WorldWideScience

Sample records for media access controller

  1. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  2. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  3. Trust-aware Privacy Control for Social Media

    OpenAIRE

    Li, Na; Najafian-Razavi, Maryam; Gillet, Denis

    2011-01-01

    Due to the huge exposure of personal information in social media, a challenge now is to design effective privacy mechanisms that protect against unauthorized access to social data. In this paper, a trust model for social media is first presented. Based on the trust model, a trust-aware privacy control protocol is proposed, that exploits the underlying inter-entity trust information. The objective is to design a fine-grained privacy scheme that ensures a user’s online information is disclosed ...

  4. Framing access to medicines in developing countries: an analysis of media coverage of Canada's Access to Medicines Regime.

    Science.gov (United States)

    Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare

    2010-01-04

    In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage

  5. Social Media Use and Access to Digital Technology in US Young Adults in 2016

    Science.gov (United States)

    Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-01-01

    Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these

  6. Media and youth: access, exposure, and privatization.

    Science.gov (United States)

    Roberts, D F

    2000-08-01

    To describe U.S. youth's access and exposure to the full array of media, as well as the social contexts in which media exposure occurs. A cross-sectional national random sample of 2065 adolescents aged 8 through 18 years, including oversamples of African-American and Hispanic youth, completed questionnaires about use of television, videotapes, movies, computers, video games, radio, compact discs, tape players, books, newspapers, and magazines. U.S. youngsters are immersed in media. Most households contain most media (computers and video game systems are the exception); the majority of youth have their own personal media. The average youth devotes 6 3/4 h to media; simultaneous use of multiple media increases exposure to 8 h of media messages daily. Overall, media exposure and exposure to individual media vary as a function of age, gender, race/ethnicity, and family socioeconomic level. Television remains the dominant medium. About one-half of the youth sampled uses a computer daily. A substantial proportion of children's and adolescents' media use occurs in the absence of parents. American youth devote more time to media than to any other waking activity, as much as one-third of each day. This demands increased parental attention and research into the effects of such extensive exposure.

  7. Social Media Use and Access to Digital Technology in US Young Adults in 2016.

    Science.gov (United States)

    Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-06-07

    In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with

  8. Accessible virtual reality therapy using portable media devices.

    Science.gov (United States)

    Bruck, Susan; Watters, Paul A

    2010-01-01

    Simulated immersive environments displayed on large screens are a valuable therapeutic asset in the treatment of a range of psychological disorders. Permanent environments are expensive to build and maintain, require specialized clinician training and technical support and often have limited accessibility for clients. Ideally, virtual reality exposure therapy (VRET) could be accessible to the broader community if we could use inexpensive hardware with specifically designed software. This study tested whether watching a handheld non-immersive media device causes nausea and other cybersickness responses. Using a repeated measure design we found that nausea, general discomfort, eyestrain, blurred vision and an increase in salivation significantly increased in response to handheld non-immersive media device exposure.

  9. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  10. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  11. Recommending access control decisions to social media users

    OpenAIRE

    Misra, Gaurav; Such, Jose M.

    2017-01-01

    Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy pro...

  12. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  13. The Role of Social Media Tools: Accessible Tourism for Disabled Citizens

    Science.gov (United States)

    Altinay, Zehra; Saner, Tulen; Bahçelerli, Nesrin M.; Altinay, Fahriye

    2016-01-01

    Knowledge sharing becomes important to accomplish digital citizenship. Social media tools become popular to share and diffuse the knowledge in the digitalization. This social media learning and knowledge sharing platforms provides accessibility to the services within societies especially for disabled citizens. This research study aims to evaluate…

  14. Media access and reliability for forest conservation support ...

    African Journals Online (AJOL)

    However majority (63.3%) of the respondents could not compare extension agents and mass media messages because they do not have access to extension agents. The study also observed a significant difference in the effectiveness of the different modes of receiving information in the three senatorial districts and a strong ...

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. New media and tobacco control.

