 18F-FDGMC Fornito, D FamiliariA35 TSH-stimulated 18F-FDG PET/CT in the diagnosis of recurrent/metastatic radioiodine-negative differentiated thyroid carcinomas in patients with various thyroglobuline levelsP Koranda, H Polzerová, I Metelková, L Henzlová, R Formánek, E Buriánková, M KamínekA36 Breast Dose from lactation following I131 treatmentWH Thomson, C LewisA37 A new concept for performing SeHCAT studies with the gamma cameraWH Thomson, J O'Brien, G James, A NotghiA38 Whole body F-18-FDG-PET and tuberculosis: sensitivity compared to x-ray-CTH Huber, I Stelzmüller, R Wunn, M Mandl, F Fellner, B Lamprecht, M GabrielA39 Emerging role 18F-FDG PET-CT in the diagnosis and follow-up of the infection in heartware ventricular assist system (HVAD)MC Fornito, G LeonardiA40 Validation of Poisson resampling softwareWH Thomson, J O'Brien, G JamesA41 Protection of PET nuclear medicine personnel: problems in satisfying dose limit requirementsJ Hudzietzová, J Sabol, M Fülöp.
Hacker, Andrew; Kingsland, Melanie; Lecathelinais, Christophe; Tindall, Jennifer; Bowman, Jennifer A.; Wolfenden, Luke
2015-01-01
Abstract Introduction and Aims Enforcement of liquor licensing laws is limited by inadequate police information systems. This study aimed to: (i) determine the effectiveness of an intervention in facilitating police recording of the alcohol consumption characteristics of people involved in assaults; and (ii) describe such characteristics by geographic area and setting of alcohol consumption. Design and Methods A stepped wedge trial was conducted across New South Wales, Australia. An intervention to facilitate police recording of alcohol consumption information for people involved in incidents was implemented. For people involved in an assault the proportion for which alcohol consumption information was recorded was assessed. The proportion of assaults that were alcohol related, the proportions of people that consumed alcohol prior to the assault, were intoxicated, and had consumed alcohol in various settings, are described. Results Post‐intervention, alcohol consumption information was recorded for 85–100% of people involved in an assault incident. The proportion of incidents recorded as alcohol‐related increased significantly (26–44.5%; P < 0.0001). The proportion of assaults classified as alcohol related was significantly greater in regional/rural areas (50–47%) than in metropolitan areas (38%). More people in metropolitan areas (54%) consumed alcohol on licensed premises prior to an assault than in regional/rural areas (39–42%), with approximately 70% of persons intoxicated regardless of setting of alcohol consumption. Twenty per cent of premises accounted for 60% of assaults linked to licensed premises. Discussion and Conclusions The intervention was effective in enhancing the recording of alcohol‐related information for assault incidents. Such information could enhance targeted policing of liquor licensing laws. [Wiggers JH, Hacker A, Kingsland M, Lecathelinais C, Tindall J, Bowman JA, Wolfenden L. Facilitating police recording of the alcohol‐related characteristics of assault incidents: A stepped wedge implementation trial. Drug Alcohol Rev 2015;00:000–000] PMID:26332276
Boudreau, Aaron; van't Veer, Laura J; Bissell, Mina J
2012-01-01
The year 2011 marked the 40 year anniversary of Richard Nixon signing the National Cancer Act, thus declaring the beginning of the "War on Cancer" in the United States. Whereas we have made tremendous progress toward understanding the genetics of tumors in the past four decades, and in developing enabling technology to dissect the molecular underpinnings of cancer at unprecedented resolution, it is only recently that the important role of the stromal microenvironment has been studied in detail. Cancer is a tissue-specific disease, and it is becoming clear that much of what we know about breast cancer progression parallels the biology of the normal breast differentiation, of which there is still much to learn. In particular, the normal breast and breast tumors share molecular, cellular, systemic and microenvironmental influences necessary for their progression. It is therefore enticing to consider a tumor to be a "rogue hacker"--one who exploits the weaknesses of a normal program for personal benefit. Understanding normal mammary gland biology and its "security vulnerabilities" may thus leave us better equipped to target breast cancer. In this review, we will provide a brief overview of the heterotypic cellular and molecular interactions within the microenvironment of the developing mammary gland that are necessary for functional differentiation, provide evidence suggesting that similar biology--albeit imbalanced and exaggerated--is observed in breast cancer progression particularly during the transition from carcinoma in situ to invasive disease. Lastly we will present evidence suggesting that the multigene signatures currently used to model cancer heterogeneity and clinical outcome largely reflect signaling from a heterogeneous microenvironment-a recurring theme that could potentially be exploited therapeutically.
Customization of Curriculum Materials in Science: Motives, Challenges, and Opportunities
NASA Astrophysics Data System (ADS)
Romine, William L.; Banerjee, Tanvi
2012-02-01
Exemplary science instructors use inquiry to tailor content to student's learning needs; traditional textbooks treat science as a set of facts and a rigid curriculum. Publishers now allow instructors to compile pieces of published and/or self-authored text to make custom textbooks. This brings numerous advantages, including the ability to produce smaller, cheaper text and added flexibility on the teaching models used. Moreover, the internet allows instructors to decentralize textbooks through easy access to educational objects such as audiovisual simulations, individual textbook chapters, and scholarly research articles. However, these new opportunities bring with them new problems. With educational materials easy to access, manipulate and duplicate, it is necessary to define intellectual property boundaries, and the need to secure documents against unlawful copying and use is paramount. Engineers are developing and enhancing information embedding technologies, including steganography, cryptography, watermarking, and fingerprinting, to label and protect intellectual property. While these are showing their utility in securing information, hackers continue to find loop holes in these protection schemes, forcing engineers to constantly assess the algorithms to make them as secure as possible. As newer technologies rise, people still question whether custom publishing is desirable. Many instructors see the process as complex, costly, and substandard in comparison to using traditional text. Publishing companies are working to improve attitudes through advertising. What lacks is peer reviewed evidence showing that custom publishing improves learning. Studies exploring the effect of custom course materials on student attitude and learning outcomes are a necessary next step.
Hardware and software improvements to a low-cost horizontal parallax holographic video monitor.
Henrie, Andrew; Codling, Jesse R; Gneiting, Scott; Christensen, Justin B; Awerkamp, Parker; Burdette, Mark J; Smalley, Daniel E
2018-01-01
Displays capable of true holographic video have been prohibitively expensive and difficult to build. With this paper, we present a suite of modularized hardware components and software tools needed to build a HoloMonitor with basic "hacker-space" equipment, highlighting improvements that have enabled the total materials cost to fall to $820, well below that of other holographic displays. It is our hope that the current level of simplicity, development, design flexibility, and documentation will enable the lay engineer, programmer, and scientist to relatively easily replicate, modify, and build upon our designs, bringing true holographic video to the masses.
Robustness of the p53 network and biological hackers.
Dartnell, Lewis; Simeonidis, Evangelos; Hubank, Michael; Tsoka, Sophia; Bogle, I David L; Papageorgiou, Lazaros G
2005-06-06
The p53 protein interaction network is crucial in regulating the metazoan cell cycle and apoptosis. Here, the robustness of the p53 network is studied by analyzing its degeneration under two modes of attack. Linear Programming is used to calculate average path lengths among proteins and the network diameter as measures of functionality. The p53 network is found to be robust to random loss of nodes, but vulnerable to a targeted attack against its hubs, as a result of its architecture. The significance of the results is considered with respect to mutational knockouts of proteins and the directed attacks mounted by tumour inducing viruses.
VizieR Online Data Catalog: QSOs narrow absorption line variability (Hacker+, 2013)
NASA Astrophysics Data System (ADS)
Hacker, T. L.; Brunner, R. J.; Lundgren, B. F.; York, D. G.
2013-06-01
Catalogues of 2,522 QAL systems and 33 variable NAL systems detected in SDSS DR7 quasars with repeat observations. The object identifiers, position coordinates, and plate-MJD-fibre designations are taken from the SpecObjAll table in the SDSS Catalogue Archive Server (CAS) while the quasar redshifts (zqso) are from Hewett & Wild (2010, Cat. J/MNRAS/405/2302). The absorption system redshift (zabs), system grade, and detected lines are outputs of the York et al. (2013, in. prep.) QAL detection pipeline. Some absorption lines are flagged based on alternate identifications (a), proximity of masked pixels (b), or questionable continuum fits (c). (3 data files).
Modeling IrisCode and its variants as convex polyhedral cones and its security implications.
Kong, Adams Wai-Kin
2013-03-01
IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.
Region of interest based robust watermarking scheme for adaptation in small displays
NASA Astrophysics Data System (ADS)
Vivekanandhan, Sapthagirivasan; K. B., Kishore Mohan; Vemula, Krishna Manohar
2010-02-01
Now-a-days Multimedia data can be easily replicated and the copyright is not legally protected. Cryptography does not allow the use of digital data in its original form and once the data is decrypted, it is no longer protected. Here we have proposed a new double protected digital image watermarking algorithm, which can embed the watermark image blocks into the adjacent regions of the host image itself based on their blocks similarity coefficient which is robust to various noise effects like Poisson noise, Gaussian noise, Random noise and thereby provide double security from various noises and hackers. As instrumentation application requires a much accurate data, the watermark image which is to be extracted back from the watermarked image must be immune to various noise effects. Our results provide better extracted image compared to the present/existing techniques and in addition we have done resizing the same for various displays. Adaptive resizing for various size displays is being experimented wherein we crop the required information in a frame, zoom it for a large display or resize for a small display using a threshold value and in either cases background is not given much importance but it is only the fore-sight object which gains importance which will surely be helpful in performing surgeries.
NASA Astrophysics Data System (ADS)
Jacak, Monika; Jacak, Janusz; Jóźwiak, Piotr; Jóźwiak, Ireneusz
2016-06-01
The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.
NASA Astrophysics Data System (ADS)
Scharf, Andreas; Amrouch, Khalid; Mattern, Frank
2016-04-01
Field observations, including oolite-, styolite, fracture analyses combined with laboratory measurements using calcite twin analysis show a ductile-to-brittle multiple-phase deformation history of the Arabian carbonate platform, ranging from Late Cretaceous to Neogene times. The Arabian carbonate platform, belonging to a passive continental margin since the Late Permian, was the site of the obduction of Tethyan oceanic lithosphere (Semail Ophiolite) during the Late Cretaceous, caused by the northward drift of Africa (Hanna, 1995). After or during the obduction, large parts of the entire nape pile composed of the Arabian platform and the Hawasina/Semail nappes, where folded and exhumed. This led to the exhumation of the Jabal Akhdar Dome. Our oolite samples from the Jabal Akhdar Dome and from below the ophiolite thrust reveal the strain ellipsoid related to the obduction. This strain ellipsoid shows components of pure and simple shear. In the latter case the longest axes of the strain ellipsoid are parallelly oriented to the direction of obduction (NE to SW), which is in good agreement with the direction of obduction as depicted by Hacker et al. (1996) for the study area. The pure-shear component (flattening) is interpreted to be a result of the overburden of the up to 7 km thick oceanic lithosphere. The oolites that are located approximately 200 m below the ophiolite thrust contact provide evidence for ductile deformation during the Late Cretaceous. These results are compared with strain and stress tensors obtained from styolites, calcite twins and fracture analyses, derived from the uppermost part of the Arabian platform of the Jabal Akhdar Dome. Our results show a complex and detailed structural deformation of the post-obduction history of the Jabal Akhdar Dome, including its folding and exhumation. Hanna, S. (1995) Field guide to the Geology of Oman. Ruwi (Historical Association of Oman. 178 pp. Hacker, B.R., Mosenfelder, J.L. & Gnos, E. (1996) Rapid emplacement of the Oman ophiolite: Thermal and geochronological constraints. Tectonics, 15(6), 1230-1247.
Application of Ethics for Providing Telemedicine Services and Information Technology.
Langarizadeh, Mostafa; Moghbeli, Fatemeh; Aliabadi, Ali
2017-10-01
Advanced technology has increased the use of telemedicine and Information Technology (IT) in treating or rehabilitating diseases. An increased use of technology increases the importance of the ethical issues involved. The need for keeping patients' information confidential and secure, controlling a number of therapists' inefficiency as well as raising the quality of healthcare services necessitates adequate heed to ethical issues in telemedicine provision. The goal of this review is gathering all articles that are published through 5 years until now (2012-2017) for detecting ethical issues for providing telemedicine services and Information technology. The reason of this time is improvement of telemedicine and technology through these years. This article is important for clinical practice and also to world, because of knowing ethical issues in telemedicine and technology are always important factors for physician and health providers. the required data in this research were derived from published electronic sources and credible academic articles published in such databases as PubMed, Scopus and Science Direct. The following key words were searched for in separation and combination: tele-health, telemedicine, ethical issues in telemedicine. A total of 503 articles were found. After excluding the duplicates (n= 93), the titles and abstracts of 410 articles were skimmed according to the inclusion criteria. Finally, 64 articles remained. They were reviewed in full text and 36 articles were excluded. At the end, 28 articles were chosen which met our eligibility criteria and were included in this study. Ethics has been of a great significance in IT and telemedicine especially the Internet since there are more chances provided for accessing information. It is, however, accompanied by a threat to patients' personal information. Therefore, suggestions are made to investigate ethics in technology, to offer standards and guidelines to therapists. Due to the advancement in technology, access to information has become simpler than the past. This has prompted hackers to seize the opportunity. This research shows that the ethical issues in telemedicine can be investigated from several aspects like technology, doctor-patient relationship, data confidentiality and security, informed consent, patient's and family's satisfaction with telemedicine services. Following ethical issues in telemedicine is a primary aspect of high quality services. In other words, if therapists abide by ethical rules, they can provide better services for patients. Attention to ethical issues in telemedicine guarantees a safer use of the services.
The ethics of research using electronic mail discussion groups.
Kralik, Debbie; Warren, Jim; Price, Kay; Koch, Tina; Pignone, Gino
2005-12-01
The aim of this paper is to identify and discuss the ethical considerations that have confronted and challenged the research team when researchers facilitate conversations using private electronic mail discussion lists. The use of electronic mail group conversations, as a collaborative data generation method, remains underdeveloped in nursing. Ethical challenges associated with this approach to data generation have only begun to be considered. As receipt of ethics approval for a study titled; 'Describing transition with people who live with chronic illness' we have been challenged by many ethical dilemmas, hence we believe it is timely to share the issues that have confronted the research team. These discussions are essential so we can understand the possibilities for research interaction, communication, and collaboration made possible by advanced information technologies. Our experiences in this study have increased our awareness for ongoing ethical discussions about privacy, confidentiality, consent, accountability and openness underpinning research with human participants when generating data using an electronic mail discussion group. We describe how we work at upholding these ethical principles focusing on informed consent, participant confidentiality and privacy, the participants as threats to themselves and one another, public-private confusion, employees with access, hackers and threats from the researchers. A variety of complex issues arise during cyberspace research that can make the application of traditional ethical standards troublesome. Communication in cyberspace alters the temporal, spatial and sensory components of human interaction, thereby challenging traditional ethical definitions and calling to question some basic assumptions about identity and ones right to keep aspects of it confidential. Nurse researchers are bound by human research ethics protocols; however, the nature of research by electronic mail generates moral issues as well as ethical concerns. Vigilance by researchers is required to ensure that data are viewed within the scope of the enabling ethics approval.
Secure vendor environment (SVE) for PACS
NASA Astrophysics Data System (ADS)
Honeyman-Buck, Janice; Frost, Meryll
2005-04-01
A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but vendors of image producing modalities such as CT, MRI, and CR typically do not protect their equipment from network intrusion. Most vendors use the same user-ids and passwords for their service and administrative accounts which makes it easy for them to get to their systems for remote repairs and upgrades, but also makes it easy for hackers and other unwelcome intruders to gain access. We use a device with two network interface cards to isolate the vendor network from the main PACS / university / hospital network. This device is a store and forward PACS routing device, a DICOM repair device, a modality worklist proxy device, and a de-facto firewall. This device is named an Application Processor (AP). In addition, a small virtual private network (VPN) device is placed on the system that can be controlled only by the PACS administration. If a vendor engineer needs remote access to upgrade or service the equipment, a temporary connection is enabled for only the computer the engineer is using at the time, then is closed when he/she has completed their work. Results: The secure vendor environment (SVE) consists of a computer and a VPN appliance and costs approximately 2,000 USD to build. With software, the total system costs approximately 2800 - $3500. The SVE is typically deployed as part of every equipment installation. Since the SVE has been used, we have had no intrusion and no downtime due to hackers, viruses, worms, etc. This is now a part of every project plan for equipment that will become part of the PACS. New work: The SVE is a unique and new work by our group, developed as a solution totally within our group. Conclusions: Our results have convinced our administration that this small cost to protect vendor equipment is well worth the investment. Prior to developing this solution, there were numerous occasions where intruders invaded our equipment and rendered it unusable until the software could be reloaded, sometimes resulting in the loss of a day or more of clinical use.
ERIC Educational Resources Information Center
Paisley, William; Butler, Matilda
This study of the computer/user interface investigated the role of the computer in performing information tasks that users now perform without computer assistance. Users' perceptual/cognitive processes are to be accelerated or augmented by the computer; a long term goal is to delegate information tasks entirely to the computer. Cybernetic and…
Ogawa, K
1992-01-01
This paper proposes a new evaluation and prediction method for computer usability. This method is based on our two previously proposed information transmission measures created from a human-to-computer information transmission model. The model has three information transmission levels: the device, software, and task content levels. Two measures, called the device independent information measure (DI) and the computer independent information measure (CI), defined on the software and task content levels respectively, are given as the amount of information transmitted. Two information transmission rates are defined as DI/T and CI/T, where T is the task completion time: the device independent information transmission rate (RDI), and the computer independent information transmission rate (RCI). The method utilizes the RDI and RCI rates to evaluate relatively the usability of software and device operations on different computer systems. Experiments using three different systems, in this case a graphical information input task, confirm that the method offers an efficient way of determining computer usability.
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
Nipah virus matrix protein: expert hacker of cellular machines.
Watkinson, Ruth E; Lee, Benhur
2016-08-01
Nipah virus (NiV, Henipavirus) is a highly lethal emergent zoonotic paramyxovirus responsible for repeated human outbreaks of encephalitis in South East Asia. There are no approved vaccines or treatments, thus improved understanding of NiV biology is imperative. NiV matrix protein recruits a plethora of cellular machinery to scaffold and coordinate virion budding. Intriguingly, matrix also hijacks cellular trafficking and ubiquitination pathways to facilitate transient nuclear localization. While the biological significance of matrix nuclear localization for an otherwise cytoplasmic virus remains enigmatic, the molecular details have begun to be characterized, and are conserved among matrix proteins from divergent paramyxoviruses. Matrix protein appropriation of cellular machinery will be discussed in terms of its early nuclear targeting and later role in virion assembly. © 2016 Federation of European Biochemical Societies.