    Science.gov (United States)

    Freeman, Becky

    2012-03-01

    This paper reviews how the tobacco industry is promoting its products online and examines possible regulation models to limit exposure to this form of marketing. Opportunities to use new media to advance tobacco control are also discussed and future research possibilities are proposed. Published articles and grey literature reports were identified through searches of the electronic databases, PUBMED and Google Scholar using a combination of the following search terms: tobacco or smoking and new media, online media, social media, internet media, Web 2.0, Facebook, YouTube and Twitter. A possible obstacle to fully realising the benefits of regulating tobacco marketing activities and effectively communicating tobacco control messages is the rapid evolution of the media landscape. New media also offer the tobacco industry a powerful and efficient channel for rapidly countering the denormalising strategies and policies of tobacco control. Evidence of tobacco promotion through online media is emerging, with YouTube being the most researched social media site in the tobacco control field. The explosive rise in Internet use and the shift to these new media being driven by consumer generated content through social platforms may mean that fresh approaches to regulating tobacco industry marketing are needed.

  17. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  18. A news media analysis of economic sanction effects on access to medicine in Iran.

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term "medicine" to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing "shortage of medicines," "medicines related issues" and "no shortage." We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran.

  19. A news media analysis of economic sanction effects on access to medicine in Iran

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    Objective: In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. Methods: We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term “medicine” to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing “shortage of medicines,” “medicines related issues” and “no shortage.” We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. Findings: A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Conclusion: Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran. PMID:26645026

  20. Using Social Media to Increase Accessibility to Online Teaching Resources.

    Science.gov (United States)

    O'Kelly, B; McHugh, S; McHugh, T; Fady, N; Boyle, E; Hill, A D K

    2015-09-01

    The key learning points of Surgical Grand Rounds (SGR) are often not accessible at times of exam revision for students. We sought to use Twitter as an online teaching repository. A SGR Twitter profile was created. 23 SGR presentations were made accessible on Twitter over a 3 month period. 93 students were invited to complete a questionnaire assessing usage of the repository. 84 (90%) in total responded, of these, 25 (80.6%) felt that the online provision of SGR through twitter was "useful". The majority (71%) felt that the online content was easily accessible. The novel use of social media is a useful adjunctive educational tool in accessing an online repository of SGR presentations.

  1. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  2. MediaTracker system

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, D. M. (Dana M.); Strittmatter, R. B. (Richard B.); Abeyta, J. D. (Joline D.); Brown, J. (John); Marks, T. (Thomas), Jr.; Martinez, B. J. (Benny J.); Jones, D. B. (Dana Benelli); Hsue, W.

    2004-01-01

    The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access to the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can

  3. MediaTracker system

    International Nuclear Information System (INIS)

    Sandoval, D.M.; Strittmatter, R.B.; Abeyta, J.D.; Brown, J.; Marks, T. Jr.; Martinez, B.J.; Jones, D.B.; Hsue, W.

    2004-01-01

    The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access to the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate

  4. Multi-Media Access and Presentation in the Twente Virtual Theatre Environment

    NARCIS (Netherlands)

    Correia, N.; Nijholt, Antinus; Cambell, T.; Davenport, G.

    2000-01-01

    This paper discusses a virtual world for presenting multi-media information and for natural interactions with the environment to get access to this information. Apart from mouse and keyboard input, interactions take place using speech and language. It is shown how this virtual environment can be

  5. Preference for and access to media resources as predictors of in ...

    African Journals Online (AJOL)

    The study investigated the extent to which preference for and access to media resources predicts knowledge of in-school adolescents to sexual and reproductive health issues in Lagos Mainland Local Government Area of Lagos State, Nigeria. A population of 526 in-school adolescents participates in the study while ...

  6. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  7. Print Media and ICT Access and Use among Female Academics in ...

    African Journals Online (AJOL)

    Literacy for women in the academics requires constant access and use of current and quality information from the media and their associated technologies. This paper discusses the challenges to functional literacy for women academics in the University of Jos and explains how their academic literacy can be enhanced to ...

  8. Smart surfaces with switchable superoleophilicity and superoleophobicity in aqueous media: Toward controllable oil/water separation

    KAUST Repository

    Zhang, L.

    2012-02-01

    Advanced materials with surfaces that have controllable oil wettability when submerged in aqueous media have great potential for various underwater applications. Here we have developed smart surfaces on commonly used materials, including non-woven textiles and polyurethane sponges, which are able to switch between superoleophilicity and superoleophobicity in aqueous media. The smart surfaces are obtained by grafting a block copolymer, comprising blocks of pH-responsive poly(2-vinylpyridine) and oleophilic/hydrophobic polydimethylsiloxane (i.e., P2VP-b-PDMS) on these materials. The P2VP block can alter its wettability and its conformation via protonation and deprotonation in response to the pH of the aqueous media, which provides controllable and switchable access of oil by the PDMS block, resulting in the switchable surface oil wettability in the aqueous media. On the other hand, the high flexibility of the PDMS block facilitates the reversible switching of the surface oil wettability. As a proof of concept, we also demonstrate that materials functionalized with our smart surfaces can be used for highly controllable oil/water separation processes.

  9. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    Youth experiencing homelessness are at a risk for a variety of adverse outcomes. Given the widespread use of the internet and social media, these new technologies may be used to address their needs and for outreach purposes. However, little is known about how this group uses these resources. This study investigated how homeless adolescents use these technologies for general and health-related purposes, whether the scope of their use changes with housing status, and their interest in a website dedicated to youth experiencing homelessness. A convenience sample of youth aged 18 to 21 years was recruited from a youth-specific homeless shelter. All participants completed a 47-item survey, with 10 individuals completing a semistructured interview. Descriptive statistics, exact testing, logistic regression, and generalized estimating equation modeling was performed for quantitative data analysis. Interviews were transcribed verbatim, and NVivo 10 (QSR International) was employed to facilitate double coding and thematic analysis. A total of 87 participants completed the survey with a mean age of 19.4 (SD 1.1) years. While experiencing homelessness, 56% (49/87) accessed the internet at least once a day, with 86% (75/87) accessing once a week. Access to a smartphone was associated with a 3.03 greater odds of accessing the internet and was the most frequently used device (66% of participants, 57/87). While experiencing homelessness, subjects reported a 68% decreased odds in internet access frequency (odds ratio [OR] 0.32, Psocial media use (OR 0.13, P=.01). Ten participants completed the semistructured interview. Several themes were identified, including (1) changes in internet behaviors while experiencing homelessness, (2) health status as a major concern and reason for Internet use, and (3) interest in a website dedicated to youth experiencing homelessness. While experiencing homelessness, participants indicated their behaviors were more goal-oriented and less focused on

  10. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  11. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    Science.gov (United States)

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  12. Access to mass media messages, and use of family planning in Nigeria: a spatio-demographic analysis from the 2013 DHS.

    Science.gov (United States)

    Ajaero, Chukwuedozie K; Odimegwu, Clifford; Ajaero, Ijeoma D; Nwachukwu, Chidiebere A

    2016-05-24

    Nigeria has the highest population in sub-Saharan Africa with high birth and growth rates. There is therefore need for family planning to regulate and stabilize this population. This study examined the relationship between access to mass media messages on family planning and use of family planning in Nigeria. It also investigated the impacts of spatio-demographic variables on the relationship between access to mass media messages and use of family planning. Data from the 2013 demographic and health survey of Nigeria which was conducted in all the 36 states of Nigeria, and Abuja were used for the study. The sample was weighted to ensure representativeness. Univariate, bivariate and binary logistic regressions were conducted. The relationship between each of the access to mass media messages, and the family planning variables were determined with Pearson correlation analysis. The correlation results showed significant but weak direct relationships between the access to mass media messages and use of family planning at p mass media messages on family planning, and on the use of family planning. The results showed that access to mass media messages increases the likelihood of the use of family planning. Also people with higher socioeconomic status and those from the Southern part of the country make more use of family planning. There is need to improve the socioeconomic status of the populations. Also, the quality and regularity of mass media messages should be improved, while other communication avenues such as traditional institutions, blogs, and seminars for youths should be used to make family planning messages more acceptable.