NASA Astrophysics Data System (ADS)
Gerya, Taras
2014-05-01
On the one hand, the principle of lithostatic pressure is habitually used in metamorphic geology to calculate paleo-depths of metamorphism from mineralogical pressure estimates given by geobarometry. On the other hand, it is obvious that this lithostatic (hydrostatic) pressure principle should only be valid for an ideal case of negligible deviatoric stresses during the long-term development of the entire tectono-metamorphic system - the situation, which newer comes to existence in natural lithospheric processes. The question is therefore not "Do non-lithostatic pressure variations exist?" but " What is the magnitude of long-term non-lithostatic pressure variations in various lithospheric processes, which can be recorded by mineral equilibria of respective metamorphic rocks?". The later question is, in particular, relevant for various types of high-pressure (HP) and ultrahigh-pressure (UHP) rocks, which are often produced in convergent plate boundary settings (e.g., Hacker and Gerya, 2013). This question, can, in particular, be answered with the use of thermo-mechanical models of subduction/collision processes employing realistic P-T-stress-dependent visco-elasto-brittle/plastic rheology of rocks. These models suggest that magnitudes of pressure deviations from lithostatic values can range >50% underpressure to >100% overpressure, mainly in the regions of bending of rheologically strong mantle lithosphere (Burg and Gerya, 2005; Li et al., 2010). In particular, strong undepresures along normal faults forming within outer rise regions of subducting plates can be responsible for downward water suction and deep hydration of oceanic slabs (Faccenda et al., 2009). Weaker HP and UHP rocks of subduction/collision channels are typically subjected to lesser non-lithostatic pressure variations with characteristic magnitudes ranging within 10-20% from the lithostatic values (Burg and Gerya, 2005; Li et al., 2010). The strength of subducted crustal rocks and the degree of confinement of the subduction/collision channel are the key factors controlling this magnitude (Burg and Gerya, 2005; Li et al., 2010). High-temperature (>700 C) UHP rocks formed by continental crust subduction typically demonstrate negligible non-lithostatic pressure variations at peak metamorphic conditions, although these variations can be larger at the prograde stage (Gerya et al., 2008; Li et al., 2010). However, the variability of tectonic mechanisms by which UHP rocks can form (e.g., Sizova et al., 2012; Hacker and Gerya, 2013) precludes generalization of this result for all types of UHP-complexes. References Burg, J.-P., Gerya, T.V. (2005) Viscous heating and thermal doming in orogenic metamorphism: numerical modeling and geological implications. J. Metamorph. Geol., 23, 75-95. Faccenda, M., Gerya, T.V., Burlini, L. (2009) Deep slab hydration induced by bending related variations in tectonic pressure. Nature Geoscience, 2, 790-793. Gerya T.V., Perchuk, L.L., Burg J.-P. (2008) Transient hot channels: perpetrating and regurgitating ultrahigh-pressure, high temperature crust-mantle associations in collision belts. Lithos, 103, 236-256. Hacker, B., Gerya, T.V. (2013) Paradigms, new and old, for ultrahigh-pressure tectonism. Tectonophysics, 603, 79-88. Li, Z., Gerya, T.V., Burg, J.P. (2010) Influence of tectonic overpressure on P-T paths of HP-UHP rocks in continental collision zones: Thermomechanical modelling. J. Metamorphic Geol., 28, 227-247. Sizova, E., Gerya, T., Brown M. (2012) Exhumation mechanisms of melt-bearing ultrahigh pressure crustal rocks during collision of spontaneously moving plates. Journal of Metamorphic Geology, 30, 927-955.
2010-07-01
Cloud computing , an emerging form of computing in which users have access to scalable, on-demand capabilities that are provided through Internet... cloud computing , (2) the information security implications of using cloud computing services in the Federal Government, and (3) federal guidance and...efforts to address information security when using cloud computing . The complete report is titled Information Security: Federal Guidance Needed to
NASA Astrophysics Data System (ADS)
Shiina, T.; Nakajima, J.; Toyokuni, G.; Kita, S.; Matsuzawa, T.
2014-12-01
A subducting crust contains a large amount of water as a form of hydrous minerals (e.g., Hacker et al., 2003), and the crust plays important roles for water transportation and seismogenesis in subduction zones at intermediate depths (e.g., Kirby et al., 1996; Iwamori, 2007). Therefore, the investigation of seismic structure in the crust is important to understand ongoing physical processes with subduction of oceanic lithosphere. A guided wave which propagates in the subducting crust is recorded in seismograms at Hokkaido, northern Japan (Shiina et al., 2014). Here, we estimated P- and S-wave velocity in the crust with guided waves, and obtained P-wave velocity of 6.6-7.3 km/s and S-wave velocity of 3.6-4.2 km/s at depths of 50-90 km. Moreover, Vp/Vs ratio in the crust is calculated to be 1.80-1.85 in that depth range. The obtained P-wave velocity about 6.6km/s at depths of 50-70 km is consistent with those estimated in Tohoku, northeast Japan (Shiina et al., 2013), and this the P-wave velocity is lower than those expected from models of subducting crustal compositions, such as metamorphosed MORB model (Hacker et al., 2003). In contrast, at greater depths (>80 km), the P-wave velocity marks higher velocity than the case of NE Japan and the velocity is roughly comparable to those of the MORB model. The obtained S-wave velocity distribution also shows characteristics similar to P waves. This regional variation may be caused by a small variation in thermal regime of the Pacific slab beneath the two regions as a result of the normal subduction in Tohoku and oblique subduction in Hokkaido. In addition, the effect of seismic anisotropy in the subducting crust would not be ruled out because rays used in the analysis in Hokkaido propagate mostly in the trench-parallel direction, while those in Tohoku are sufficiently criss-crossed.
Feasibility of Executing MIMS on Interdata 80.
CDC 6500 computers, CDC 6600 computers, MIMS(Medical Information Management System ), Medical information management system , File structures, Computer...storage managementThe report examines the feasibility of implementing large information management system on mini-computers. The Medical Information ... Management System and the Interdata 80 mini-computer were selected as being representative systems. The FORTRAN programs currently being used in MIMS
Randomised trial of personalised computer based information for cancer patients
Jones, Ray; Pearson, Janne; McGregor, Sandra; Cawsey, Alison J; Barrett, Ann; Craig, Neil; Atkinson, Jacqueline M; Gilmour, W Harper; McEwen, Jim
1999-01-01
Objective To compare the use and effect of a computer based information system for cancer patients that is personalised using each patient's medical record with a system providing only general information and with information provided in booklets. Design Randomised trial with three groups. Data collected at start of radiotherapy, one week later (when information provided), three weeks later, and three months later. Participants 525 patients started radical radiotherapy; 438 completed follow up. Interventions Two groups were offered information via computer (personalised or general information, or both) with open access to computer thereafter; the third group was offered a selection of information booklets. Outcomes Patients' views and preferences, use of computer and information, and psychological status; doctors' perceptions; cost of interventions. Results More patients offered the personalised information said that they had learnt something new, thought the information was relevant, used the computer again, and showed their computer printouts to others. There were no major differences in doctors' perceptions of patients. More of the general computer group were anxious at three months. With an electronic patient record system, in the long run the personalised information system would cost no more than the general system. Full access to booklets cost twice as much as the general system. Conclusions Patients preferred computer systems that provided information from their medical records to systems that just provided general information. This has implications for the design and implementation of electronic patient record systems and reliance on general sources of patient information. PMID:10550090
Information processing, computation, and cognition.
Piccinini, Gualtiero; Scarantino, Andrea
2011-01-01
Computation and information processing are among the most fundamental notions in cognitive science. They are also among the most imprecisely discussed. Many cognitive scientists take it for granted that cognition involves computation, information processing, or both - although others disagree vehemently. Yet different cognitive scientists use 'computation' and 'information processing' to mean different things, sometimes without realizing that they do. In addition, computation and information processing are surrounded by several myths; first and foremost, that they are the same thing. In this paper, we address this unsatisfactory state of affairs by presenting a general and theory-neutral account of computation and information processing. We also apply our framework by analyzing the relations between computation and information processing on one hand and classicism, connectionism, and computational neuroscience on the other. We defend the relevance to cognitive science of both computation, at least in a generic sense, and information processing, in three important senses of the term. Our account advances several foundational debates in cognitive science by untangling some of their conceptual knots in a theory-neutral way. By leveling the playing field, we pave the way for the future resolution of the debates' empirical aspects.
Using computers for planning and evaluating nursing in the health care services.
Emuziene, Vilma
2009-01-01
This paper describes that the nurses attitudes, using and motivation towards the computer usage significantly influenced by area of nursing/health care service. Today most of the nurses traditionally document patient information in a medical record using pen and paper. Most nursing administrators not currently involved with computer applications in their settings are interested in exploring whether technology could help them with the day-to-day and long - range tasks of planning and evaluating nursing services. The results of this investigation showed that respondents (nurses), as specialists and nursing informatics, make their activity well: they had "positive" attitude towards computers and "good" or "average" computer skills. The nurses overall computer attitude did influence by the age of the nurses, by sex, by professional qualification. Younger nurses acquire informatics skills while in nursing school and are more accepting of computer advancements. The knowledge about computer among nurses who don't have any training in computers' significantly differs, who have training and using the computer once a week or everyday. In the health care services often are using the computers and the automated data systems, data for the statistical information (visit information, patient information) and billing information. In nursing field often automated data systems are using for statistical information, billing information, information about the vaccination, patient assessment and patient classification.
Cyber Incidents Involving Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Robert J. Turk
2005-10-01
The Analysis Function of the US-CERT Control Systems Security Center (CSSC) at the Idaho National Laboratory (INL) has prepared this report to document cyber security incidents for use by the CSSC. The description and analysis of incidents reported herein support three CSSC tasks: establishing a business case; increasing security awareness and private and corporate participation related to enhanced cyber security of control systems; and providing informational material to support model development and prioritize activities for CSSC. The stated mission of CSSC is to reduce vulnerability of critical infrastructure to cyber attack on control systems. As stated in the Incident Managementmore » Tool Requirements (August 2005) ''Vulnerability reduction is promoted by risk analysis that tracks actual risk, emphasizes high risk, determines risk reduction as a function of countermeasures, tracks increase of risk due to external influence, and measures success of the vulnerability reduction program''. Process control and Supervisory Control and Data Acquisition (SCADA) systems, with their reliance on proprietary networks and hardware, have long been considered immune to the network attacks that have wreaked so much havoc on corporate information systems. New research indicates this confidence is misplaced--the move to open standards such as Ethernet, Transmission Control Protocol/Internet Protocol, and Web technologies is allowing hackers to take advantage of the control industry's unawareness. Much of the available information about cyber incidents represents a characterization as opposed to an analysis of events. The lack of good analyses reflects an overall weakness in reporting requirements as well as the fact that to date there have been very few serious cyber attacks on control systems. Most companies prefer not to share cyber attack incident data because of potential financial repercussions. Uniform reporting requirements will do much to make this information available to Department of Homeland Security (DHS) and others who require it. This report summarizes the rise in frequency of cyber attacks, describes the perpetrators, and identifies the means of attack. This type of analysis, when used in conjunction with vulnerability analyses, can be used to support a proactive approach to prevent cyber attacks. CSSC will use this document to evolve a standardized approach to incident reporting and analysis. This document will be updated as needed to record additional event analyses and insights regarding incident reporting. This report represents 120 cyber security incidents documented in a number of sources, including: the British Columbia Institute of Technology (BCIT) Industrial Security Incident Database, the 2003 CSI/FBI Computer Crime and Security Survey, the KEMA, Inc., Database, Lawrence Livermore National Laboratory, the Energy Incident Database, the INL Cyber Incident Database, and other open-source data. The National Memorial Institute for the Prevention of Terrorism (MIPT) database was also interrogated but, interestingly, failed to yield any cyber attack incidents. The results of this evaluation indicate that historical evidence provides insight into control system related incidents or failures; however, that the limited available information provides little support to future risk estimates. The documented case history shows that activity has increased significantly since 1988. The majority of incidents come from the Internet by way of opportunistic viruses, Trojans, and worms, but a surprisingly large number are directed acts of sabotage. A substantial number of confirmed, unconfirmed, and potential events that directly or potentially impact control systems worldwide are also identified. Twelve selected cyber incidents are presented at the end of this report as examples of the documented case studies (see Appendix B).« less
ERIC Educational Resources Information Center
Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.
This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…
Ultrafine particles from power plants: Evaluation of WRF-Chem simulations with airborne measurements
NASA Astrophysics Data System (ADS)
Forkel, Renate; Junkermann, Wolfgang
2017-04-01
Ultrafine particles (UFP, particles with a diameter < 100 nm) are an acknowledged risk to human health and have a potential effect on climate as their presence affects the number concentration of cloud condensation nuclei. Despite of the possibly hazardous effects no regulations exist for this size class of ambient air pollution particles. While ground based continuous measurements of UFP are performed in Germany at several sites (e.g. the German Ultrafine Aerosol Network GUAN, Birmili et al. 2016, doi:10.5194/essd-8-355-2016) information about the vertical distribution of UFP within the atmospheric boundary layer is only scarce. This gap has been closed during the last years by regional-scale airborne surveys for UFP concentrations and size distributions over Germany (Junkermann et al., 2016, doi: 10.3402/tellusb.v68.29250) and Australia (Junkermann and Hacker, 2015, doi: 10.3402/tellusb.v67.25308). Power stations and refineries have been identified as a major source of UFP in Germany with observed particle concentrations > 50000 particles cm-3 downwind of these elevated point sources. Nested WRF-Chem simulations with 2 km grid width for the innermost domain are performed with UFP emission source strengths derived from the measurements in order to study the advection and vertical exchange of UFP from power plants near the Czech and Polish border and their impact on planetary boundary layer particle patterns. The simulations are evaluated against the airborne observations and the downward mixing of the UFP from the elevated sources is studied.
Code of Federal Regulations, 2013 CFR
2013-01-01
... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...
Code of Federal Regulations, 2012 CFR
2012-01-01
... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...
Code of Federal Regulations, 2014 CFR
2014-01-01
... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...
Code of Federal Regulations, 2011 CFR
2011-01-01
... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...
Code of Federal Regulations, 2010 CFR
2010-01-01
... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...
Breaking into the epithelial apical–junctional complex — news from pathogen hackers
Vogelmann, Roger; Amieva, Manuel R; Falkow, Stanley; Nelson, W James
2012-01-01
The epithelial apical–junctional complex is a key regulator of cellular functions. In addition, it is an important target for microbial pathogens that manipulate the cell to survive, proliferate and sometimes persist within a host. Out of a myriad of potential molecular targets, some bacterial and viral pathogens have selected a subset of protein targets at the apical–junctional complex of epithelial cells. Studying how microbes use these targets also teaches us about the inherent physiological properties of host molecules in the context of normal junctional structure and function. Thus, we have learned that three recently uncovered components of the apical–junctional complex of the Ig superfamily — junctional adhesion molecule, Nectin and the coxsackievirus and adenovirus receptor — are important regulators of junction structure and function and represent critical targets of microbial virulence gene products. PMID:15037310
Breaking into the epithelial apical-junctional complex--news from pathogen hackers.
Vogelmann, Roger; Amieva, Manuel R; Falkow, Stanley; Nelson, W James
2004-02-01
The epithelial apical-junctional complex is a key regulator of cellular functions. In addition, it is an important target for microbial pathogens that manipulate the cell to survive, proliferate and sometimes persist within a host. Out of a myriad of potential molecular targets, some bacterial and viral pathogens have selected a subset of protein targets at the apical-junctional complex of epithelial cells. Studying how microbes use these targets also teaches us about the inherent physiological properties of host molecules in the context of normal junctional structure and function. Thus, we have learned that three recently uncovered components of the apical-junctional complex of the Ig superfamily--junctional adhesion molecule, Nectin and the coxsackievirus and adenovirus receptor--are important regulators of junction structure and function and represent critical targets of microbial virulence gene products.
Application of Ethics for Providing Telemedicine Services and Information Technology
Langarizadeh, Mostafa; Moghbeli, Fatemeh; Aliabadi, Ali
2017-01-01
Introduction: Advanced technology has increased the use of telemedicine and Information Technology (IT) in treating or rehabilitating diseases. An increased use of technology increases the importance of the ethical issues involved. The need for keeping patients’ information confidential and secure, controlling a number of therapists’ inefficiency as well as raising the quality of healthcare services necessitates adequate heed to ethical issues in telemedicine provision. Aim: The goal of this review is gathering all articles that are published through 5 years until now (2012-2017) for detecting ethical issues for providing telemedicine services and Information technology. The reason of this time is improvement of telemedicine and technology through these years. This article is important for clinical practice and also to world, because of knowing ethical issues in telemedicine and technology are always important factors for physician and health providers. Material and methods: the required data in this research were derived from published electronic sources and credible academic articles published in such databases as PubMed, Scopus and Science Direct. The following key words were searched for in separation and combination: tele-health, telemedicine, ethical issues in telemedicine. A total of 503 articles were found. After excluding the duplicates (n= 93), the titles and abstracts of 410 articles were skimmed according to the inclusion criteria. Finally, 64 articles remained. They were reviewed in full text and 36 articles were excluded. At the end, 28 articles were chosen which met our eligibility criteria and were included in this study. Results: Ethics has been of a great significance in IT and telemedicine especially the Internet since there are more chances provided for accessing information. It is, however, accompanied by a threat to patients’ personal information. Therefore, suggestions are made to investigate ethics in technology, to offer standards and guidelines to therapists. Due to the advancement in technology, access to information has become simpler than the past. This has prompted hackers to seize the opportunity. Discussion: This research shows that the ethical issues in telemedicine can be investigated from several aspects like technology, doctor-patient relationship, data confidentiality and security, informed consent, patient’s and family’s satisfaction with telemedicine services. Following ethical issues in telemedicine is a primary aspect of high quality services. In other words, if therapists abide by ethical rules, they can provide better services for patients. Attention to ethical issues in telemedicine guarantees a safer use of the services. PMID:29284905
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2015-06-16
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.
Traffic information computing platform for big data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Duan, Zongtao, E-mail: ztduan@chd.edu.cn; Li, Ying, E-mail: ztduan@chd.edu.cn; Zheng, Xibin, E-mail: ztduan@chd.edu.cn
Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.
Eley, Robert; Fallon, Tony; Soar, Jeffrey; Buikstra, Elizabeth; Hegney, Desley
2008-10-01
A study was undertaken of the current knowledge and future training requirements of nurses in information and computer technology to inform policy to meet national goals for health. The role of the modern clinical nurse is intertwined with information and computer technology and adoption of such technology forms an important component of national strategies in health. The majority of nurses are expected to use information and computer technology during their work; however, the full extent of their knowledge and experience is unclear. Self-administered postal survey. A 78-item questionnaire was distributed to 10,000 Australian Nursing Federation members to identify the nurses' use of information and computer technology. Eighteen items related to nurses' training and education in information and computer technology. Response rate was 44%. Computers were used by 86.3% of respondents as part of their work-related activities. Between 4-17% of nurses had received training in each of 11 generic computer skills and software applications during their preregistration/pre-enrolment and between 12-30% as continuing professional education. Nurses who had received training believed that it was adequate to meet the needs of their job and was given at an appropriate time. Almost half of the respondents indicated that they required more training to better meet the information and computer technology requirements of their jobs and a quarter believed that their level of computer literacy was restricting their career development. Nurses considered that the vast majority of employers did not encourage information and computer technology training and, for those for whom training was available, workload was the major barrier to uptake. Nurses favoured introduction of a national competency standard in information and computer technology. For the considerable benefits of information and computer technology to be incorporated fully into the health system, employers must pay more attention to the training and education of nurses who are the largest users of that technology. Knowledge of the training and education needs of clinical nurses with respect to information and computer technology will provide a platform for the development of appropriate policies by government and by employers.
ERIC Educational Resources Information Center
Selig, Judith A.; And Others
This report, summarizing the activities of the Vision Information Center (VIC) in the field of computer-assisted instruction from December, 1966 to August, 1967, describes the methodology used to load a large body of information--a programed text on basic opthalmology--onto a computer for subsequent information retrieval and computer-assisted…
ERIC Educational Resources Information Center
Gerick, Julia; Eickelmann, Birgit; Bos, Wilfried
2017-01-01
The "International Computer and Information Literacy Study" (ICILS 2013) provides, for the first time, information about students' computer and information literacy (CIL), as well as its acquisition, based on a computer-based test for students and background questionnaires. Among the 21 education systems that participated in ICILS 2013,…
A Study of the Programming Languages Used in Information Systems and in Computer Science Curricula
ERIC Educational Resources Information Center
Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.