  13. Content, Accessibility, and Dissemination of Disaster Information via Social Media During the 2016 Louisiana Floods.

    Science.gov (United States)

    Scott, Katherine K; Errett, Nicole A

    2017-12-27

    Social media is becoming increasingly integrated into disaster response communication strategies of public health and emergency response agencies. We sought to assess the content, accessibility, and dissemination of social media communications made by government agencies during a disaster response. A cross-sectional analysis of social media posts made by federal, state, and local government, public health and emergency management agencies before, during, and after the 2016 Louisiana floods was conducted to determine their content, accessibility, and dissemination by level of government and time relative to disaster onset. Facebook and/or Twitter posts made by public agencies involved in the response to the 2016 Louisiana Flooding events (FEMA Disaster Declaration [DR-4277]) published between August 4 and September 16, 2016, publicly available online between February 21 and March 31, 2017, were included in the analysis. Content: The text of each post was assessed to determine whether it contained information on provision of situational awareness; addressing misconception, actionable requests; mental, behavioral, and emotional support; and/or recovery and rebuilding resources. Accessibility: A Flesh-Kincaid grade level of each post was calculated, and information on post language, originality, hyperlinks, visuals, videos, or hash tag was recorded. Dissemination: The average number of reacts/likes, shares/retweets, and comments per post was calculated. Most posts contained information related to situational awareness and recovery resources. There was an increase in messages during the first week of the disaster at all levels. Few posts were made in languages other than English. Compared with state and federal posts, local Facebook posts averaged fewer reacts, comments, and shares throughout the analysis period. Government agencies may maximize the use of social media platforms for disaster communications by establishing their social media network in advance of a

  14. A brief measure of social media self-control failure

    NARCIS (Netherlands)

    Du, Jie; van Koningsbruggen, Guido M.; Kerkhof, Peter

    People often fail in controlling their social media use when it conflicts with other goals and obligations. To facilitate research on understanding social media self-control failures, we constructed a brief social media self-control failure (SMSCF)-scale to assess how often social media users give

  15. Cancer prevention and control interventions using social media: user-generated approaches.

    Science.gov (United States)

    Cavallo, David N; Chou, Wen-Ying Sylvia; McQueen, Amy; Ramirez, Amelie; Riley, William T

    2014-09-01

    Social media are now used by a majority of American internet users. Social media platforms encourage participants to share information with their online social connections and exchange user-generated content. Significant numbers of people are already using social media to share health-related information. As such, social media provide an opportunity for "user-generated" cancer control and prevention interventions that employ users' behavior, knowledge, and existing social networks for the creation and dissemination of interventions. These interventions also enable novel data collection techniques and research designs that will allow investigators to examine real-time behavioral responses to interventions. Emerging social media-based interventions for modifying cancer-related behaviors have been applied to such domains as tobacco use, diet, physical activity, and sexual practices, and several examples are discussed for illustration purposes. Despite some promising early findings, challenges including inadequate user engagement, privacy concerns, and lack of internet access among some groups need to be addressed in future research. Recommendations for advancing the field include stronger partnerships with commercial technology companies, utilization of rapid and adaptive designs to identify successful strategies for user engagement, rigorous and iterative efficacy testing of these strategies, and inclusive methods for intervention dissemination. ©2014 American Association for Cancer Research.

  16. Access Denied: School Librarians' Responses to School District Policies on the Use of Social Media Tools

    Science.gov (United States)

    DiScala, Jeffrey; Weeks, Ann Carlson

    2013-01-01

    Public school districts often block access to online social media tools. While considered a preventive measure to ensure student safety and limit district liability, this policy strips school librarians and their collaborating teachers of opportunities to instruct students in using social media tools creatively and responsibly. Using one school…

  17. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  18. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  19. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  20. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  1. Access to mass media messages, and use of family planning in Nigeria: a spatio-demographic analysis from the 2013 DHS

    Directory of Open Access Journals (Sweden)

    Chukwuedozie K. Ajaero

    2016-05-01

    Full Text Available Abstract Background Nigeria has the highest population in sub-Saharan Africa with high birth and growth rates. There is therefore need for family planning to regulate and stabilize this population. This study examined the relationship between access to mass media messages on family planning and use of family planning in Nigeria. It also investigated the impacts of spatio-demographic variables on the relationship between access to mass media messages and use of family planning. Methods Data from the 2013 demographic and health survey of Nigeria which was conducted in all the 36 states of Nigeria, and Abuja were used for the study. The sample was weighted to ensure representativeness. Univariate, bivariate and binary logistic regressions were conducted. The relationship between each of the access to mass media messages, and the family planning variables were determined with Pearson correlation analysis. Results The correlation results showed significant but weak direct relationships between the access to mass media messages and use of family planning at p < 0.0001 with access to television messages (r = 0.239 being associated with highest use of family planning. Some of the results of the adjusted regression analysis showed that access to television messages (OR = 1.2.225; p < 0.0001, and radio messages (OR = 1.945; p < 0.0001 increase the likelihood of the use of family planning. The adjusted regression model also indicated increased likelihood in the use of family planning by respondents with secondary education (OR = 2.709; p < 0.0001, the married (OR = 1.274; p < 0.001, and respondents within the highest wealth quintiles (OR = 3.442; p < 0.0001. Conclusions There exist significant variations within spatio-demographic groups with regards to having access to mass media messages on family planning, and on the use of family planning. The results showed that access to mass media messages increases the