2010-01-01
This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…
Gauging Information and Computer Skills for Curriculum Planning
ERIC Educational Resources Information Center
Krueger, Janice M.; Ha, YooJin
2012-01-01
Background: All types of librarians are expected to possess information and computer skills to actively assist patrons in accessing information and in recognizing reputable sources. Mastery of information and computer skills is a high priority for library and information science programs since graduate students have varied multidisciplinary…
Chhanabhai, Prajesh; Holt, Alec
2007-01-01
Background Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. Objective To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. Methods A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. Results A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. Conclusions The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated.The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for “cradle to the grave” treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system. PMID:17435617
Chhanabhai, Prajesh; Holt, Alec
2007-01-11
Healthcare has entered the electronic domain. This domain has improved data collection and storage abilities while allowing almost instantaneous access and results to data queries. Furthermore, it allows direct communication between healthcare providers and health consumers. The development of privacy, confidentiality, and security principles are necessary to protect consumers' interests against inappropriate access. Studies have shown that the health consumer is the important stakeholder in this process. With the international push toward electronic health records (EHRs), this article presents the importance of secure EHR systems from the public's perspective. To examine the public's perception of the security of electronic systems and report on how their perceptions can shape the building of stronger systems. A cross-sectional survey (September-November 2005) of people attending healthcare providers (n = 400) was conducted in the 4 major cities in New Zealand. Participants were surveyed on computer use, knowledge of EHR-proposed benefits and issues, security issues, and demographics. A total of 300 surveys were completed and returned (a 75% response rate), with 180 (60%) being women. One hundred eighty-eight (62.6%) had not heard of EHRs, with those who had heard of them indicating that they were a positive innovation in the health sector. However, 202 (73.3%) participants were highly concerned about the security and privacy of their health records. This feeling was further accentuated when participants were asked about security of electronic systems. Participants were worried about hackers (79.4%), vendor access (72.7%), and malicious software (68%). Participants were also introduced to various security systems, and in each case, over 80% of participants believed that these would make EHR systems more secure. A number of chi-square tests were carried out with each variable, and it was found that there were strong relationships between age, location, computer use, EHR knowledge, and the concern for privacy and the security of medical records (P < .05). The survey also showed that there was a very small difference (9.8%) between health consumers who believed that paper records are more secure than EHRs and those who believed otherwise. The findings showed that for the EHR to be fully integrating in the health sector, there are 2 main issues that need to be addressed: The security of the EHR system has to be of the highest level, and needs to be constantly monitored and updated. The involvement of the health consumer in the ownership and maintenance of their health record needs to be more proactive. The EHR aims to collect information to allow for "cradle to the grave" treatment; thus, the health consumer has to be seen as a major player in ensuring that this can happen correctly. The results from this study indicated that the consumer is ready to accept the transition, as long as one can be assured of the security of the system.
Information-seeking behavior and computer literacy among resident doctors in Maiduguri, Nigeria.
Abbas, A D; Abubakar, A M; Omeiza, B; Minoza, K
2013-01-01
Resident doctors are key actors in patient management in all the federal training institutions in nigeria. Knowing the information-seeking behavior of this group of doctors and their level of computer knowledge would facilitate informed decision in providing them with the relevant sources of information as well as encouraging the practice of evidence-based medicine. This is to examine information-seeking behavior among resident doctors and analyze its relationship to computer ownership and literacy. A pretested self-administered questionnaire was used to obtain information from the resident doctors in the University of Maiduguri Teaching Hospital (UMTH) and the Federal Neuro-Psychiatry Hospital (FNPH). The data fields requested included the biodata, major source of medical information, level of computer literacy, and computer ownership. Other questions included were their familiarity with basic computer operations as well as versatility on the use of the Internet and possession of an active e-mail address. Out of 109 questionnaires distributed 100 were returned (91.7% response rate). Seventy three of the 100 respondents use printed material as their major source of medical information. Ninety three of the respondents own a laptop, a desktop or both, while 7 have no computers. Ninety-four respondents are computer literate while 6 are computer illiterates. Seventy-five respondents have an e-mail address while 25 do not have e-mail address. Seventy-five search the Internet for information while 25 do not know how to use the Internet. Despite the high computer ownership and literacy rate among resident doctors, the printed material remains their main source of medical information.
18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.
Code of Federal Regulations, 2014 CFR
2014-04-01
... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...
18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.
Code of Federal Regulations, 2011 CFR
2011-04-01
... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...
18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.
Code of Federal Regulations, 2012 CFR
2012-04-01
... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...
18 CFR 3b.204 - Safeguarding information in manual and computer-based record systems.
Code of Federal Regulations, 2013 CFR
2013-04-01
... information in manual and computer-based record systems. 3b.204 Section 3b.204 Conservation of Power and Water... Collection of Records § 3b.204 Safeguarding information in manual and computer-based record systems. (a) The administrative and physical controls to protect the information in the manual and computer-based record systems...
Information processing, computation, and cognition
Scarantino, Andrea
2010-01-01
Computation and information processing are among the most fundamental notions in cognitive science. They are also among the most imprecisely discussed. Many cognitive scientists take it for granted that cognition involves computation, information processing, or both – although others disagree vehemently. Yet different cognitive scientists use ‘computation’ and ‘information processing’ to mean different things, sometimes without realizing that they do. In addition, computation and information processing are surrounded by several myths; first and foremost, that they are the same thing. In this paper, we address this unsatisfactory state of affairs by presenting a general and theory-neutral account of computation and information processing. We also apply our framework by analyzing the relations between computation and information processing on one hand and classicism, connectionism, and computational neuroscience on the other. We defend the relevance to cognitive science of both computation, at least in a generic sense, and information processing, in three important senses of the term. Our account advances several foundational debates in cognitive science by untangling some of their conceptual knots in a theory-neutral way. By leveling the playing field, we pave the way for the future resolution of the debates’ empirical aspects. PMID:22210958
Proposal for a Security Management in Cloud Computing for Health Care
Dzombeta, Srdan; Brandis, Knud
2014-01-01
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources. PMID:24701137
Proposal for a security management in cloud computing for health care.
Haufe, Knut; Dzombeta, Srdan; Brandis, Knud
2014-01-01
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processes regarding cloud computing in the health care sector. Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. The identified processes will help a health care organization using cloud computing to focus on the most important ISMS processes and establish and operate them at an appropriate level of maturity considering limited resources.
AGIS: Integration of new technologies used in ATLAS Distributed Computing
NASA Astrophysics Data System (ADS)
Anisenkov, Alexey; Di Girolamo, Alessandro; Alandes Pradillo, Maria
2017-10-01
The variety of the ATLAS Distributed Computing infrastructure requires a central information system to define the topology of computing resources and to store different parameters and configuration data which are needed by various ATLAS software components. The ATLAS Grid Information System (AGIS) is the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services. Being an intermediate middleware system between clients and external information sources (like central BDII, GOCDB, MyOSG), AGIS defines the relations between experiment specific used resources and physical distributed computing capabilities. Being in production during LHC Runl AGIS became the central information system for Distributed Computing in ATLAS and it is continuously evolving to fulfil new user requests, enable enhanced operations and follow the extension of the ATLAS Computing model. The ATLAS Computing model and data structures used by Distributed Computing applications and services are continuously evolving and trend to fit newer requirements from ADC community. In this note, we describe the evolution and the recent developments of AGIS functionalities, related to integration of new technologies recently become widely used in ATLAS Computing, like flexible computing utilization of opportunistic Cloud and HPC resources, ObjectStore services integration for Distributed Data Management (Rucio) and ATLAS workload management (PanDA) systems, unified storage protocols declaration required for PandDA Pilot site movers and others. The improvements of information model and general updates are also shown, in particular we explain how other collaborations outside ATLAS could benefit the system as a computing resources information catalogue. AGIS is evolving towards a common information system, not coupled to a specific experiment.
NASA Astrophysics Data System (ADS)
Brown, Gail Laverne
The presence of a digital divide, computer and information technology integration effectiveness, and barriers to continued usage of computer and information technology were investigated. Thirty-four African American and Caucasian American students (17 males and 17 females) in grades 9--11 from 2 Georgia high school science classes were exposed to 30 hours of hands-on computer and information technology skills. The purpose of the exposure was to improve students' computer and information technology skills. Pre-study and post-study skills surveys, and structured interviews were used to compare race, gender, income, grade-level, and age differences with respect to computer usage. A paired t-test and McNemar test determined mean differences between student pre-study and post-study perceived skills levels. The results were consistent with findings of the National Telecommunications and Information Administration (2000) that indicated the presence of a digital divide and digital inclusion. Caucasian American participants were found to have more at-home computer and Internet access than African American participants, indicating that there is a digital divide by ethnicity. Caucasian American females were found to have more computer and Internet access which was an indication of digital inclusion. Sophomores had more at-home computer access and Internet access than other levels indicating digital inclusion. Students receiving regular meals had more computer and Internet access than students receiving free/reduced meals. Older students had more computer and Internet access than younger students. African American males had been using computer and information technology the longest which is an indication of inclusion. The paired t-test and McNemar test revealed significant perceived student increases in all skills levels. Interviews did not reveal any barriers to continued usage of the computer and information technology skills.
NASA Astrophysics Data System (ADS)
Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam
2016-08-01
Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.
Kraemer, Sara; Carayon, Pascale
2007-03-01
This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... Computer software does not include computer data bases or computer software documentation. Litigation... includes technical data and computer software, but does not include information that is lawfully, publicly available without restriction. Technical data means recorded information, regardless of the form or method...
A DDC Bibliography on Computers in Information Sciences. Volume II. Information Sciences Series.
ERIC Educational Resources Information Center
Defense Documentation Center, Alexandria, VA.
The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 239 annotated references grouped under three major headings: Artificial and Programming Languages, Computer Processing of Analog Data, and Computer Processing of Digital Data. The references…
Consolidating WLCG topology and configuration in the Computing Resource Information Catalogue
Alandes, Maria; Andreeva, Julia; Anisenkov, Alexey; ...
2017-10-01
Here, the Worldwide LHC Computing Grid infrastructure links about 200 participating computing centres affiliated with several partner projects. It is built by integrating heterogeneous computer and storage resources in diverse data centres all over the world and provides CPU and storage capacity to the LHC experiments to perform data processing and physics analysis. In order to be used by the experiments, these distributed resources should be well described, which implies easy service discovery and detailed description of service configuration. Currently this information is scattered over multiple generic information sources like GOCDB, OIM, BDII and experiment-specific information systems. Such a modelmore » does not allow to validate topology and configuration information easily. Moreover, information in various sources is not always consistent. Finally, the evolution of computing technologies introduces new challenges. Experiments are more and more relying on opportunistic resources, which by their nature are more dynamic and should also be well described in the WLCG information system. This contribution describes the new WLCG configuration service CRIC (Computing Resource Information Catalogue) which collects information from various information providers, performs validation and provides a consistent set of UIs and APIs to the LHC VOs for service discovery and usage configuration. The main requirements for CRIC are simplicity, agility and robustness. CRIC should be able to be quickly adapted to new types of computing resources, new information sources, and allow for new data structures to be implemented easily following the evolution of the computing models and operations of the experiments.« less
Consolidating WLCG topology and configuration in the Computing Resource Information Catalogue
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alandes, Maria; Andreeva, Julia; Anisenkov, Alexey
Here, the Worldwide LHC Computing Grid infrastructure links about 200 participating computing centres affiliated with several partner projects. It is built by integrating heterogeneous computer and storage resources in diverse data centres all over the world and provides CPU and storage capacity to the LHC experiments to perform data processing and physics analysis. In order to be used by the experiments, these distributed resources should be well described, which implies easy service discovery and detailed description of service configuration. Currently this information is scattered over multiple generic information sources like GOCDB, OIM, BDII and experiment-specific information systems. Such a modelmore » does not allow to validate topology and configuration information easily. Moreover, information in various sources is not always consistent. Finally, the evolution of computing technologies introduces new challenges. Experiments are more and more relying on opportunistic resources, which by their nature are more dynamic and should also be well described in the WLCG information system. This contribution describes the new WLCG configuration service CRIC (Computing Resource Information Catalogue) which collects information from various information providers, performs validation and provides a consistent set of UIs and APIs to the LHC VOs for service discovery and usage configuration. The main requirements for CRIC are simplicity, agility and robustness. CRIC should be able to be quickly adapted to new types of computing resources, new information sources, and allow for new data structures to be implemented easily following the evolution of the computing models and operations of the experiments.« less
Consolidating WLCG topology and configuration in the Computing Resource Information Catalogue
NASA Astrophysics Data System (ADS)
Alandes, Maria; Andreeva, Julia; Anisenkov, Alexey; Bagliesi, Giuseppe; Belforte, Stephano; Campana, Simone; Dimou, Maria; Flix, Jose; Forti, Alessandra; di Girolamo, A.; Karavakis, Edward; Lammel, Stephan; Litmaath, Maarten; Sciaba, Andrea; Valassi, Andrea
2017-10-01
The Worldwide LHC Computing Grid infrastructure links about 200 participating computing centres affiliated with several partner projects. It is built by integrating heterogeneous computer and storage resources in diverse data centres all over the world and provides CPU and storage capacity to the LHC experiments to perform data processing and physics analysis. In order to be used by the experiments, these distributed resources should be well described, which implies easy service discovery and detailed description of service configuration. Currently this information is scattered over multiple generic information sources like GOCDB, OIM, BDII and experiment-specific information systems. Such a model does not allow to validate topology and configuration information easily. Moreover, information in various sources is not always consistent. Finally, the evolution of computing technologies introduces new challenges. Experiments are more and more relying on opportunistic resources, which by their nature are more dynamic and should also be well described in the WLCG information system. This contribution describes the new WLCG configuration service CRIC (Computing Resource Information Catalogue) which collects information from various information providers, performs validation and provides a consistent set of UIs and APIs to the LHC VOs for service discovery and usage configuration. The main requirements for CRIC are simplicity, agility and robustness. CRIC should be able to be quickly adapted to new types of computing resources, new information sources, and allow for new data structures to be implemented easily following the evolution of the computing models and operations of the experiments.
Using genetic information while protecting the privacy of the soul.
Moor, J H
1999-01-01
Computing plays an important role in genetics (and vice versa). Theoretically, computing provides a conceptual model for the function and malfunction of our genetic machinery. Practically, contemporary computers and robots equipped with advanced algorithms make the revelation of the complete human genome imminent--computers are about to reveal our genetic souls for the first time. Ethically, computers help protect privacy by restricting access in sophisticated ways to genetic information. But the inexorable fact that computers will increasingly collect, analyze, and disseminate abundant amounts of genetic information made available through the genetic revolution, not to mention that inexpensive computing devices will make genetic information gathering easier, underscores the need for strong and immediate privacy legislation.
Delgado, Ana; Callén, Blanca
2017-02-01
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.
Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times
Delgado, Ana; Callén, Blanca
2016-01-01
In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296
Violent extremist group ecologies under stress
Cebrian, Manuel; Torres, Manuel R.; Huerta, Ramon; Fowler, James H.
2013-01-01
Violent extremist groups are currently making intensive use of Internet fora for recruitment to terrorism. These fora are under constant scrutiny by security agencies, private vigilante groups, and hackers, who sometimes shut them down with cybernetic attacks. However, there is a lack of experimental and formal understanding of the recruitment dynamics of online extremist fora and the effect of strategies to control them. Here, we utilize data on ten extremist fora that we collected for four years to develop a data-driven mathematical model that is the first attempt to measure whether (and how) these external attacks induce extremist fora to self-regulate. The results suggest that an increase in the number of groups targeted for attack causes an exponential increase in the cost of enforcement and an exponential decrease in its effectiveness. Thus, a policy to occasionally attack large groups can be very efficient for limiting violent output from these fora. PMID:23536118
Social Hackers: Integration in the Host Chemical Recognition System by a Paper Wasp Social Parasite
NASA Astrophysics Data System (ADS)
Turillazzi, S.; Sledge, M. F.; Dani, F. R.; Cervo, R.; Massolo, A.; Fondelli, L.
Obligate social parasites in the social insects have lost the worker caste and the ability to establish nests. As a result, parasites must usurp a host nest, overcome the host recognition system, and depend on the host workers to rear their offspring. We analysed cuticular hydrocarbon profiles of live parasite females of the paper wasp social parasite Polistes sulcifer before and after usurpation of host nests, using the non-destructive technique of solid-phase micro-extraction. Our results reveal that hydrocarbon profiles of parasites change after usurpation of host nests to match the cuticular profile of the host species. Chemical evidence further shows that the parasite queen changes the odour of the nest by the addition of a parasite-specific hydrocarbon. We discuss the possible role of this in the recognition and acceptance of the parasite and its offspring in the host colony.
Social hackers: integration in the host chemical recognition system by a paper wasp social parasite.
Turillazzi, S; Sledge, M F; Dani, F R; Cervo, R; Massolo, A; Fondelli, L
2000-04-01
Obligate social parasites in the social insects have lost the worker caste and the ability to establish nests. As a result, parasites must usurp a host nest, overcome the host recognition system, and depend on the host workers to rear their offspring. We analysed cuticular hydrocarbon profiles of live parasite females of the paper wasp social parasite Polistes sulcifer before and after usurpation of host nests, using the non-destructive technique of solid-phase micro-extraction. Our results reveal that hydrocarbon profiles of parasites change after usurpation of host nests to match the cuticular profile of the host species. Chemical evidence further shows that the parasite queen changes the odour of the nest by the addition of a parasite-specific hydrocarbon. We discuss the possible role of this in the recognition and acceptance of the parasite and its offspring in the host colony.
Violent extremist group ecologies under stress.
Cebrian, Manuel; Torres, Manuel R; Huerta, Ramon; Fowler, James H
2013-01-01
Violent extremist groups are currently making intensive use of Internet fora for recruitment to terrorism. These fora are under constant scrutiny by security agencies, private vigilante groups, and hackers, who sometimes shut them down with cybernetic attacks. However, there is a lack of experimental and formal understanding of the recruitment dynamics of online extremist fora and the effect of strategies to control them. Here, we utilize data on ten extremist fora that we collected for four years to develop a data-driven mathematical model that is the first attempt to measure whether (and how) these external attacks induce extremist fora to self-regulate. The results suggest that an increase in the number of groups targeted for attack causes an exponential increase in the cost of enforcement and an exponential decrease in its effectiveness. Thus, a policy to occasionally attack large groups can be very efficient for limiting violent output from these fora.
Campbell, Robert J; Durigon, Louis
2003-01-01
Increasingly, health care professionals will need to retrieve, store, share, and send data using several types of wireless devices. These devices include personal digital assistants, laptops, Web tablets, cell phones, and clothing that monitor heart rate and blood pressure. Regardless of the device, several standards will vie for the right to provide the wireless communications link between the health care professional and the wired data resources located within a health care organization. This article identifies the top three technologies in the wireless communications field: Wireless Fidelity (WiFi), Mobile Communications, and Bluetooth; breaks down each according to its strengths and weaknesses; and makes recommendations for their use by health care professionals located inside and outside a health care facility. Where appropriate the discussion includes an explication of how a specific technology can be made secure from hackers and other security breeches.
48 CFR 252.204-7012 - Safeguarding of unclassified controlled technical information.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... Cyber incident means actions taken through the use of computer networks that result in an actual or... printed within an information system. Technical information means technical data or computer software, as..., catalog-item identifications, data sets, studies and analyses and related information, and computer...
A Novel College Network Resource Management Method using Cloud Computing
NASA Astrophysics Data System (ADS)
Lin, Chen
At present information construction of college mainly has construction of college networks and management information system; there are many problems during the process of information. Cloud computing is development of distributed processing, parallel processing and grid computing, which make data stored on the cloud, make software and services placed in the cloud and build on top of various standards and protocols, you can get it through all kinds of equipments. This article introduces cloud computing and function of cloud computing, then analyzes the exiting problems of college network resource management, the cloud computing technology and methods are applied in the construction of college information sharing platform.