  2. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  3. Social role of the media: Control of social reality

    Directory of Open Access Journals (Sweden)

    Đukić Nemanja

    2012-01-01

    Full Text Available Through analysis of the nature and character of media practice, the paper shows that the media are basic political instrument of manipulative social control of the democratic order. Control of social reality as a fundamental social role of the media stems from the manipulative power of the media that is based in the strategies of production and control of the symbolic potential of the society. Through the production and control of the symbolic potential of the society, the media transform symbolic power in social action or absence of social action through homogenization and activate individuals and social groups in public opinion or their dispersion and breaking off in the public. Development of manipulation, control, oppression, domination and hegemony, the media becomes a product of instrumentalist mind which contributing 'colonization of the lifeworld' and the development of modern society which on a rational way becoming totalitarian.

  4. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  5. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  6. Academic e-learning experience in the enhancement of open access audiovisual and media education

    OpenAIRE

    Pacholak, Anna; Sidor, Dorota

    2015-01-01

    The paper presents how the academic e-learning experience and didactic methods of the Centre for Open and Multimedia Education (COME UW), University of Warsaw, enhance the open access to audiovisual and media education at various levels of education. The project is implemented within the Audiovisual and Media Education Programme (PEAM). It is funded by the Polish Film Institute (PISF). The aim of the project is to create a proposal of a comprehensive and open programme for the audiovisual (me...

  7. Boundary control of fluid flow through porous media

    DEFF Research Database (Denmark)

    Hasan, Agus; Foss, Bjarne; Sagatun, Svein Ivar

    2010-01-01

    The flow of fluids through porous media can be described by the Boussinesq’s equation with mixed boundary conditions; a Neumann’s boundary condition and a nonlinear boundary condition. The nonlinear boundary condition provides a means to control the fluid flow through porous media. In this paper,......, some stabilizing controllers are constructed for various cases using Lyapunov design.......The flow of fluids through porous media can be described by the Boussinesq’s equation with mixed boundary conditions; a Neumann’s boundary condition and a nonlinear boundary condition. The nonlinear boundary condition provides a means to control the fluid flow through porous media. In this paper...

  8. Mass Media as Instruments for Political and Social Control in China: Media Role in Chinese Politics

    OpenAIRE

    Chen, Xi

    2003-01-01

    Under the influence of Soviet media theory, Chinese media have been held under the control of the Communist Party of China ever since the Party was established in 1921. However, this practice of control was subject to change as a result of rapid economic development and many social changes brought about by economic reform after 1978. This thesis explores the current situation of media control in China. Although the mass media in China began to enjoy more autonomy and diversity after the natio...

  9. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  10. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2014-12-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  11. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2016-01-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  12. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  13. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  14. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  15. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  16. 21 CFR 866.2480 - Quality control kit for culture media.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Quality control kit for culture media. 866.2480... control kit for culture media. (a) Identification. A quality control kit for culture media is a device...-dried, viable microorganism, intended for medical purposes to determine if a given culture medium is...

  17. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  18. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  19. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  20. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  1. The Strategic Combination of Open-Access Peer-Review, Mainstream Media and Social Media to Improve Public Climate Literacy (Invited)

    Science.gov (United States)

    Cook, J.; Nuccitelli, D. A.; Jacobs, P.