Defining Information Needs of Computer Users: A Human Communication Problem.
ERIC Educational Resources Information Center
Kimbrough, Kenneth L.
This exploratory investigation of the process of defining the information needs of computer users and the impact of that process on information retrieval focuses on communication problems. Six sites were visited that used computers to process data or to provide information, including the California Department of Transportation, the California…
Applying IRSS Theory: The Clark Atlanta University Exemplar
ERIC Educational Resources Information Center
Payton, Fay Cobb; Suarez-Brown, Tiki L.; Smith Lamar, Courtney
2012-01-01
The percentage of underrepresented minorities (African-American, Hispanic, Native Americans) that have obtained graduate level degrees within computing disciplines (computer science, computer information systems, computer engineering, and information technology) is dismal at best. Despite the fact that academia, the computing workforce,…
Design and evaluation of an onboard computer-based information system for aircraft
NASA Technical Reports Server (NTRS)
Rouse, S. H.; Rouse, W. B.; Hammer, J. M.
1982-01-01
Information seeking by human operators of technical systems is considered. Types of information and forms of presentation are discussed and important issues reviewed. This broad discussion provides a framework within which flight management is considered. The design of an onboard computer-based information system for aircraft is discussed. The aiding possibilities of a computer-based system are emphasized. Results of an experimental evaluation of a prototype system are presented. It is concluded that a computer-based information system can substantially lessen the frequency of human errors.
Information Technology and Literacy Assessment.
ERIC Educational Resources Information Center
Balajthy, Ernest
2002-01-01
Compares technology predictions from around 1989 with the technology of 2002. Discusses the place of computer-based assessment today, computer-scored testing, computer-administered formal assessment, Internet-based formal assessment, computerized adaptive tests, placement tests, informal assessment, electronic portfolios, information management,…
ERIC Educational Resources Information Center
Dulaney, Malik H.
2013-01-01
Emerging technologies challenge the management of information technology in organizations. Paradigm changing technologies, such as cloud computing, have the ability to reverse the norms in organizational management, decision making, and information technology governance. This study explores the effects of cloud computing on information technology…
Computer-Based National Information Systems. Technology and Public Policy Issues.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
A general introduction to computer based national information systems, and the context and basis for future studies are provided in this report. Chapter One, the introduction, summarizes computers and information systems and their relation to society, the structure of information policy issues, and public policy issues. Chapter Two describes the…
The State of the Art in Information Handling. Operation PEP/Executive Information Systems.
ERIC Educational Resources Information Center
Summers, J. K.; Sullivan, J. E.
This document explains recent developments in computer science and information systems of interest to the educational manager. A brief history of computers is included, together with an examination of modern computers' capabilities. Various features of card, tape, and disk information storage systems are presented. The importance of time-sharing…
Computer virus information update CIAC-2301
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W.J.
1994-01-15
While CIAC periodically issues bulletins about specific computer viruses, these bulletins do not cover all the computer viruses that affect desktop computers. The purpose of this document is to identify most of the known viruses for the MS-DOS and Macintosh platforms and give an overview of the effects of each virus. The authors also include information on some windows, Atari, and Amiga viruses. This document is revised periodically as new virus information becomes available. This document replaces all earlier versions of the CIAC Computer virus Information Update. The date on the front cover indicates date on which the information inmore » this document was extracted from CIAC`s Virus database.« less
Magmatism significantly alters the thermal structure of the wedge
NASA Astrophysics Data System (ADS)
Rees Jones, D. W.; Katz, R. F.; Rudge, J. F.; Tian, M.
2016-12-01
The temperature structure of the mantle wedge is typically modelled as a balance between thermal diffusion and advection by the solid mantle [e.g., 1]. The thermal state of the wedge promotes melting and melt transport in the natural system, but the thermal consequences of these processes have been neglected from previous models. We show that advective transport of sensible and latent heat by liquid magma can locally alter the temperature structure from canonical models by up to 200K. Liquids are liberated from the subducting slab by de-volatilization reactions. They trigger melting and become silicic en route to the surface, where they cause arc volcanism. These liquids transport heat advectively, and consume or supply latent heat as they melt or freeze. To analyse these effects, we parameterise melting in the presence of volatile species. We combine this with a one-dimensional "melting-column model," previously used to understand mid-ocean ridge volcanism. Our calculations highlight the thermal and chemical response to melt transport across the mantle wedge. Finally, we solve two-dimensional geodynamic models with a prescribed slab flux [2]. These models allow us to identify the most thermally significant fluxes of melt in the system. Perturbations of 200K are found at the base of the overriding lithosphere. This thermal signature of melt migration should be considered when interpreting heat flow, petrologic and seismic data [e.g., 3]. Such a thermal perturbation is likely to affect the chemistry of arc volcanoes, the solid mantle flow and, perhaps, the location of the volcanos themselves [4]. [1] van Keken, P. E., Currie, C., King, S. D., Behn, M. D., Cagnioncle, A., He, J., et al. (2008). A community benchmark for subduction zone modeling. PEPI, doi:10.1016/j.pepi.2008.04.015 [2] Wilson, C. R., Spiegelman, M., van Keken, P. E., & Hacker, B. R. (2014). Fluid flow in subduction zones: The role of solid rheology and compaction pressure. EPSL, doi:10.1016/j.epsl.2014.05.052 [3] Kelemen, P. B., Rilling, J., Parmentier, E., Mehl, L., & Hacker, B. (2004). Thermal structure due to solid-state flow in the mantle wedge beneath arcs. AGU Geophys. Mon. Ser., 138, 293-311 [4] England, P. C., Katz, R. F. (2010). Melting above the anhydrous solidus controls the location of volcanic arcs. Nature, doi:10.1038/nature09417
Computer Supported Cooperative Work in Information Search and Retrieval.
ERIC Educational Resources Information Center
Twidale, Michael B.; Nichols, David M.
1998-01-01
Considers how research in collaborative technologies can inform research and development in library and information science. Topics include computer supported collaborative work; shared drawing; collaborative writing; MUDs; MOOs; workflow; World Wide Web; collaborative learning; computer mediated communication; ethnography; evaluation; remote…
On shaky ground - A study of security vulnerabilities in control protocols
DOE Office of Scientific and Technical Information (OSTI.GOV)
Byres, E. J.; Huffman, D.; Kube, N.
2006-07-01
The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large numbermore » of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)« less
Hybrid information privacy system: integration of chaotic neural network and RSA coding
NASA Astrophysics Data System (ADS)
Hsu, Ming-Kai; Willey, Jeff; Lee, Ting N.; Szu, Harold H.
2005-03-01
Electronic mails are adopted worldwide; most are easily hacked by hackers. In this paper, we purposed a free, fast and convenient hybrid privacy system to protect email communication. The privacy system is implemented by combining private security RSA algorithm with specific chaos neural network encryption process. The receiver can decrypt received email as long as it can reproduce the specified chaos neural network series, so called spatial-temporal keys. The chaotic typing and initial seed value of chaos neural network series, encrypted by the RSA algorithm, can reproduce spatial-temporal keys. The encrypted chaotic typing and initial seed value are hidden in watermark mixed nonlinearly with message media, wrapped with convolution error correction codes for wireless 3rd generation cellular phones. The message media can be an arbitrary image. The pattern noise has to be considered during transmission and it could affect/change the spatial-temporal keys. Since any change/modification on chaotic typing or initial seed value of chaos neural network series is not acceptable, the RSA codec system must be robust and fault-tolerant via wireless channel. The robust and fault-tolerant properties of chaos neural networks (CNN) were proved by a field theory of Associative Memory by Szu in 1997. The 1-D chaos generating nodes from the logistic map having arbitrarily negative slope a = p/q generating the N-shaped sigmoid was given first by Szu in 1992. In this paper, we simulated the robust and fault-tolerance properties of CNN under additive noise and pattern noise. We also implement a private version of RSA coding and chaos encryption process on messages.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... expenses (purchases; and operating leases and rental payments) for four types of information and communication technology equipment and software (computers and peripheral equipment; ICT equipment, excluding computers and peripherals; electromedical and electrotherapeutic apparatus; and computer software, including...
Karunaratne, Asuntha S; Korenman, Stanley G; Thomas, Samantha L; Myles, Paul S; Komesaroff, Paul A
2010-04-05
To assess the efficacy, with respect to participant understanding of information, of a computer-based approach to communication about complex, technical issues that commonly arise when seeking informed consent for clinical research trials. An open, randomised controlled study of 60 patients with diabetes mellitus, aged 27-70 years, recruited between August 2006 and October 2007 from the Department of Diabetes and Endocrinology at the Alfred Hospital and Baker IDI Heart and Diabetes Institute, Melbourne. Participants were asked to read information about a mock study via a computer-based presentation (n = 30) or a conventional paper-based information statement (n = 30). The computer-based presentation contained visual aids, including diagrams, video, hyperlinks and quiz pages. Understanding of information as assessed by quantitative and qualitative means. Assessment scores used to measure level of understanding were significantly higher in the group that completed the computer-based task than the group that completed the paper-based task (82% v 73%; P = 0.005). More participants in the group that completed the computer-based task expressed interest in taking part in the mock study (23 v 17 participants; P = 0.01). Most participants from both groups preferred the idea of a computer-based presentation to the paper-based statement (21 in the computer-based task group, 18 in the paper-based task group). A computer-based method of providing information may help overcome existing deficiencies in communication about clinical research, and may reduce costs and improve efficiency in recruiting participants for clinical trials.
Military clouds: utilization of cloud computing systems at the battlefield
NASA Astrophysics Data System (ADS)
Süleyman, Sarıkürk; Volkan, Karaca; İbrahim, Kocaman; Ahmet, Şirzai
2012-05-01
Cloud computing is known as a novel information technology (IT) concept, which involves facilitated and rapid access to networks, servers, data saving media, applications and services via Internet with minimum hardware requirements. Use of information systems and technologies at the battlefield is not new. Information superiority is a force multiplier and is crucial to mission success. Recent advances in information systems and technologies provide new means to decision makers and users in order to gain information superiority. These developments in information technologies lead to a new term, which is known as network centric capability. Similar to network centric capable systems, cloud computing systems are operational today. In the near future extensive use of military clouds at the battlefield is predicted. Integrating cloud computing logic to network centric applications will increase the flexibility, cost-effectiveness, efficiency and accessibility of network-centric capabilities. In this paper, cloud computing and network centric capability concepts are defined. Some commercial cloud computing products and applications are mentioned. Network centric capable applications are covered. Cloud computing supported battlefield applications are analyzed. The effects of cloud computing systems on network centric capability and on the information domain in future warfare are discussed. Battlefield opportunities and novelties which might be introduced to network centric capability by cloud computing systems are researched. The role of military clouds in future warfare is proposed in this paper. It was concluded that military clouds will be indispensible components of the future battlefield. Military clouds have the potential of improving network centric capabilities, increasing situational awareness at the battlefield and facilitating the settlement of information superiority.
Pedretti, Kevin
2008-11-18
A compute processor allocator architecture for allocating compute processors to run applications in a multiple processor computing apparatus is distributed among a subset of processors within the computing apparatus. Each processor of the subset includes a compute processor allocator. The compute processor allocators can share a common database of information pertinent to compute processor allocation. A communication path permits retrieval of information from the database independently of the compute processor allocators.
The Human-Computer Interface and Information Literacy: Some Basics and Beyond.
ERIC Educational Resources Information Center
Church, Gary M.
1999-01-01
Discusses human/computer interaction research, human/computer interface, and their relationships to information literacy. Highlights include communication models; cognitive perspectives; task analysis; theory of action; problem solving; instructional design considerations; and a suggestion that human/information interface may be a more appropriate…
Distributed Multimedia Computing: An Assessment of the State of the Art.
ERIC Educational Resources Information Center
Williams, Neil; And Others
1991-01-01
Describes multimedia computing and the characteristics of multimedia information. Trends in information technology are reviewed; distributed multimedia computing is explained; media types are described, including digital media; and multimedia applications are examined, including office systems, documents, information storage and retrieval,…
Computing, Information, and Communications Technology (CICT) Program Overview
NASA Technical Reports Server (NTRS)
VanDalsem, William R.
2003-01-01
The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies
ERIC Educational Resources Information Center
Boyd, Sally
This booklet outlines the information gained from five case studies in New Zealand primary schools on how the use of computers was integrated into the school environment and the curriculum. Principals, teachers, and information technology (IT) coordinators were interviewed about students' use of computers. Information on the equipment available…
ERIC Educational Resources Information Center
Punter, R. Annemiek; Meelissen, Martina R. M.; Glas, Cees A. W.
2017-01-01
IEA's International Computer and Information Literacy Study (ICILS) 2013 showed that in the majority of the participating countries, 14-year-old girls outperformed boys in computer and information literacy (CIL): results that seem to contrast with the common view of boys having better computer skills. This study used the ICILS data to explore…
Analysis of Computer Network Information Based on "Big Data"
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-11-01
With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.
Wilkinson, Ann; While, Alison E; Roberts, Julia
2009-04-01
This paper is a report of a review to describe and discuss the psychometric properties of instruments used in healthcare education settings measuring experience and attitudes of healthcare students regarding their information and communication technology skills and their use of computers and the Internet for education. Healthcare professionals are expected to be computer and information literate at registration. A previous review of evaluative studies of computer-based learning suggests that methods of measuring learners' attitudes to computers and computer aided learning are problematic. A search of eight health and social science databases located 49 papers, the majority published between 1995 and January 2007, focusing on the experience and attitudes of students in the healthcare professions towards computers and e-learning. An integrative approach was adopted, with narrative description of findings. Criteria for inclusion were quantitative studies using survey tools with samples of healthcare students and concerning computer and information literacy skills, access to computers, experience with computers and use of computers and the Internet for education purposes. Since the 1980s a number of instruments have been developed, mostly in the United States of America, to measure attitudes to computers, anxiety about computer use, information and communication technology skills, satisfaction and more recently attitudes to the Internet and computers for education. The psychometric properties are poorly described. Advances in computers and technology mean that many earlier tools are no longer valid. Measures of the experience and attitudes of healthcare students to the increased use of e-learning require development in line with computer and technology advances.
A computer-oriented system for assembling and displaying land management information
Elliot L. Amidon
1964-01-01
Maps contain information basic to land management planning. By transforming conventional map symbols into numbers which are punched into cards, the land manager can have a computer assemble and display information required for a specific job. He can let a computer select information from several maps, combine it with such nonmap data as treatment cost or benefit per...
The impact of the pervasive information age on healthcare organizations.
Landry, Brett J L; Mahesh, Sathi; Hartman, Sandra J
2005-01-01
New information technologies place data on integrated information systems, and provide access via pervasive computing technologies. Pervasive computing puts computing power in the hands of all employees, available wherever it is needed. Integrated systems offer seamless data and process integration over diverse information systems. In this paper we look at the impact of these technologies on healthcare organizations in the future.
Internet and computer access and use for health information in an underserved community.
Kind, Terry; Huang, Zhihuan J; Farr, Deeonna; Pomerantz, Karyn L
2005-01-01
The "digital divide" is the gap between those with access to information tools such as the Internet and those without access. The gap has been described by income, education, age, and race. Little information exists on computer and Internet access and use for health information by parents, particularly among populations of low income and low education level. To describe computer and Internet access and use, including health information retrieval, among low-income, urban, African American caregivers (parents). Cross-sectional survey administered in pediatric waiting rooms of urban community-based health centers in a low-income area. Caregivers of pediatric outpatients. Access to computers, Internet access, and use of Internet for health information. In 2003, among 260 African Americans who completed surveys, 58% had a computer and 41% had home Internet access. Fifty-two percent had used the Internet for finding health information. Ninety-three percent agreed or strongly agreed that there is useful health information on the Internet. Ninety-two percent agreed or strongly agreed that they would want to talk with a medical professional about health information on the Internet. Sixty-five percent of respondents had no additional schooling after high school. Annual household income was
Tran, Phuoc; Subrahmanyam, Kaveri
2013-01-01
The use of computers in the home has become very common among young children. This paper reviews research on the effects of informal computer use and identifies potential pathways through which computers may impact children's development. Based on the evidence reviewed, we present the following guidelines to arrange informal computer experiences that will promote the development of children's academic, cognitive and social skills: (1) children should be encouraged to use computers for moderate amounts of time (2-3 days a week for an hour or two per day) and (2) children's use of computers should (a) include non-violent action-based computer games as well as educational games, (b) not displace social activities but should instead be arranged to provide opportunities for social engagement with peers and family members and (c) involve content with pro-social and non-violent themes. We conclude the paper with questions that must be addressed in future research. This paper reviews research on the effects of informal computer use on children's academic, cognitive and social skills. Based on the evidence presented, we have presented guidelines to enable parents, teachers and other adults to arrange informal computer experiences so as to maximise their potential benefit for children's development.
11 CFR 9003.6 - Production of computer information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 11 Federal Elections 1 2012-01-01 2012-01-01 false Production of computer information. 9003.6... ELECTION FINANCING ELIGIBILITY FOR PAYMENTS § 9003.6 Production of computer information. (a) Categories of...) Records relating to the costs of producing broadcast communications and purchasing airtime; (5) Records...
11 CFR 9003.6 - Production of computer information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 11 Federal Elections 1 2013-01-01 2012-01-01 true Production of computer information. 9003.6... ELECTION FINANCING ELIGIBILITY FOR PAYMENTS § 9003.6 Production of computer information. (a) Categories of...) Records relating to the costs of producing broadcast communications and purchasing airtime; (5) Records...
11 CFR 9003.6 - Production of computer information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 11 Federal Elections 1 2011-01-01 2011-01-01 false Production of computer information. 9003.6... ELECTION FINANCING ELIGIBILITY FOR PAYMENTS § 9003.6 Production of computer information. (a) Categories of...) Records relating to the costs of producing broadcast communications and purchasing airtime; (5) Records...
11 CFR 9003.6 - Production of computer information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 11 Federal Elections 1 2014-01-01 2014-01-01 false Production of computer information. 9003.6... ELECTION FINANCING ELIGIBILITY FOR PAYMENTS § 9003.6 Production of computer information. (a) Categories of...) Records relating to the costs of producing broadcast communications and purchasing airtime; (5) Records...
Technology and Mathematics Education: A Survey of Recent Developments and Important Problems.
ERIC Educational Resources Information Center
Fey, James T.
1989-01-01
Provided is an overview and analysis of recent progress in applying electronic information technology to creation of new environments for intellectual work in mathematics. Describes the impact of numerical computation, graphic computation, symbolic computation, multiple representation of information, programing and information, and artificial…
New Information Dispersal Techniques for Trustworthy Computing
ERIC Educational Resources Information Center
Parakh, Abhishek
2011-01-01
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Information Science Research: The Search for the Nature of Information.
ERIC Educational Resources Information Center
Kochen, Manfred
1984-01-01
High-level scientific research in the information sciences is illustrated by sampling of recent discoveries involving adaptive information processing strategies, computer and information systems, centroid scaling, economic growth of computer and communication industries, and information flow in biological systems. Relationship of information…
Entrepreneurial Health Informatics for Computer Science and Information Systems Students
ERIC Educational Resources Information Center
Lawler, James; Joseph, Anthony; Narula, Stuti
2014-01-01
Corporate entrepreneurship is a critical area of curricula for computer science and information systems students. Few institutions of computer science and information systems have entrepreneurship in the curricula however. This paper presents entrepreneurial health informatics as a course in a concentration of Technology Entrepreneurship at a…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-28
... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Cancellation of Meeting SUMMARY: As a result of the impact of the recent government shutdown, the... Committee for Computer and Information Science and Engineering meeting. The public notice for this committee...
A Computational Model and Multi-Agent Simulation for Information Assurance
2002-06-01
Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an
Community Information Centers and the Computer.
ERIC Educational Resources Information Center
Carroll, John M.; Tague, Jean M.
Two computer data bases have been developed by the Computer Science Department at the University of Western Ontario for "Information London," the local community information center. One system, called LONDON, permits Boolean searches of a file of 5,000 records describing human service agencies in the London area. The second system,…
Business Technology Education in the Early 21st Century: The Ongoing Quest for Relevance
ERIC Educational Resources Information Center
Andriole, Stephen J.
2006-01-01
The field of information technology is changing and those responsible for educating the next generation of technology professionals have responded with a new computing curriculum, which identifies five distinct technology majors: computer engineering, computer science, software engineering, information systems and information technology.…
Mobility in hospital work: towards a pervasive computing hospital environment.
Morán, Elisa B; Tentori, Monica; González, Víctor M; Favela, Jesus; Martínez-Garcia, Ana I
2007-01-01
Handheld computers are increasingly being used by hospital workers. With the integration of wireless networks into hospital information systems, handheld computers can provide the basis for a pervasive computing hospital environment; to develop this designers need empirical information to understand how hospital workers interact with information while moving around. To characterise the medical phenomena we report the results of a workplace study conducted in a hospital. We found that individuals spend about half of their time at their base location, where most of their interactions occur. On average, our informants spent 23% of their time performing information management tasks, followed by coordination (17.08%), clinical case assessment (15.35%) and direct patient care (12.6%). We discuss how our results offer insights for the design of pervasive computing technology, and directions for further research and development in this field such as transferring information between heterogeneous devices and integration of the physical and digital domains.
ERIC Educational Resources Information Center
Scheffler, F. L.; And Others
A feasibility study examined the capability of a computer-based system's handling of technical information pertinent to the design of instructional systems. Structured interviews were held to assess the information needs of both researchers and practitioners and an investigation was conducted of 10 computer-based information storage and retrieval…
A Distributed User Information System
1990-03-01
NOE08 Department of Computer Science NOVO 8 1990 University of Maryland S College Park, MD 20742 D Abstract Current user information database technology ...Transactions on Computer Systems, May 1988. [So189] K. Sollins. A plan for internet directory services. Technical report, DDN Network Information Center...2424 A Distributed User Information System DTiC Steven D. Miller, Scott Carson, and Leo Mark DELECTE Institute for Advanced Computer Studies and
Semiotics, Information Science, Documents and Computers.
ERIC Educational Resources Information Center
Warner, Julian
1990-01-01
Discusses the relationship and value of semiotics to the established domains of information science. Highlights include documentation; computer operations; the language of computing; automata theory; linguistics; speech and writing; and the written language as a unifying principle for the document and the computer. (93 references) (LRW)
Crane, Michael; Steinwand, Dan; Beckmann, Tim; Krpan, Greg; Liu, Shu-Guang; Nichols, Erin; Haga, Jim; Maddox, Brian; Bilderback, Chris; Feller, Mark; Homer, George
2001-01-01
The overarching goal of this project is to build a spatially distributed infrastructure for information science research by forming a team of information science researchers and providing them with similar hardware and software tools to perform collaborative research. Four geographically distributed Centers of the U.S. Geological Survey (USGS) are developing their own clusters of low-cost, personal computers into parallel computing environments that provide a costeffective way for the USGS to increase participation in the high-performance computing community. Referred to as Beowulf clusters, these hybrid systems provide the robust computing power required for conducting information science research into parallel computing systems and applications.
A DDC Bibliography on Computers in Information Sciences. Volume I. Information Sciences Series.
ERIC Educational Resources Information Center
Defense Documentation Center, Alexandria, VA.
The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 249 annotated references grouped under two major headings: Time Shared, On-Line, and Real Time Systems, and Computer Components. The references are arranged in accesion number (AD-number)…
ERIC Educational Resources Information Center
Tuncer, Murat
2013-01-01
Present research investigates reciprocal relations amidst computer self-efficacy, scientific research and information literacy self-efficacy. Research findings have demonstrated that according to standardized regression coefficients, computer self-efficacy has a positive effect on information literacy self-efficacy. Likewise it has been detected…
ERIC Educational Resources Information Center
Hungerford, Bruce C.; Baxter, Joseph T.; LeMay, Stephen; Helms, Marilyn M.
2012-01-01
There is broad agreement that college students need computer and information literacy for their studies and to be competitive as graduates in an environment that increasingly relies on information technology. However, as information technology changes, what constitutes computer literacy changes. Colleges have traditionally used the freshman- or…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-04
... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance with Federal Advisory Committee Act (Pub. L. 92-463, as amended... Committee for Computer and Information Science and Engineering (1115). Date/Time: Oct 31, 2013: 12:30 p.m...
International Computer and Information Literacy Study: Assessment Framework
ERIC Educational Resources Information Center
Fraillon, Julian; Schulz, Wolfram; Ainley, John
2013-01-01
The purpose of the International Computer and Information Literacy Study 2013 (ICILS 2013) is to investigate, in a range of countries, the ways in which young people are developing "computer and information literacy" (CIL) to support their capacity to participate in the digital age. To achieve this aim, the study will assess student…
Computers in medicine: liability issues for physicians.
Hafner, A W; Filipowicz, A B; Whitely, W P
1989-07-01
Physicians routinely use computers to store, access, and retrieve medical information. As computer use becomes even more widespread in medicine, failure to utilize information systems may be seen as a violation of professional custom and lead to findings of professional liability. Even when a technology is not widespread, failure to incorporate it into medical practice may give rise to liability if the technology is accessible to the physician and reduces risk to the patient. Improvement in the availability of medical information sources imposes a greater burden on the physician to keep current and to obtain informed consent from patients. To routinely perform computer-assisted literature searches for informed consent and diagnosis is 'good medicine'. Clinical and diagnostic applications of computer technology now include computer-assisted decision making with the aid of sophisticated databases. Although such systems will expand the knowledge base and competence of physicians, malfunctioning software raises a major liability question. Also, complex computer-driven technology is used in direct patient care. Defective or improperly used hardware or software can lead to patient injury, thus raising additional complicated questions of professional liability and product liability.
Coping with Computing Success.
ERIC Educational Resources Information Center
Breslin, Richard D.
Elements of computing success of Iona College, the challenges it currently faces, and the strategies conceived to cope with future computing needs are discussed. The college has mandated computer literacy for students and offers nine degrees in the computerized information system/management information system areas. Since planning is needed in…
Computer-Based Assessments. Information Capsule. Volume 0918
ERIC Educational Resources Information Center
Blazer, Christie
2010-01-01
This Information Capsule reviews research conducted on computer-based assessments. Advantages and disadvantages associated with computer-based testing programs are summarized and research on the comparability of computer-based and paper-and-pencil assessments is reviewed. Overall, studies suggest that for most students, there are few if any…
Information thermodynamics of near-equilibrium computation
NASA Astrophysics Data System (ADS)
Prokopenko, Mikhail; Einav, Itai
2015-06-01
In studying fundamental physical limits and properties of computational processes, one is faced with the challenges of interpreting primitive information-processing functions through well-defined information-theoretic as well as thermodynamic quantities. In particular, transfer entropy, characterizing the function of computational transmission and its predictability, is known to peak near critical regimes. We focus on a thermodynamic interpretation of transfer entropy aiming to explain the underlying critical behavior by associating information flows intrinsic to computational transmission with particular physical fluxes. Specifically, in isothermal systems near thermodynamic equilibrium, the gradient of the average transfer entropy is shown to be dynamically related to Fisher information and the curvature of system's entropy. This relationship explicitly connects the predictability, sensitivity, and uncertainty of computational processes intrinsic to complex systems and allows us to consider thermodynamic interpretations of several important extreme cases and trade-offs.
Establishing a Cloud Computing Success Model for Hospitals in Taiwan.
Lian, Jiunn-Woei
2017-01-01
The purpose of this study is to understand the critical quality-related factors that affect cloud computing success of hospitals in Taiwan. In this study, private cloud computing is the major research target. The chief information officers participated in a questionnaire survey. The results indicate that the integration of trust into the information systems success model will have acceptable explanatory power to understand cloud computing success in the hospital. Moreover, information quality and system quality directly affect cloud computing satisfaction, whereas service quality indirectly affects the satisfaction through trust. In other words, trust serves as the mediator between service quality and satisfaction. This cloud computing success model will help hospitals evaluate or achieve success after adopting private cloud computing health care services.
Establishing a Cloud Computing Success Model for Hospitals in Taiwan
Lian, Jiunn-Woei
2017-01-01
The purpose of this study is to understand the critical quality-related factors that affect cloud computing success of hospitals in Taiwan. In this study, private cloud computing is the major research target. The chief information officers participated in a questionnaire survey. The results indicate that the integration of trust into the information systems success model will have acceptable explanatory power to understand cloud computing success in the hospital. Moreover, information quality and system quality directly affect cloud computing satisfaction, whereas service quality indirectly affects the satisfaction through trust. In other words, trust serves as the mediator between service quality and satisfaction. This cloud computing success model will help hospitals evaluate or achieve success after adopting private cloud computing health care services. PMID:28112020
2010-06-01
DATES COVEREDAPR 2009 – JAN 2010 (From - To) APR 2009 – JAN 2010 4. TITLE AND SUBTITLE EMERGING NEUROMORPHIC COMPUTING ARCHITECTURES AND ENABLING...14. ABSTRACT The highly cross-disciplinary emerging field of neuromorphic computing architectures for cognitive information processing applications...belief systems, software, computer engineering, etc. In our effort to develop cognitive systems atop a neuromorphic computing architecture, we explored
Computers and information technologies in psychiatric nursing.
Repique, Renee John R
2007-04-01
There is an assumption that psychiatric nurses are late adopters of technology because psychiatric nursing has been traditionally viewed as a nontechnological nursing specialty. This article will review current nursing literature to outline the value and significance of computers and information technologies to psychiatric nursing. Existing bodies of research literature related to computers and information technology for psychiatric nurses. Three areas of psychiatric nursing are identified and the specific advantages and benefits of computers and information technologies in each of these areas are discussed. In addition, the importance of informatics competencies for psychiatric nursing practice is reiterated in order to accelerate its acquisition.
Medical Information Processing by Computer.
ERIC Educational Resources Information Center
Kleinmuntz, Benjamin
The use of the computer for medical information processing was introduced about a decade ago. Considerable inroads have now been made toward its applications to problems in medicine. Present uses of the computer, both as a computational and noncomputational device include the following: automated search of patients' files; on-line clinical data…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-08
...; Defense Federal Acquisition Regulation Supplement; Rights in Technical Data and Computer Software (OMB... 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and... rights in technical data and computer software. DoD needs this information to implement 10 U.S.C. 2320...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... Data and Computer Software AGENCY: Defense Acquisition Regulations System; Department of Defense (DoD... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information to...
Interactive computer graphics - Why's, wherefore's and examples
NASA Technical Reports Server (NTRS)
Gregory, T. J.; Carmichael, R. L.
1983-01-01
The benefits of using computer graphics in design are briefly reviewed. It is shown that computer graphics substantially aids productivity by permitting errors in design to be found immediately and by greatly reducing the cost of fixing the errors and the cost of redoing the process. The possibilities offered by computer-generated displays in terms of information content are emphasized, along with the form in which the information is transferred. The human being is ideally and naturally suited to dealing with information in picture format, and the content rate in communication with pictures is several orders of magnitude greater than with words or even graphs. Since science and engineering involve communicating ideas, concepts, and information, the benefits of computer graphics cannot be overestimated.
NASA Astrophysics Data System (ADS)
Bednar, Earl; Drager, Steven L.
2007-04-01
Quantum information processing's objective is to utilize revolutionary computing capability based on harnessing the paradigm shift offered by quantum computing to solve classically hard and computationally challenging problems. Some of our computationally challenging problems of interest include: the capability for rapid image processing, rapid optimization of logistics, protecting information, secure distributed simulation, and massively parallel computation. Currently, one important problem with quantum information processing is that the implementation of quantum computers is difficult to realize due to poor scalability and great presence of errors. Therefore, we have supported the development of Quantum eXpress and QuIDD Pro, two quantum computer simulators running on classical computers for the development and testing of new quantum algorithms and processes. This paper examines the different methods used by these two quantum computing simulators. It reviews both simulators, highlighting each simulators background, interface, and special features. It also demonstrates the implementation of current quantum algorithms on each simulator. It concludes with summary comments on both simulators.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-03
... Engineering; Notice of Meeting In accordance with the Federal Advisory Committee Act (Pub. L. 92- 463, as... Computer and Information Science and Engineering (1115). Date and Time: November 1, 2011 from 12 p.m.-5:30... Computer and Information Science and Engineering, National Science Foundation, 4201 Wilson Blvd., Suite...
Code of Federal Regulations, 2014 CFR
2014-04-01
... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...
Code of Federal Regulations, 2012 CFR
2012-04-01
... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...
Code of Federal Regulations, 2010 CFR
2010-04-01
... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...
Code of Federal Regulations, 2013 CFR
2013-04-01
... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...
Code of Federal Regulations, 2011 CFR
2011-04-01
... section, ABS informational and computational material made in reliance on § 230.167 that meet the...) ABS informational and computational material that relate to abandoned structures or that are furnished... intention to purchase the asset-backed securities. (2) Any ABS informational and computational material if a...
Computing with a single qubit faster than the computation quantum speed limit
NASA Astrophysics Data System (ADS)
Sinitsyn, Nikolai A.
2018-02-01
The possibility to save and process information in fundamentally indistinguishable states is the quantum mechanical resource that is not encountered in classical computing. I demonstrate that, if energy constraints are imposed, this resource can be used to accelerate information-processing without relying on entanglement or any other type of quantum correlations. In fact, there are computational problems that can be solved much faster, in comparison to currently used classical schemes, by saving intermediate information in nonorthogonal states of just a single qubit. There are also error correction strategies that protect such computations.
Gemini rendezvous docking simulator
1963-11-04
Multiple exposure of Gemini rendezvous docking simulator. Francis B. Smith wrote in his paper "Simulators for Manned Space Research," "The rendezvous and docking operation of the Gemini spacecraft with the Agena and of the Apollo Command Module with the Lunar Excursion Module have been the subject of simulator studies for several years. [This figure] illustrates the Gemini-Agena rendezvous docking simulator at Langley. The Gemini spacecraft was supported in a gimbal system by an overhead crane and gantry arrangement which provided 6 degrees of freedom - roll, pitch, yaw, and translation in any direction - all controllable by the astronaut in the spacecraft. Here again the controls fed into a computer which in turn provided an input to the servos driving the spacecraft so that it responded to control motions in a manner which accurately simulated the Gemini spacecraft." A.W. Vogeley further described the simulator in his paper "Discussion of Existing and Planned Simulators For Space Research," "Docking operations are considered to start when the pilot first can discern vehicle target size and aspect and terminate, of course, when soft contact is made. ... This facility enables simulation of the docking operation from a distance of 200 feet to actual contact with the target. A full-scale mock-up of the target vehicle is suspended near one end of the track. ... On [the Agena target] we have mounted the actual Agena docking mechanism and also various types of visual aids. We have been able to devise visual aids which have made it possible to accomplish nighttime docking with as much success as daytime docking." -- Published in Barton C. Hacker and James M. Grimwood, On the Shoulders of Titans: A History of Project Gemini, NASA SP-4203; Francis B. Smith, "Simulators for Manned Space Research," Paper presented at the 1966 IEEE International convention, March 21-25, 1966; A.W. Vogeley, "Discussion of Existing and Planned Simulators For Space Research," Paper presented at the Conference on the Role of Simulation in Space Technology, August 17-21, 1964.
ERIC Educational Resources Information Center
Green, Kenneth C.
This report presents findings of a June 1998 survey of computing officials at 1,623 two- and four-year U.S. colleges and universities concerning the use of computer technology. The survey found that computing and information technology (IT) are now core components of the campus environment and classroom experience. However, key aspects of IT…
On Roles of Models in Information Systems
NASA Astrophysics Data System (ADS)
Sølvberg, Arne
The increasing penetration of computers into all aspects of human activity makes it desirable that the interplay among software, data and the domains where computers are applied is made more transparent. An approach to this end is to explicitly relate the modeling concepts of the domains, e.g., natural science, technology and business, to the modeling concepts of software and data. This may make it simpler to build comprehensible integrated models of the interactions between computers and non-computers, e.g., interaction among computers, people, physical processes, biological processes, and administrative processes. This chapter contains an analysis of various facets of the modeling environment for information systems engineering. The lack of satisfactory conceptual modeling tools seems to be central to the unsatisfactory state-of-the-art in establishing information systems. The chapter contains a proposal for defining a concept of information that is relevant to information systems engineering.
Timpka, Toomas; Olvander, Christina; Hallberg, Niklas
2008-09-01
The international Safe Community programme was used as the setting for a case study to explore the need for information system support in health promotion programmes. The 14 Safe Communities active in Sweden during 2002 were invited to participate and 13 accepted. A questionnaire on computer usage and a critical incident technique instrument were distributed. Sharing of management information, creating social capital for safety promotion, and injury data recording were found to be key areas that need to be further supported by computer-based information systems. Most respondents reported having access to a personal computer workstation with standard office software. Interest in using more advanced computer applications was low, and there was considerable need for technical user support. Areas where information systems can be used to make health promotion practice more efficient were identified, and patterns of computers usage were described.
Transfer Entropy and Transient Limits of Computation
Prokopenko, Mikhail; Lizier, Joseph T.
2014-01-01
Transfer entropy is a recently introduced information-theoretic measure quantifying directed statistical coherence between spatiotemporal processes, and is widely used in diverse fields ranging from finance to neuroscience. However, its relationships to fundamental limits of computation, such as Landauer's limit, remain unknown. Here we show that in order to increase transfer entropy (predictability) by one bit, heat flow must match or exceed Landauer's limit. Importantly, we generalise Landauer's limit to bi-directional information dynamics for non-equilibrium processes, revealing that the limit applies to prediction, in addition to retrodiction (information erasure). Furthermore, the results are related to negentropy, and to Bremermann's limit and the Bekenstein bound, producing, perhaps surprisingly, lower bounds on the computational deceleration and information loss incurred during an increase in predictability about the process. The identified relationships set new computational limits in terms of fundamental physical quantities, and establish transfer entropy as a central measure connecting information theory, thermodynamics and theory of computation. PMID:24953547
"TIS": An Intelligent Gateway Computer for Information and Modeling Networks. Overview.
ERIC Educational Resources Information Center
Hampel, Viktor E.; And Others
TIS (Technology Information System) is being used at the Lawrence Livermore National Laboratory (LLNL) to develop software for Intelligent Gateway Computers (IGC) suitable for the prototyping of advanced, integrated information networks. Dedicated to information management, TIS leads the user to available information resources, on TIS or…
CIS and Information Technology Certifications: Education Program Trends and Implications
ERIC Educational Resources Information Center
Andersson, David; Reimers, Karl
2009-01-01
The fields of Computer Information Systems (CIS) and Information Technology (IT) are experiencing rapid change. In 2003, an analysis of IT degree programs and those of competing disciplines at 10 post-secondary institutions concluded that an information technology program is perceived differently from information systems and computer science. In…
ERIC Educational Resources Information Center
Longenecker, Herbert E., Jr.; Babb, Jeffry; Waguespack, Leslie J.; Janicki, Thomas N.; Feinstein, David
2015-01-01
The evolution of computing education spans a spectrum from "computer science" ("CS") grounded in the theory of computing, to "information systems" ("IS"), grounded in the organizational application of data processing. This paper reports on a project focusing on a particular slice of that spectrum commonly…
Computing and Higher Education: An Accidental Revolution.
ERIC Educational Resources Information Center
Gillespie, Robert G.; Dicaro, Deborah A.