    2013-12-01

    The Skeptical Science website began in 2007, with the goal of refuting climate misinformation with peer-reviewed science. It achieved this by embracing a diversity of message formats and delivery methods. Myth rebuttals are available at beginner, intermediate and advanced levels, spanning from long, technical treatments to tweetable one-liners. Content has been translated into 20 different languages and made available via the web, an iPhone app and books while adopted by third parties in textbooks, university and MOOC curricula, books, Senate testimonies and TV documentaries. While social media has been a fruitful medium, we experimented with a new model in 2013, employing the strategic combination of open-access peer-review, mainstream media outreach and social media marketing. This strategy was adopted with the release of a paper quantifying the level of scientific consensus in published climate papers, resulting in broad mainstream media attention as well as acknowledgement from key public figures such as Al Gore, the UK Minister for Energy Edward Davey and President Obama. Our approach was informed by psychological research into both the importance of scientific consensus and how to reduce the influence of misconceptions. While multiple methods of delivery are important, equally important is the construction of the messages themselves. I will examine the science of crafting compelling messages and how combination with diverse message delivery can lead to impactful outcomes.

  2. Enhancing Access to Land Remote Sensing Data through Mainstream Social Media Channels

    Science.gov (United States)

    Sohre, T.; Maiersperger, T.

    2011-12-01

    Social media tools are changing the way that people discover information, communicate, and collaborate. Government agencies supporting the Land Remote Sensing user community have begun taking advantage of standard social media tools and capabilities. National Aeronautics and Space Administration (NASA) Earth Observing System (EOS) data centers have started providing outreach utilizing services including Facebook, Twitter, and YouTube videos. Really Simple Syndication (RSS) Feeds have become more standard means of sharing information, and a DataCasting tool was created as a NASA Technology Infusion effort to make RSS-based technology for accessing Earth Science information available. The United States Geological Survey (USGS) has also started using social media to allow the community access to news feeds and real-time earthquake alerts; listen to podcasts; get updates on new USGS publications, videos, and photographs; and more. Twitter feeds have been implemented in 2011 for the USGS Land Cover and Landsat user communities. In early 2011, the NASA Land Processes Distributed Active Archive Center (LP DAAC) user working group suggested the investigation of concepts for creating and distributing "bundles" of data, which would aggregate theme-based data sets from multiple sources. The LP DAAC is planning to explore the use of standard social bookmarking tools to support community developed bundles through the use of tools such as Delicious, Digg, or StumbleUpon. This concept would allow science users to organize and discover common links to data resources based on community developed tags, or a folksonomy. There are challenges that will need to be addressed such as maintaining the quality of tags but a social bookmarking system may have advantages over traditional search engines or formal ontologies for identifying and labeling various data sets relevant to a theme. As classification is done by the community of scientists who understand the data, the tagged data sets

  3. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  4. Parental Control of the Time Preadolescents Spend on Social Media: Links with Preadolescents' Social Media Appearance Comparisons and Mental Health.

    Science.gov (United States)

    Fardouly, Jasmine; Magson, Natasha R; Johnco, Carly J; Oar, Ella L; Rapee, Ronald M

    2018-07-01

    Time spent on social media and making online comparisons with others may influence users' mental health. This study examined links between parental control over the time their child spends on social media, preadolescents' time spent browsing social media, preadolescents' appearance comparisons on social media, and preadolescents' appearance satisfaction, depressive symptoms, and life satisfaction. Preadolescent social media users (N = 284, 49.1% female; aged 10-12) and one of their parents completed online surveys. Preadolescents, whose parents reported greater control over their child's time on social media, reported better mental health. This relationship was mediated by preadolescents spending less time browsing and making fewer appearance comparisons on social media. Parental control over time spent on social media may be associated with benefits for mental health among preadolescents.

  5. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  6. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  7. Planning for the Automation of School Library Media Centers.

    Science.gov (United States)

    Caffarella, Edward P.

    1996-01-01

    Geared for school library media specialists whose centers are in the early stages of automation or conversion to a new system, this article focuses on major components of media center automation: circulation control; online public access catalogs; machine readable cataloging; retrospective conversion of print catalog cards; and computer networks…

  8. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  9. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  10. Controlling nonlinear waves in excitable media

    International Nuclear Information System (INIS)

    Puebla, Hector; Martin, Roland; Alvarez-Ramirez, Jose; Aguilar-Lopez, Ricardo

    2009-01-01

    A new feedback control method is proposed to control the spatio-temporal dynamics in excitable media. Applying suitable external forcing to the system's slow variable, successful suppression and control of propagating pulses as well as spiral waves can be obtained. The proposed controller is composed by an observer to infer uncertain terms such as diffusive transport and kinetic rates, and an inverse-dynamics feedback function. Numerical simulations shown the effectiveness of the proposed feedback control approach.