As the applications of computing have expanded, the issues of computing and higher education have enlarged to include questions about the nature of information transfer on campus and the role of higher education in an information society. A broad view of the national issues and opportunities of computing in higher education is presented. A panel…
Migrating Educational Data and Services to Cloud Computing: Exploring Benefits and Challenges
ERIC Educational Resources Information Center
Lahiri, Minakshi; Moseley, James L.
2013-01-01
"Cloud computing" is currently the "buzzword" in the Information Technology field. Cloud computing facilitates convenient access to information and software resources as well as easy storage and sharing of files and data, without the end users being aware of the details of the computing technology behind the process. This…
ERIC Educational Resources Information Center
Kortsarts, Yana; Fischbach, Adam; Rufinus, Jeff; Utell, Janine M.; Yoon, Suk-Chung
2010-01-01
Developing and applying oral and written communication skills in the undergraduate computer science and computer information systems curriculum--one of the ABET accreditation requirements - is a very challenging and, at the same time, a rewarding task that provides various opportunities to enrich the undergraduate computer science and computer…
Computers and Information Flow.
ERIC Educational Resources Information Center
Patrick, R. L.
This paper is designed to fill the need for an easily understood introduction to the computing and data processing field for the layman who has, or can expect to have, some contact with it. Information provided includes the unique terminology and jargon of the field, the various types of computers and the scope of computational capabilities, and…
10 CFR 727.1 - What is the purpose and scope of this part?
Code of Federal Regulations, 2012 CFR
2012-01-01
... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...
10 CFR 727.1 - What is the purpose and scope of this part?
Code of Federal Regulations, 2014 CFR
2014-01-01
... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...
10 CFR 727.1 - What is the purpose and scope of this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...
ERIC Educational Resources Information Center
Lenard, Mary Jane; Wessels, Susan; Khanlarian, Cindi
2010-01-01
Using a model developed by Young (2000), this paper explores the relationship between performance in the Accounting Information Systems course, self-assessed computer skills, and attitudes toward computers. Results show that after taking the AIS course, students experience a change in perception about their use of computers. Females'…
AEC Experiment Establishes Computer Link Between California and Paris
demonstrated that a terminal in Paris could search a computer in California and display the resulting (Copies) AEC EXPERIMENT ESTABLISHES COMPUTER LINK BETWEEN CALIFORNIA AND PARIS The feasibility of a worldwide information retrieval system which would tie a computer base of information to terminals on the
Using Personal Computers To Acquire Special Education Information. Revised. ERIC Digest #429.
ERIC Educational Resources Information Center
ERIC Clearinghouse on Handicapped and Gifted Children, Reston, VA.
This digest offers basic information about resources, available to users of personal computers, in the area of professional development in special education. Two types of resources are described: those that can be purchased on computer diskettes and those made available by linking personal computers through electronic telephone networks. Resources…
10 CFR 727.1 - What is the purpose and scope of this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...
10 CFR 727.1 - What is the purpose and scope of this part?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 727.1 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS... requirements applicable to each individual granted access to a DOE computer or to information on a DOE computer... computer used in the performance of the individual's duties during the term of that individual's employment...
Digital and biological computing in organizations.
Kampfner, Roberto R
2002-01-01
Michael Conrad unveiled many of the fundamental characteristics of biological computing. Underlying the behavioral variability and the adaptability of biological systems are these characteristics, including the ability of biological information processing to exploit quantum features at the atomic level, the powerful 3-D pattern recognition capabilities of macromolecules, the computational efficiency, and the ability to support biological function. Among many other things, Conrad formalized and explicated the underlying principles of biological adaptability, characterized the differences between biological and digital computing in terms of a fundamental tradeoff between adaptability and programmability of information processing, and discussed the challenges of interfacing digital computers and human society. This paper is about the encounter of biological and digital computing. The focus is on the nature of the biological information processing infrastructure of organizations and how it can be extended effectively with digital computing. In order to achieve this goal effectively, however, we need to embed properly digital computing into the information processing aspects of human and social behavior and intelligence, which are fundamentally biological. Conrad's legacy provides a firm, strong, and inspiring foundation for this endeavor.
Applications integration in a hybrid cloud computing environment: modelling and platform
NASA Astrophysics Data System (ADS)
Li, Qing; Wang, Ze-yuan; Li, Wei-hua; Li, Jun; Wang, Cheng; Du, Rui-yang
2013-08-01
With the development of application services providers and cloud computing, more and more small- and medium-sized business enterprises use software services and even infrastructure services provided by professional information service companies to replace all or part of their information systems (ISs). These information service companies provide applications, such as data storage, computing processes, document sharing and even management information system services as public resources to support the business process management of their customers. However, no cloud computing service vendor can satisfy the full functional IS requirements of an enterprise. As a result, enterprises often have to simultaneously use systems distributed in different clouds and their intra enterprise ISs. Thus, this article presents a framework to integrate applications deployed in public clouds and intra ISs. A run-time platform is developed and a cross-computing environment process modelling technique is also developed to improve the feasibility of ISs under hybrid cloud computing environments.
Ubiquitous computing in the military environment
NASA Astrophysics Data System (ADS)
Scholtz, Jean
2001-08-01
Increasingly people work and live on the move. To support this mobile lifestyle, especially as our work becomes more intensely information-based, companies are producing various portable and embedded information devices. The late Mark Weiser coined the term, 'ubiquitous computing' to describe an environment where computers have disappeared and are integrated into physical objects. Much industry research today is concerned with ubiquitous computing in the work and home environments. A ubiquitous computing environment would facilitate mobility by allowing information users to easily access and use information anytime, anywhere. As war fighters are inherently mobile, the question is what effect a ubiquitous computing environment would have on current military operations and doctrine. And, if ubiquitous computing is viewed as beneficial for the military, what research would be necessary to achieve a military ubiquitous computing environment? What is a vision for the use of mobile information access in a battle space? Are there different requirements for civilian and military users of this technology? What are those differences? Are there opportunities for research that will support both worlds? What type of research has been supported by the military and what areas need to be investigated? Although we don't yet have all the answers to these questions, this paper discusses the issues and presents the work we are doing to address these issues.
Use of handheld computers in clinical practice: a systematic review.
Mickan, Sharon; Atherton, Helen; Roberts, Nia Wyn; Heneghan, Carl; Tilson, Julie K
2014-07-06
Many healthcare professionals use smartphones and tablets to inform patient care. Contemporary research suggests that handheld computers may support aspects of clinical diagnosis and management. This systematic review was designed to synthesise high quality evidence to answer the question; Does healthcare professionals' use of handheld computers improve their access to information and support clinical decision making at the point of care? A detailed search was conducted using Cochrane, MEDLINE, EMBASE, PsycINFO, Science and Social Science Citation Indices since 2001. Interventions promoting healthcare professionals seeking information or making clinical decisions using handheld computers were included. Classroom learning and the use of laptop computers were excluded. Two authors independently selected studies, assessed quality using the Cochrane Risk of Bias tool and extracted data. High levels of data heterogeneity negated statistical synthesis. Instead, evidence for effectiveness was summarised narratively, according to each study's aim for assessing the impact of handheld computer use. We included seven randomised trials investigating medical or nursing staffs' use of Personal Digital Assistants. Effectiveness was demonstrated across three distinct functions that emerged from the data: accessing information for clinical knowledge, adherence to guidelines and diagnostic decision making. When healthcare professionals used handheld computers to access clinical information, their knowledge improved significantly more than peers who used paper resources. When clinical guideline recommendations were presented on handheld computers, clinicians made significantly safer prescribing decisions and adhered more closely to recommendations than peers using paper resources. Finally, healthcare professionals made significantly more appropriate diagnostic decisions using clinical decision making tools on handheld computers compared to colleagues who did not have access to these tools. For these clinical decisions, the numbers need to test/screen were all less than 11. Healthcare professionals' use of handheld computers may improve their information seeking, adherence to guidelines and clinical decision making. Handheld computers can provide real time access to and analysis of clinical information. The integration of clinical decision support systems within handheld computers offers clinicians the highest level of synthesised evidence at the point of care. Future research is needed to replicate these early results and to identify beneficial clinical outcomes.
Use of handheld computers in clinical practice: a systematic review
2014-01-01
Background Many healthcare professionals use smartphones and tablets to inform patient care. Contemporary research suggests that handheld computers may support aspects of clinical diagnosis and management. This systematic review was designed to synthesise high quality evidence to answer the question; Does healthcare professionals’ use of handheld computers improve their access to information and support clinical decision making at the point of care? Methods A detailed search was conducted using Cochrane, MEDLINE, EMBASE, PsycINFO, Science and Social Science Citation Indices since 2001. Interventions promoting healthcare professionals seeking information or making clinical decisions using handheld computers were included. Classroom learning and the use of laptop computers were excluded. Two authors independently selected studies, assessed quality using the Cochrane Risk of Bias tool and extracted data. High levels of data heterogeneity negated statistical synthesis. Instead, evidence for effectiveness was summarised narratively, according to each study’s aim for assessing the impact of handheld computer use. Results We included seven randomised trials investigating medical or nursing staffs’ use of Personal Digital Assistants. Effectiveness was demonstrated across three distinct functions that emerged from the data: accessing information for clinical knowledge, adherence to guidelines and diagnostic decision making. When healthcare professionals used handheld computers to access clinical information, their knowledge improved significantly more than peers who used paper resources. When clinical guideline recommendations were presented on handheld computers, clinicians made significantly safer prescribing decisions and adhered more closely to recommendations than peers using paper resources. Finally, healthcare professionals made significantly more appropriate diagnostic decisions using clinical decision making tools on handheld computers compared to colleagues who did not have access to these tools. For these clinical decisions, the numbers need to test/screen were all less than 11. Conclusion Healthcare professionals’ use of handheld computers may improve their information seeking, adherence to guidelines and clinical decision making. Handheld computers can provide real time access to and analysis of clinical information. The integration of clinical decision support systems within handheld computers offers clinicians the highest level of synthesised evidence at the point of care. Future research is needed to replicate these early results and to identify beneficial clinical outcomes. PMID:24998515
Abstracts of Research, July 1975-June 1976.
ERIC Educational Resources Information Center
Ohio State Univ., Columbus. Computer and Information Science Research Center.
Abstracts of research papers in computer and information science are given for 62 papers in the areas of information storage and retrieval; computer facilities; information analysis; linguistics analysis; artificial intelligence; information processes in physical, biological, and social systems; mathematical technigues; systems programming;…
RNA-protein interactions in plant disease: hackers at the dinner table.
Spanu, Pietro D
2015-09-01
Plants are the source of most of our food, whether directly or as feed for the animals we eat. Our dinner table is a trophic level we share with the microbes that also feed on the primary photosynthetic producers. Microbes that enter into close interactions with plants need to evade or suppress detection and host immunity to access nutrients. They do this by deploying molecular tools - effectors - which target host processes. The mode of action of effector proteins in these events is varied and complex. Recent data from diverse systems indicate that RNA-interacting proteins and RNA itself are delivered by eukaryotic microbes, such as fungi and oomycetes, to host plants and contribute to the establishment of successful interactions. This is evidence that pathogenic microbes can interfere with the host software. We are beginning to see that pathogenic microbes are capable of hacking into the plants' immunity programs. © 2015 The Author. New Phytologist © 2015 New Phytologist Trust.
NASA Astrophysics Data System (ADS)
Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo
2016-12-01
Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.
Teaching Information Technology Law
ERIC Educational Resources Information Center
Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.
2009-01-01
In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…
Information technology developments within the national biological information infrastructure
Cotter, G.; Frame, M.T.
2000-01-01
Looking out an office window or exploring a community park, one can easily see the tremendous challenges that biological information presents the computer science community. Biological information varies in format and content depending whether or not it is information pertaining to a particular species (i.e. Brown Tree Snake), or a specific ecosystem, which often includes multiple species, land use characteristics, and geospatially referenced information. The complexity and uniqueness of each individual species or ecosystem do not easily lend themselves to today's computer science tools and applications. To address the challenges that the biological enterprise presents the National Biological Information Infrastructure (NBII) (http://www.nbii.gov) was established in 1993. The NBII is designed to address these issues on a National scale within the United States, and through international partnerships abroad. This paper discusses current computer science efforts within the National Biological Information Infrastructure Program and future computer science research endeavors that are needed to address the ever-growing issues related to our Nation's biological concerns.
Mahnke, Andrea N; Plasek, Joseph M; Hoffman, David G; Partridge, Nathan S; Foth, Wendy S; Waudby, Carol J; Rasmussen, Luke V; McManus, Valerie D; McCarty, Catherine A
2014-01-01
Many informed consent studies demonstrate that research subjects poorly retain and understand information in written consent documents. Previous research in multimedia consent is mixed in terms of success for improving participants’ understanding, satisfaction, and retention. This failure may be due to a lack of a community-centered design approach to building the interventions. The goal of this study was to gather information from the community to determine the best way to undertake the consent process. Community perceptions regarding different computer-based consenting approaches were evaluated, and a computer-based consent was developed and tested. A second goal was to evaluate whether participants make truly informed decisions to participate in research. Simulations of an informed consent process were videotaped to document the process. Focus groups were conducted to determine community attitudes towards a computer-based informed consent process. Hybrid focus groups were conducted to determine the most acceptable hardware device. Usability testing was conducted on a computer-based consent prototype using a touch-screen kiosk. Based on feedback, a computer-based consent was developed. Representative study participants were able to easily complete the consent, and all were able to correctly answer the comprehension check questions. Community involvement in developing a computer-based consent proved valuable for a population-based genetic study. These findings may translate to other types of informed consents, such as genetic clinical trials consents. A computer-based consent may serve to better communicate consistent, clear, accurate, and complete information regarding the risks and benefits of study participation. Additional analysis is necessary to measure the level of comprehension of the check-question answers by larger numbers of participants. The next step will involve contacting participants to measure whether understanding of what they consented to is retained over time. PMID:24273095
Mahnke, Andrea N; Plasek, Joseph M; Hoffman, David G; Partridge, Nathan S; Foth, Wendy S; Waudby, Carol J; Rasmussen, Luke V; McManus, Valerie D; McCarty, Catherine A
2014-01-01
Many informed consent studies demonstrate that research subjects poorly retain and understand information in written consent documents. Previous research in multimedia consent is mixed in terms of success for improving participants' understanding, satisfaction, and retention. This failure may be due to a lack of a community-centered design approach to building the interventions. The goal of this study was to gather information from the community to determine the best way to undertake the consent process. Community perceptions regarding different computer-based consenting approaches were evaluated, and a computer-based consent was developed and tested. A second goal was to evaluate whether participants make truly informed decisions to participate in research. Simulations of an informed consent process were videotaped to document the process. Focus groups were conducted to determine community attitudes towards a computer-based informed consent process. Hybrid focus groups were conducted to determine the most acceptable hardware device. Usability testing was conducted on a computer-based consent prototype using a touch-screen kiosk. Based on feedback, a computer-based consent was developed. Representative study participants were able to easily complete the consent, and all were able to correctly answer the comprehension check questions. Community involvement in developing a computer-based consent proved valuable for a population-based genetic study. These findings may translate to other types of informed consents, including those for trials involving treatment of genetic disorders. A computer-based consent may serve to better communicate consistent, clear, accurate, and complete information regarding the risks and benefits of study participation. Additional analysis is necessary to measure the level of comprehension of the check-question answers by larger numbers of participants. The next step will involve contacting participants to measure whether understanding of what they consented to is retained over time. © 2013 Wiley Periodicals, Inc.
Easy, Collaborative and Engaging--The Use of Cloud Computing in the Design of Management Classrooms
ERIC Educational Resources Information Center
Schneckenberg, Dirk
2014-01-01
Background: Cloud computing has recently received interest in information systems research and practice as a new way to organise information with the help of an increasingly ubiquitous computer infrastructure. However, the use of cloud computing in higher education institutions and business schools, as well as its potential to create novel…
Computers in the Classroom: A Feminist Issue.
ERIC Educational Resources Information Center
Stalker, Sylvia
Women stand to lose a great deal in the information revolution if they fail to master computer technology. Presently they are taking little part in the computer field. In the future, access to jobs, information, and power will depend on computer knowledge and skills. Women will be pushed into lower status jobs or out of jobs altogether,…
76 FR 14669 - Privacy Act of 1974; CMS Computer Match No. 2011-02; HHS Computer Match No. 1007
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... (CMS); and Department of Defense (DoD), Manpower Data Center (DMDC), Defense Enrollment and Eligibility... the results of the computer match and provide the information to TMA for use in its matching program... under TRICARE. DEERS will receive the results of the computer match and provide the information provided...
ERIC Educational Resources Information Center
Association of Small Computer Users in Education, Greencastle, IN.
Forty-three papers from a conference on microcomputers are presented under the following headings: Computing in the Curriculum, Information and Computer Science Information; Institutional and Administrative Computing, and Management, Services, and Training. Topics of the papers include the following: telecommunications projects that work in…
A method of non-contact reading code based on computer vision
NASA Astrophysics Data System (ADS)
Zhang, Chunsen; Zong, Xiaoyu; Guo, Bingxuan
2018-03-01
With the purpose of guarantee the computer information exchange security between internal and external network (trusted network and un-trusted network), A non-contact Reading code method based on machine vision has been proposed. Which is different from the existing network physical isolation method. By using the computer monitors, camera and other equipment. Deal with the information which will be on exchanged, Include image coding ,Generate the standard image , Display and get the actual image , Calculate homography matrix, Image distort correction and decoding in calibration, To achieve the computer information security, Non-contact, One-way transmission between the internal and external network , The effectiveness of the proposed method is verified by experiments on real computer text data, The speed of data transfer can be achieved 24kb/s. The experiment shows that this algorithm has the characteristics of high security, fast velocity and less loss of information. Which can meet the daily needs of the confidentiality department to update the data effectively and reliably, Solved the difficulty of computer information exchange between Secret network and non-secret network, With distinctive originality, practicability, and practical research value.
Jennings, Jacky M; Stover, Jeffrey A; Bair-Merritt, Megan H; Fichtenberg, Caroline; Munoz, Mary Grace; Maziad, Rafiq; Ketemepi, Sherry Johnson; Zenilman, Jonathan
2009-01-01
Integrated infectious disease surveillance information systems have the potential to provide important new surveillance capacities and business efficiencies for local health departments. We conducted a case study at a large city health department of the primary computer-based infectious disease surveillance information systems during a 10-year period to identify the major challenges for information integration across the systems. The assessment included key informant interviews and evaluations of the computer-based surveillance information systems used for acute communicable diseases, human immunodeficiency virus/acquired immunodeficiency syndrome, sexually transmitted diseases, and tuberculosis. Assessments were conducted in 1998 with a follow-up in 2008. Assessments specifically identified and described the primary computer-based surveillance information system, any duplicative information systems, and selected variables collected. Persistent challenges to information integration across the information systems included the existence of duplicative data systems, differences in the variables used to collect similar information, and differences in basic architecture. The assessments identified a number of challenges for information integration across the infectious disease surveillance information systems at this city health department. The results suggest that local disease control programs use computer-based surveillance information systems that were not designed for data integration. To the extent that integration provides important new surveillance capacities and business efficiencies, we recommend that patient-centric information systems be designed that provide all the epidemiologic, clinical, and research needs in one system. In addition, the systems should include a standard system of elements and fields across similar surveillance systems.
The Information Science Experiment System - The computer for science experiments in space
NASA Technical Reports Server (NTRS)
Foudriat, Edwin C.; Husson, Charles
1989-01-01
The concept of the Information Science Experiment System (ISES), potential experiments, and system requirements are reviewed. The ISES is conceived as a computer resource in space whose aim is to assist computer, earth, and space science experiments, to develop and demonstrate new information processing concepts, and to provide an experiment base for developing new information technology for use in space systems. The discussion covers system hardware and architecture, operating system software, the user interface, and the ground communication link.
Computing Information Value from RDF Graph Properties
DOE Office of Scientific and Technical Information (OSTI.GOV)
al-Saffar, Sinan; Heileman, Gregory
2010-11-08
Information value has been implicitly utilized and mostly non-subjectively computed in information retrieval (IR) systems. We explicitly define and compute the value of an information piece as a function of two parameters, the first is the potential semantic impact the target information can subjectively have on its recipient's world-knowledge, and the second parameter is trust in the information source. We model these two parameters as properties of RDF graphs. Two graphs are constructed, a target graph representing the semantics of the target body of information and a context graph representing the context of the consumer of that information. We computemore » information value subjectively as a function of both potential change to the context graph (impact) and the overlap between the two graphs (trust). Graph change is computed as a graph edit distance measuring the dissimilarity between the context graph before and after the learning of the target graph. A particular application of this subjective information valuation is in the construction of a personalized ranking component in Web search engines. Based on our method, we construct a Web re-ranking system that personalizes the information experience for the information-consumer.« less
Advanced information society(5)
NASA Astrophysics Data System (ADS)
Tanizawa, Ippei
Based on the advancement of information network technology information communication forms informationalized society giving significant impact on business activities and life style in it. The information network has been backed up technologically by development of computer technology and has got great contribution by enhanced computer technology and communication equipments. Information is transferred by digital and analog methods. Technical development which has brought out multifunctioned modems of communication equipments in analog mode, and construction of advanced information communication network which has come out by joint work of computer and communication under digital technique, are described. The trend in institutional matter and standardization of electrical communication is also described showing some examples of value-added network (VAN).
Active Computer Network Defense: An Assessment
2001-04-01
sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 3 2014-10-01 2014-10-01 false Information. 69.109 Section 69.109... Computation of Charges § 69.109 Information. (a) A charge shall be assessed upon all interexchange carriers..., the projected annual revenue requirement for the Information element shall be divided by 12 to compute...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 3 2012-10-01 2012-10-01 false Information. 69.109 Section 69.109... Computation of Charges § 69.109 Information. (a) A charge shall be assessed upon all interexchange carriers..., the projected annual revenue requirement for the Information element shall be divided by 12 to compute...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 3 2011-10-01 2011-10-01 false Information. 69.109 Section 69.109... Computation of Charges § 69.109 Information. (a) A charge shall be assessed upon all interexchange carriers..., the projected annual revenue requirement for the Information element shall be divided by 12 to compute...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 3 2013-10-01 2013-10-01 false Information. 69.109 Section 69.109... Computation of Charges § 69.109 Information. (a) A charge shall be assessed upon all interexchange carriers..., the projected annual revenue requirement for the Information element shall be divided by 12 to compute...
SIPP ACCESS: Information Tools Improve Access to National Longitudinal Panel Surveys.
ERIC Educational Resources Information Center
Robbin, Alice; David, Martin
1988-01-01
A computer-based, integrated information system incorporating data and information about the data, SIPP ACCESS systematically links technologies of laser disk, mainframe computer, microcomputer, and electronic networks, and applies relational technology to provide access to information about complex statistical data collections. Examples are given…
78 FR 49781 - Notice of Intent To Seek Approval To Establish an Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-15
... computer and information science and engineering. Awardees will be required to submit annual project... through the use of automated collection techniques or other forms of information technology. DATES...: Title of Collection: Computer and Information Science and Engineering Reporting Requirements. OMB Number...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 3 2010-10-01 2010-10-01 false Information. 69.109 Section 69.109... Computation of Charges § 69.109 Information. (a) A charge shall be assessed upon all interexchange carriers..., the projected annual revenue requirement for the Information element shall be divided by 12 to compute...
Build a better mouse: directly-observed issues in computer use for adults with SMI.
Black, Anne C; Serowik, Kristin L; Schensul, Jean J; Bowen, Anne M; Rosen, Marc I
2013-03-01
Integrating information technology into healthcare has the potential to bring treatment to hard-to-reach people. Individuals with serious mental illness (SMI), however, may derive limited benefit from these advances in care because of lack of computer ownership and experience. To date, conclusions about the computer skills and attitudes of adults with SMI have been based primarily on self-report. In the current study, 28 psychiatric outpatients with co-occurring cocaine use were interviewed about their computer use and opinions, and 25 were then directly observed using task analysis and think aloud methods as they navigated a multi-component health informational website. Participants reported low rates of computer ownership and use, and negative attitudes towards computers. Self-reported computer skills were higher than demonstrated in the task analysis. However, some participants spontaneously expressed more positive attitudes and greater computer self-efficacy after navigating the website. Implications for increasing access to computer-based health information are discussed.
Build a Better Mouse: Directly-Observed Issues in Computer Use for Adults with SMI
Black, Anne C.; Serowik, Kristin L.; Schensul, Jean J.; Bowen, Anne M.; Rosen, Marc I.
2014-01-01
Integrating information technology into healthcare has the potential to bring treatment to hard-to-reach people. Individuals with serious mental illness (SMI), however, may derive limited benefit from these advances in care because of lack of computer ownership and experience. To date, conclusions about the computer skills and attitudes of adults with SMI have been based primarily on self-report. In the current study, 28 psychiatric outpatients with co-occurring cocaine use were interviewed about their computer use and opinions, and 25 were then directly observed using task analysis and think aloud methods as they navigated a multi-component health informational website. Participants reported low rates of computer ownership and use, and negative attitudes towards computers. Self-reported computer skills were higher than demonstrated in the task analysis. However, some participants spontaneously expressed more positive attitudes and greater computer self-efficacy after navigating the website. Implications for increasing access to computer-based health information are discussed. PMID:22711454
AGIS: The ATLAS Grid Information System
NASA Astrophysics Data System (ADS)
Anisenkov, A.; Di Girolamo, A.; Klimentov, A.; Oleynik, D.; Petrosyan, A.; Atlas Collaboration
2014-06-01
ATLAS, a particle physics experiment at the Large Hadron Collider at CERN, produced petabytes of data annually through simulation production and tens of petabytes of data per year from the detector itself. The ATLAS computing model embraces the Grid paradigm and a high degree of decentralization and computing resources able to meet ATLAS requirements of petabytes scale data operations. In this paper we describe the ATLAS Grid Information System (AGIS), designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by the ATLAS Distributed Computing applications and services.
Computing, Information and Communications Technology (CICT) Website
NASA Technical Reports Server (NTRS)
Hardman, John; Tu, Eugene (Technical Monitor)
2002-01-01
The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).
Information-seeking practices of dental hygienists.
Gravois, S L; Fisher, W; Bowen, D M
1995-01-01
This paper reports on a survey of the information-seeking, critical-analysis, and computer-application practices of dental hygienists. Questionnaires were mailed to a convenience sample of seventy-one dental hygiene practitioners. A 62% response rate was achieved. Results indicated that discussions with colleagues, continuing education courses, journals, and newsletters were the sources used most frequently for professional development and information retrieval. To evaluate professional information, these hygienists tended to rely on personal experience, credibility of the journal, and discussions with colleagues. Word processing was the most frequently used computer application; online database searching was rare in this group. Computer used within the employment setting was primarily for business rather than clinical applications. Many hygienists were interested in attending continuing education courses on use of computers to acquire professional information. PMID:8547904
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
ERIC Educational Resources Information Center
Hausman, Carl R.
1985-01-01
To be creative, an act must have as its outcome something new in the way it is intelligible and valuable. Computers have restricted contexts of information and have no ability to weigh bits of information. Computer optimists presuppose either determinism or indeterminism, either of which abandons creativity. (MT)
Visualization Tools for Teaching Computer Security
ERIC Educational Resources Information Center
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng
2010-01-01
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Role of the ATLAS Grid Information System (AGIS) in Distributed Data Analysis and Simulation
NASA Astrophysics Data System (ADS)
Anisenkov, A. V.
2018-03-01
In modern high-energy physics experiments, particular attention is paid to the global integration of information and computing resources into a unified system for efficient storage and processing of experimental data. Annually, the ATLAS experiment performed at the Large Hadron Collider at the European Organization for Nuclear Research (CERN) produces tens of petabytes raw data from the recording electronics and several petabytes of data from the simulation system. For processing and storage of such super-large volumes of data, the computing model of the ATLAS experiment is based on heterogeneous geographically distributed computing environment, which includes the worldwide LHC computing grid (WLCG) infrastructure and is able to meet the requirements of the experiment for processing huge data sets and provide a high degree of their accessibility (hundreds of petabytes). The paper considers the ATLAS grid information system (AGIS) used by the ATLAS collaboration to describe the topology and resources of the computing infrastructure, to configure and connect the high-level software systems of computer centers, to describe and store all possible parameters, control, configuration, and other auxiliary information required for the effective operation of the ATLAS distributed computing applications and services. The role of the AGIS system in the development of a unified description of the computing resources provided by grid sites, supercomputer centers, and cloud computing into a consistent information model for the ATLAS experiment is outlined. This approach has allowed the collaboration to extend the computing capabilities of the WLCG project and integrate the supercomputers and cloud computing platforms into the software components of the production and distributed analysis workload management system (PanDA, ATLAS).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aimone, James Bradley; Betty, Rita
Using High Performance Computing to Examine the Processes of Neurogenesis Underlying Pattern Separation/Completion of Episodic Information - Sandia researchers developed novel methods and metrics for studying the computational function of neurogenesis, thus generating substantial impact to the neuroscience and neural computing communities. This work could benefit applications in machine learning and other analysis activities.
ERIC Educational Resources Information Center
Loesch, Martha Fallahay
2011-01-01
Two members of the library faculty at Seton Hall University teamed up with a respected professor of mathematics and computer science, in order to create an online course that introduces information literacy both from the perspectives of the computer scientist and from the instruction librarian. This collaboration is unique in that it addresses the…
Perspectives on Human-Computer Interface: Introduction and Overview.
ERIC Educational Resources Information Center
Harman, Donna; Lunin, Lois F.
1992-01-01
Discusses human-computer interfaces in information seeking that focus on end users, and provides an overview of articles in this section that (1) provide librarians and information specialists with guidelines for selecting information-seeking systems; (2) provide producers of information systems with directions for production or research; and (3)…
Nurses and health information technology: working with and around computers.
Peace, Jane
2011-01-01
Information technology is nearly ubiquitous in health care settings. Nurses need basic computer skills and information literacy to effectively practice nursing. In addition, nurses must be prepared not only to work around complex health information technology, but also to communicate with individuals who can address the underlying problems.
A Gaussian Approximation Approach for Value of Information Analysis.
Jalal, Hawre; Alarid-Escudero, Fernando
2018-02-01
Most decisions are associated with uncertainty. Value of information (VOI) analysis quantifies the opportunity loss associated with choosing a suboptimal intervention based on current imperfect information. VOI can inform the value of collecting additional information, resource allocation, research prioritization, and future research designs. However, in practice, VOI remains underused due to many conceptual and computational challenges associated with its application. Expected value of sample information (EVSI) is rooted in Bayesian statistical decision theory and measures the value of information from a finite sample. The past few years have witnessed a dramatic growth in computationally efficient methods to calculate EVSI, including metamodeling. However, little research has been done to simplify the experimental data collection step inherent to all EVSI computations, especially for correlated model parameters. This article proposes a general Gaussian approximation (GA) of the traditional Bayesian updating approach based on the original work by Raiffa and Schlaifer to compute EVSI. The proposed approach uses a single probabilistic sensitivity analysis (PSA) data set and involves 2 steps: 1) a linear metamodel step to compute the EVSI on the preposterior distributions and 2) a GA step to compute the preposterior distribution of the parameters of interest. The proposed approach is efficient and can be applied for a wide range of data collection designs involving multiple non-Gaussian parameters and unbalanced study designs. Our approach is particularly useful when the parameters of an economic evaluation are correlated or interact.
Asia-Pacific POPIN workshop on Internet.
1996-01-01
This brief article announces the accomplishments of the ESCAP Population Division of the Department of Economic and Social Information and Policy Analysis (DESIPA) in conjunction with the Asia-Pacific POPIN Internet (Information Superhighway) Training Workshop in popularizing useful new computer information technologies. A successful workshop was held in Bangkok in November 1996 for 18 people from 8 countries in the Asian and Pacific region, many of whom were from population information centers. Participants were taught some techniques for disseminating population data and information through use of the Internet computer facility. Participants learned 1) how to use Windows software in the ESCAP local area network (LAN), 2) about concepts such as HTML (hypertext mark-up language), and 3) detailed information about computer language. Computer practices involved "surfing the Net (Internet)" and linking with the global POPIN site on the Internet. Participants learned about computer programs for information handling and learned how to prepare documents using HTML, how to mount information on the World Wide Web (WWW) of the Internet, how to convert existing documents into "HTML-style" files, and how to scan graphics, such as logos, photographs, and maps, for visual display on the Internet. The Workshop and the three training modules was funded by the UN Population Fund (UNFPA). The POPIN Coordinator was pleased that competency was accomplished in such a short period of time.
Computer Abuse: Vandalizing the Information Society.
ERIC Educational Resources Information Center
Furnell, Steven M.; Warren, Matthew J.
1997-01-01
Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
In the early days of computer technology, few, if any, school districts had chief information officers (CIOs). Information Technology (IT) was handled by computer or technology coordinators, many of whom were classroom teachers with passing interests in computers and associated high-tech gadgets and gizmos. As districts began embracing CIOs, the…
Conflicts of interest improve collective computation of adaptive social structures
Brush, Eleanor R.; Krakauer, David C.; Flack, Jessica C.
2018-01-01
In many biological systems, the functional behavior of a group is collectively computed by the system’s individual components. An example is the brain’s ability to make decisions via the activity of billions of neurons. A long-standing puzzle is how the components’ decisions combine to produce beneficial group-level outputs, despite conflicts of interest and imperfect information. We derive a theoretical model of collective computation from mechanistic first principles, using results from previous work on the computation of power structure in a primate model system. Collective computation has two phases: an information accumulation phase, in which (in this study) pairs of individuals gather information about their fighting abilities and make decisions about their dominance relationships, and an information aggregation phase, in which these decisions are combined to produce a collective computation. To model information accumulation, we extend a stochastic decision-making model—the leaky integrator model used to study neural decision-making—to a multiagent game-theoretic framework. We then test alternative algorithms for aggregating information—in this study, decisions about dominance resulting from the stochastic model—and measure the mutual information between the resultant power structure and the “true” fighting abilities. We find that conflicts of interest can improve accuracy to the benefit of all agents. We also find that the computation can be tuned to produce different power structures by changing the cost of waiting for a decision. The successful application of a similar stochastic decision-making model in neural and social contexts suggests general principles of collective computation across substrates and scales. PMID:29376116
"Glitch Logic" and Applications to Computing and Information Security
NASA Technical Reports Server (NTRS)
Stoica, Adrian; Katkoori, Srinivas
2009-01-01
This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
Embracing the quantum limit in silicon computing.
Morton, John J L; McCamey, Dane R; Eriksson, Mark A; Lyon, Stephen A
2011-11-16
Quantum computers hold the promise of massive performance enhancements across a range of applications, from cryptography and databases to revolutionary scientific simulation tools. Such computers would make use of the same quantum mechanical phenomena that pose limitations on the continued shrinking of conventional information processing devices. Many of the key requirements for quantum computing differ markedly from those of conventional computers. However, silicon, which plays a central part in conventional information processing, has many properties that make it a superb platform around which to build a quantum computer. © 2011 Macmillan Publishers Limited. All rights reserved
Computer Literacy and Non-IS Majors
ERIC Educational Resources Information Center
Thomas, Jennifer D. E.; Blackwood, Martina
2010-01-01
This paper presents an investigation of non-Information Systems (IS) major's perceptions and performance when enrolled in a required introductory Computer Information Systems course. Students of various academic backgrounds were taught Excel, Hypertext Markup Language (HTML), JavaScript and computer literacy in a 14-week introductory course, in…
Prior Consent: Not-So-Strange Bedfellows Plan Library/Computing Partnerships.
ERIC Educational Resources Information Center
McDonough, Kristin
The increasing sophistication of information technologies and the nearly universal access to computing have blurred distinctions among information delivery units on college campuses, forcing institutions to rethink the separate organizational structures that evolved when computing in academe was more localized and less prevalent. Experiences in…
Use of computers and the Internet for health information by patients with epilepsy.
Escoffery, Cam; Diiorio, Colleen; Yeager, Katherine A; McCarty, Frances; Robinson, Elise; Reisinger, Elizabeth; Henry, Thomas; Koganti, Archana
2008-01-01
The purpose of this study was to describe computer and Internet use among an online group and a clinic-based group of people with epilepsy. Greater than 95% of the online group and 60% of the clinic group have access to computers and the Internet. More than 99% of the online group and 57% of the clinic group used the Internet to find health information. A majority of people reported being likely to employ an Internet-based self-management program to control their epilepsy. About 43% reported searching for general information on epilepsy, 30% for medication, 23% for specific types of epilepsy, and 20% for treatment. This study found that people with epilepsy have access to computers and the Internet, desire epilepsy-specific information, and are receptive to online health information on how to manage their epilepsy.
ERIC Educational Resources Information Center
Stevens, Mary Elizabeth
The series, of which this is the initial report, is intended to give a selective overview of research and development efforts and requirements in the computer and information sciences. The operations of information acquisition, sensing, and input to information processing systems are considered in generalized terms. Specific topics include but are…
ERIC Educational Resources Information Center
Cottrell, William B.; And Others
The Nuclear Safety Information Center (NSIC) is a highly sophisticated scientific information center operated at Oak Ridge National Laboratory (ORNL) for the U.S. Atomic Energy Commission. Its information file, which consists of both data and bibliographic information, is computer stored and numerous programs have been developed to facilitate the…
2010-04-01
technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in
Electronic Data Interchange in Procurement
1990-04-01
contract management and order processing systems. This conversion of automated information to paper and back to automated form is not only slow and...automated purchasing computer and the contractor’s order processing computer through telephone lines, as illustrated in Figure 1-1. Computer-to-computer...into the contractor’s order processing or contract management system. This approach - converting automated information to paper and back to automated
Fadeyi, A; Desalu, O O; Ameen, A; Adeboye, A N Muhammed
2010-01-01
The computer and information technology (IT) revolution have transformed modern health care systems in the areas of communication, storage, retrieval of medical information and teaching, but little is known about IT skill and use in most developing nations. The aim of this study has been to evaluate the reported preparedness and disposition by medical students in a Nigerian university toward the use of IT for medical education. A self-administered structured questionnaire containing 24 items was used to obtain information from medical students in the University of Ilorin, Nigeria on their level of computer usage, knowledge of computer software and hardware, availability and access to computer, possession of personal computer and e-mail address, preferred method of medical education and the use of computer as a supplement to medical education. Out of 479 medical students, 179 (37.4%) had basic computer skills, 209 (43.6%) had intermediate skills and 58(12.1%) had advanced computer skills. Three hundred and thirty (68.9%) have access to computer and 451(94.2%) have e-mail addresses. For medical teaching, majority (83.09%), preferred live lecture, 56.78% lecture videos, 35.1% lecture handout on web site and 410 (85.6%) wants computer as a supplement to live lectures. Less than half (39.5%) wants laptop acquisition to be mandatory. Students with advanced computer skills were well prepared and disposed to IT than those with basic computer skill. The findings revealed that the medical students with advanced computer skills were well prepared and disposed to IT based medical education. Therefore, high level of computer skill is required for them to be prepared and favorably disposed to IT based medical education.
ERIC Educational Resources Information Center
Neal, James G.
2000-01-01
Discusses objections in the library community to the Uniform Computer Information Transactions Act (UCITA), a legal framework being considered by state governments regarding computer information, transactions, and software. Topics include copyright issues; user needs for access to information; license agreements; and costs that may prevent…
7 CFR 2.89 - Chief Information Officer.
Code of Federal Regulations, 2014 CFR
2014-01-01
... continue, modify, or terminate an information technology program or project. (3) Provide advice and other... computer-based systems for message exchange, scheduling, computer conferencing, televideo technologies, and... removal or replacement of information technology project managers, when, in the opinion of the Chief...
7 CFR 2.89 - Chief Information Officer.
Code of Federal Regulations, 2013 CFR
2013-01-01
... continue, modify, or terminate an information technology program or project. (3) Provide advice and other... computer-based systems for message exchange, scheduling, computer conferencing, televideo technologies, and... removal or replacement of information technology project managers, when, in the opinion of the Chief...
Design for Run-Time Monitor on Cloud Computing
NASA Astrophysics Data System (ADS)
Kang, Mikyung; Kang, Dong-In; Yun, Mira; Park, Gyung-Leen; Lee, Junghoon
Cloud computing is a new information technology trend that moves computing and data away from desktops and portable PCs into large data centers. The basic principle of cloud computing is to deliver applications as services over the Internet as well as infrastructure. A cloud is the type of a parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources. The large-scale distributed applications on a cloud require adaptive service-based software, which has the capability of monitoring the system status change, analyzing the monitored information, and adapting its service configuration while considering tradeoffs among multiple QoS features simultaneously. In this paper, we design Run-Time Monitor (RTM) which is a system software to monitor the application behavior at run-time, analyze the collected information, and optimize resources on cloud computing. RTM monitors application software through library instrumentation as well as underlying hardware through performance counter optimizing its computing configuration based on the analyzed data.
Computing quantum discord is NP-complete
NASA Astrophysics Data System (ADS)
Huang, Yichen
2014-03-01
We study the computational complexity of quantum discord (a measure of quantum correlation beyond entanglement), and prove that computing quantum discord is NP-complete. Therefore, quantum discord is computationally intractable: the running time of any algorithm for computing quantum discord is believed to grow exponentially with the dimension of the Hilbert space so that computing quantum discord in a quantum system of moderate size is not possible in practice. As by-products, some entanglement measures (namely entanglement cost, entanglement of formation, relative entropy of entanglement, squashed entanglement, classical squashed entanglement, conditional entanglement of mutual information, and broadcast regularization of mutual information) and constrained Holevo capacity are NP-hard/NP-complete to compute. These complexity-theoretic results are directly applicable in common randomness distillation, quantum state merging, entanglement distillation, superdense coding, and quantum teleportation; they may offer significant insights into quantum information processing. Moreover, we prove the NP-completeness of two typical problems: linear optimization over classical states and detecting classical states in a convex set, providing evidence that working with classical states is generically computationally intractable.
Distributed information system (water fact sheet)
Harbaugh, A.W.
1986-01-01
During 1982-85, the Water Resources Division (WRD) of the U.S. Geological Survey (USGS) installed over 70 large minicomputers in offices across the country to support its mission in the science of hydrology. These computers are connected by a communications network that allows information to be shared among computers in each office. The computers and network together are known as the Distributed Information System (DIS). The computers are accessed through the use of more than 1500 terminals and minicomputers. The WRD has three fundamentally different needs for computing: data management; hydrologic analysis; and administration. Data management accounts for 50% of the computational workload of WRD because hydrologic data are collected in all 50 states, Puerto Rico, and the Pacific trust territories. Hydrologic analysis consists of 40% of the computational workload of WRD. Cost accounting, payroll, personnel records, and planning for WRD programs occupies an estimated 10% of the computer workload. The DIS communications network is shown on a map. (Lantz-PTT)
A learnable parallel processing architecture towards unity of memory and computing
NASA Astrophysics Data System (ADS)
Li, H.; Gao, B.; Chen, Z.; Zhao, Y.; Huang, P.; Ye, H.; Liu, L.; Liu, X.; Kang, J.
2015-08-01
Developing energy-efficient parallel information processing systems beyond von Neumann architecture is a long-standing goal of modern information technologies. The widely used von Neumann computer architecture separates memory and computing units, which leads to energy-hungry data movement when computers work. In order to meet the need of efficient information processing for the data-driven applications such as big data and Internet of Things, an energy-efficient processing architecture beyond von Neumann is critical for the information society. Here we show a non-von Neumann architecture built of resistive switching (RS) devices named “iMemComp”, where memory and logic are unified with single-type devices. Leveraging nonvolatile nature and structural parallelism of crossbar RS arrays, we have equipped “iMemComp” with capabilities of computing in parallel and learning user-defined logic functions for large-scale information processing tasks. Such architecture eliminates the energy-hungry data movement in von Neumann computers. Compared with contemporary silicon technology, adder circuits based on “iMemComp” can improve the speed by 76.8% and the power dissipation by 60.3%, together with a 700 times aggressive reduction in the circuit area.
A learnable parallel processing architecture towards unity of memory and computing.
Li, H; Gao, B; Chen, Z; Zhao, Y; Huang, P; Ye, H; Liu, L; Liu, X; Kang, J
2015-08-14
Developing energy-efficient parallel information processing systems beyond von Neumann architecture is a long-standing goal of modern information technologies. The widely used von Neumann computer architecture separates memory and computing units, which leads to energy-hungry data movement when computers work. In order to meet the need of efficient information processing for the data-driven applications such as big data and Internet of Things, an energy-efficient processing architecture beyond von Neumann is critical for the information society. Here we show a non-von Neumann architecture built of resistive switching (RS) devices named "iMemComp", where memory and logic are unified with single-type devices. Leveraging nonvolatile nature and structural parallelism of crossbar RS arrays, we have equipped "iMemComp" with capabilities of computing in parallel and learning user-defined logic functions for large-scale information processing tasks. Such architecture eliminates the energy-hungry data movement in von Neumann computers. Compared with contemporary silicon technology, adder circuits based on "iMemComp" can improve the speed by 76.8% and the power dissipation by 60.3%, together with a 700 times aggressive reduction in the circuit area.
Computer Anxiety: How to Measure It?
ERIC Educational Resources Information Center
McPherson, Bill
1997-01-01
Provides an overview of five scales that are used to measure computer anxiety: Computer Anxiety Index, Computer Anxiety Scale, Computer Attitude Scale, Attitudes toward Computers, and Blombert-Erickson-Lowrey Computer Attitude Task. Includes background information and scale specifics. (JOW)
Quantum Information Theory - an Invitation
NASA Astrophysics Data System (ADS)
Werner, Reinhard F.
Quantum information and quantum computers have received a lot of public attention recently. Quantum computers have been advertised as a kind of warp drive for computing, and indeed the promise of the algorithms of Shor and Grover is to perform computations which are extremely hard or even provably impossible on any merely ``classical'' computer.In this article I shall give an account of the basic concepts of quantum information theory is given, staying as much as possible in the area of general agreement.The article is divided into two parts. The first (up to the end of Sect. 2.5) is mostly in plain English, centered around the exploration of what can or cannot be done with quantum systems as information carriers. The second part, Sect. 2.6, then gives a description of the mathematical structures and of some of the tools needed to develop the theory.
Dissemination of Information in Developing Countries: The Personal Computer and beyond
ERIC Educational Resources Information Center
Wong, Wai-Man
2005-01-01
With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…
Battlefield Object Control via Internet Architecture
2002-01-01
superiority is the best way to reach the goal of competition superiority. Using information technology (IT) in data processing, including computer hardware... technologies : Global Positioning System (GPS), Geographic Information System (GIS), Battlefield Information Transmission System (BITS), and Intelligent...operational environment. Keywords: C4ISR Systems, Information Superiority, Battlefield Objects, Computer - Aided Prototyping System (CAPS), IP-based
Education and Library Services for Community Information Utilities.
ERIC Educational Resources Information Center
Farquhar, John A.
The concept of "computer utility"--the provision of computing and information service by a utility in the form of a national network to which any person desiring information could gain access--has been gaining interest among the public and among the technical community. This report on planning community information utilities discusses the…
Palm, Günther
2016-01-01
Research in neural information processing has been successful in the past, providing useful approaches both to practical problems in computer science and to computational models in neuroscience. Recent developments in the area of cognitive neuroscience present new challenges for a computational or theoretical understanding asking for neural information processing models that fulfill criteria or constraints from cognitive psychology, neuroscience and computational efficiency. The most important of these criteria for the evaluation of present and future contributions to this new emerging field are listed at the end of this article. PMID:26858632
Home Care Nursing via Computer Networks: Justification and Design Specifications
Brennan, Patricia Flatley
1988-01-01
High-tech home care includes the use of information technologies, such as computer networks, to provide direct care to patients in the home. This paper presents the justification and design of a project using a free, public access computer network to deliver home care nursing. The intervention attempts to reduce isolation and improve problem solving among home care patients and their informal caregivers. Three modules comprise the intervention: a decision module, a communications module, and an information data base. This paper describes the experimental evaluation of the project, and discusses issues in the delivery of nursing care via computers.
QUANTUM COMPUTING: Quantum Entangled Bits Step Closer to IT.
Zeilinger, A
2000-07-21
In contrast to today's computers, quantum computers and information technologies may in future be able to store and transmit information not only in the state "0" or "1," but also in superpositions of the two; information will then be stored and transmitted in entangled quantum states. Zeilinger discusses recent advances toward using this principle for quantum cryptography and highlights studies into the entanglement (or controlled superposition) of several photons, atoms, or ions.
Using Interactive Computer to Communicate Scientific Information.
ERIC Educational Resources Information Center
Selnow, Gary W.
1988-01-01
Asks whether the computer is another channel of communication, if its interactive qualities make it an information source, or if it is an undefined hybrid. Concludes that computers are neither the medium nor the source but will in the future provide the possibility of a sophisticated interaction between human intelligence and artificial…
Quo Vadimus? The 21st Century and Multimedia.
ERIC Educational Resources Information Center
Kuhn, Allan D.
This paper relates the concept of computer-driven multimedia to the National Aeronautics and Space Administration (NASA) Scientific and Technical Information Program (STIP). Multimedia is defined here as computer integration and output of text, animation, audio, video, and graphics. Multimedia is the stage of computer-based information that allows…
The Future of Computer-Based Toxicity Prediction:
Mechanism-Based Models vs. Information Mining Approaches
When we speak of computer-based toxicity prediction, we are generally referring to a broad array of approaches which rely primarily upon chemical structure ...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division... FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards... Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD...
NASA Technical Reports Server (NTRS)
Smith, Paul H.
1988-01-01
The Computer Science Program provides advanced concepts, techniques, system architectures, algorithms, and software for both space and aeronautics information sciences and computer systems. The overall goal is to provide the technical foundation within NASA for the advancement of computing technology in aerospace applications. The research program is improving the state of knowledge of fundamental aerospace computing principles and advancing computing technology in space applications such as software engineering and information extraction from data collected by scientific instruments in space. The program includes the development of special algorithms and techniques to exploit the computing power provided by high performance parallel processors and special purpose architectures. Research is being conducted in the fundamentals of data base logic and improvement techniques for producing reliable computing systems.
Is Your Mission Ready for the Information Age?
ERIC Educational Resources Information Center
Oblinger, Diana G.
1999-01-01
Urges institutions of higher education to evaluate their mission statements in light of current trends, especially the pervasive influence of information technology. Raises evaluative questions concerning information technology and distance learning, student services, the campus library, research computing, administrative computing, and public…
A Brief Analysis of Development Situations and Trend of Cloud Computing
NASA Astrophysics Data System (ADS)
Yang, Wenyan
2017-12-01
in recent years, the rapid development of Internet technology has radically changed people's work, learning and lifestyles. More and more activities are completed by virtue of computers and networks. The amount of information and data generated is bigger day by day, and people rely more on computer, which makes computing power of computer fail to meet demands of accuracy and rapidity from people. The cloud computing technology has experienced fast development, which is widely applied in the computer industry as a result of advantages of high precision, fast computing and easy usage. Moreover, it has become a focus in information research at present. In this paper, the development situations and trend of cloud computing shall be analyzed and researched.
Interfacing External Quantum Devices to a Universal Quantum Computer
Lagana, Antonio A.; Lohe, Max A.; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. PMID:22216276
DIALOG: An executive computer program for linking independent programs
NASA Technical Reports Server (NTRS)
Glatt, C. R.; Hague, D. S.; Watson, D. A.
1973-01-01
A very large scale computer programming procedure called the DIALOG executive system was developed for the CDC 6000 series computers. The executive computer program, DIALOG, controls the sequence of execution and data management function for a library of independent computer programs. Communication of common information is accomplished by DIALOG through a dynamically constructed and maintained data base of common information. Each computer program maintains its individual identity and is unaware of its contribution to the large scale program. This feature makes any computer program a candidate for use with the DIALOG executive system. The installation and uses of the DIALOG executive system are described.
Interfacing external quantum devices to a universal quantum computer.
Lagana, Antonio A; Lohe, Max A; von Smekal, Lorenz
2011-01-01
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations. Such information may come from specialized quantum devices or even from remote universal quantum computers. We show how to accomplish this by devising universal quantum computer programs that implement well known oracle based quantum algorithms, namely the Deutsch, Deutsch-Jozsa, and the Grover algorithms using external black-box quantum oracle devices. In the process, we demonstrate a method to map existing quantum algorithms onto the universal quantum computer. © 2011 Lagana et al.
Annual Report of the Metals and Ceramics Information Center, 1 May 1979-30 April 1980.
1980-07-01
MANAGEMENT AND ECONOMIC ANALYSIS DEPT. * Computer and Information SyslemsiD. C Operations 1 Battelle Technical Inputs to Planning * Computer Systems 0...Biomass Resources * Education 0 Business Planning * Information Systems * Economics , Planning and Policy Analysis * Statistical and Mathematical Modelrng...Metals and Ceramics Information Center (MCIC) is one of several technical information analysis centers (IAC’s) chartered and sponsored by the
Home Computer and Internet User Security
2005-01-01
Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB
Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J
2012-09-18
Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.
Architecture for hospital information integration
NASA Astrophysics Data System (ADS)
Chimiak, William J.; Janariz, Daniel L.; Martinez, Ralph
1999-07-01
The ongoing integration of hospital information systems (HIS) continues. Data storage systems, data networks and computers improve, data bases grow and health-care applications increase. Some computer operating systems continue to evolve and some fade. Health care delivery now depends on this computer-assisted environment. The result is the critical harmonization of the various hospital information systems becomes increasingly difficult. The purpose of this paper is to present an architecture for HIS integration that is computer-language-neutral and computer- hardware-neutral for the informatics applications. The proposed architecture builds upon the work done at the University of Arizona on middleware, the work of the National Electrical Manufacturers Association, and the American College of Radiology. It is a fresh approach to allowing applications engineers to access medical data easily and thus concentrates on the application techniques in which they are expert without struggling with medical information syntaxes. The HIS can be modeled using a hierarchy of information sub-systems thus facilitating its understanding. The architecture includes the resulting information model along with a strict but intuitive application programming interface, managed by CORBA. The CORBA requirement facilitates interoperability. It should also reduce software and hardware development times.
Asah, Flora
2013-04-01
This study discusses factors inhibiting computer usage for work-related tasks among computer-literate professional nurses within rural healthcare facilities in South Africa. In the past two decades computer literacy courses have not been part of the nursing curricula. Computer courses are offered by the State Information Technology Agency. Despite this, there seems to be limited use of computers by professional nurses in the rural context. Focus group interviews held with 40 professional nurses from three government hospitals in northern KwaZulu-Natal. Contributing factors were found to be lack of information technology infrastructure, restricted access to computers and deficits in regard to the technical and nursing management support. The physical location of computers within the health-care facilities and lack of relevant software emerged as specific obstacles to usage. Provision of continuous and active support from nursing management could positively influence computer usage among professional nurses. A closer integration of information technology and computer literacy skills into existing nursing curricula would foster a positive attitude towards computer usage through early exposure. Responses indicated that change of mindset may be needed on the part of nursing management so that they begin to actively promote ready access to computers as a means of creating greater professionalism and collegiality. © 2011 Blackwell Publishing Ltd.
Cardiology office computer use: primer, pointers, pitfalls.
Shepard, R B; Blum, R I
1986-10-01
An office computer is a utility, like an automobile, with benefits and costs that are both direct and hidden and potential for disaster. For the cardiologist or cardiovascular surgeon, the increasing power and decreasing costs of computer hardware and the availability of software make use of an office computer system an increasingly attractive possibility. Management of office business functions is common; handling and scientific analysis of practice medical information are less common. The cardiologist can also access national medical information systems for literature searches and for interactive further education. Selection and testing of programs and the entire computer system before purchase of computer hardware will reduce the chances of disappointment or serious problems. Personnel pretraining and planning for office information flow and medical information security are necessary. Some cardiologists design their own office systems, buy hardware and software as needed, write programs for themselves and carry out the implementation themselves. For most cardiologists, the better course will be to take advantage of the professional experience of expert advisors. This article provides a starting point from which the practicing cardiologist can approach considering, specifying or implementing an office computer system for business functions and for scientific analysis of practice results.
Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Torres, Aaron
2015-02-03
Techniques are provided for storing files in a parallel computing system using sub-files with semantically meaningful boundaries. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a plurality of sub-files. The method comprises the steps of obtaining a user specification of semantic information related to the file; providing the semantic information as a data structure description to a data formatting library write function; and storing the semantic information related to the file with one or more of the sub-files in one or more storage nodes of the parallel computing system. The semantic information provides a description of data in the file. The sub-files can be replicated based on semantically meaningful boundaries.
Parallel photonic information processing at gigabyte per second data rates using transient states
NASA Astrophysics Data System (ADS)
Brunner, Daniel; Soriano, Miguel C.; Mirasso, Claudio R.; Fischer, Ingo
2013-01-01
The increasing demands on information processing require novel computational concepts and true parallelism. Nevertheless, hardware realizations of unconventional computing approaches never exceeded a marginal existence. While the application of optics in super-computing receives reawakened interest, new concepts, partly neuro-inspired, are being considered and developed. Here we experimentally demonstrate the potential of a simple photonic architecture to process information at unprecedented data rates, implementing a learning-based approach. A semiconductor laser subject to delayed self-feedback and optical data injection is employed to solve computationally hard tasks. We demonstrate simultaneous spoken digit and speaker recognition and chaotic time-series prediction at data rates beyond 1Gbyte/s. We identify all digits with very low classification errors and perform chaotic time-series prediction with 10% error. Our approach bridges the areas of photonic information processing, cognitive and information science.
ERIC Educational Resources Information Center
Michelson, Avra; Rothenberg, Jeff
1993-01-01
The report considers the interaction of trends in information technology and trends in research practices and the policy implications for archives. The information is divided into 4 sections. The first section, an "Overview of Information Technology Trends," discusses end-user computing, which includes ubiquitous computing, end-user…
ERIC Educational Resources Information Center
Al-Khasawneh, Ahmad; Hammad, Bashar K.
2013-01-01
Service learning methodologies provide information systems students with the opportunity to create and implement systems in real-world, public service-oriented social contexts. This paper presents a case study of integrating a service learning project into an undergraduate Computer Information Systems course titled "Information Systems"…
1987-10-01
include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen
Abstracts of Research, July 1973 through June 1974.
ERIC Educational Resources Information Center
Ohio State Univ., Columbus. Computer and Information Science Research Center.
Abstracts of research papers in the fields of computer and information science are given; 72 papers are abstracted in the areas of information storage and retrieval, information processing, linguistic analysis, artificial intelligence, mathematical techniques, systems programing, and computer networks. In addition, the Ohio State University…
Management, Security, and Congressional Oversight. Federal Government Information Technology.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
This report considers the management, use, and congressional oversight of information technology in the Federal Government as rapid advances in technology--e.g., microcomputers, computer networking, computer modeling, videoconferencing, and electronic information exchange--are generating many new applications, opportunities, and issues which are…