  11. Controlling nonlinear waves in excitable media

    Energy Technology Data Exchange (ETDEWEB)

    Puebla, Hector [Departamento de Energia, Universidad Autonoma Metropolitana, Av. San Pablo No. 180, Reynosa-Tamaulipas, Azcapotzalco 02200, DF, Mexico (Mexico)], E-mail: hpuebla@correo.azc.uam.mx; Martin, Roland [Laboratoire de Modelisation et d' Imagerie en Geosciences, CNRS UMR and INRIA Futurs Magique-3D, Universite de Pau (France); Alvarez-Ramirez, Jose [Division de Ciencias Basicas e Ingenieria, Universidad Autonoma Metropolitana-Iztapalapa (Mexico); Aguilar-Lopez, Ricardo [Departamento de Biotecnologia y Bioingenieria, CINVESTAV-IPN (Mexico)

    2009-01-30

    A new feedback control method is proposed to control the spatio-temporal dynamics in excitable media. Applying suitable external forcing to the system's slow variable, successful suppression and control of propagating pulses as well as spiral waves can be obtained. The proposed controller is composed by an observer to infer uncertain terms such as diffusive transport and kinetic rates, and an inverse-dynamics feedback function. Numerical simulations shown the effectiveness of the proposed feedback control approach.

  12. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  13. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  14. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  15. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  16. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  17. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  18. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  19. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  20. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  1. Talking to Adolescents About Social Media.

    Science.gov (United States)

    Dawson, Rachel S

    2017-08-01

    I see a large number of adolescents in my clinic with issues related to their social media use. These issues range from lack of sleep, to depression, to cyberbullying, and even sex trafficking, all secondary to constant social media exposure. Pediatricians should ask about social media use when they see children and adolescents who already have access to electronic devices. They should also ask parents about controls that are set in place to monitor social media use, content, and friend connections on those sites. They should ensure that their children know personally everyone they are connected to on social media and that their accounts are always private and not public. This will help reduce many of the issues associated with the potential consequences of social media use. [Pediatr Ann. 2017;46(8):e274-e276.]. Copyright 2017, SLACK Incorporated.

  2. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  3. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  4. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  5. Media bias under direct and indirect government control: when is the bias smaller?

    OpenAIRE

    Abhra Roy

    2015-01-01

    We present an analytical framework to compare media bias under direct and indirect government control. In this context, we show that direct control can lead to a smaller bias and higher welfare than indirect control. We further show that the size of the advertising market affects media bias only under direct control. Media bias, under indirect control, is not affected by the size of the advertising market.

  6. Generating news media interest in tobacco control; challenges in an advanced policy environment.

    Science.gov (United States)

    MacKenzie, Ross; Chapman, Simon

    2012-08-01

    To determine the efficacy of using media releases for tobacco control advocacy in Australia's advanced policy environment. Between February and August 2010, news releases that summarised either newly published but unpublicized research findings, or local developments in tobacco control, were sent to NSW media outlets. Reports arising from the releases were tracked using commercial services Media Monitors and Factiva, as well as Google and Google News. Other tobacco control related news items during the same period were also tracked and recorded. Twenty-one news releases generated 93 news items across all news media, with a quarter of these related to a story of porcine haemoglobin in cigarette filters. By comparison, 'live' policy issues (especially plain packaging and a significant tobacco tax increase) covered in this period attracted 1,033 news stories in the Australian media. Press releases describing recently published, but underpublicized research were issued in weeks where no major competing tobacco control news occurred. Results of this project indicate that in environments with advanced tobacco policy, media opportunities related to tobacco control advocacy are limited, as many objectives have been achieved. The media can still play a key advocacy role in such environments, and advocates need to be particularly vigilant for opportunities that do arise. The paper also highlights the increasingly important role of internet-based media, including opportunities presented by social media for tobacco control.

  7. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    Segalard, Jean

    1970-01-01

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  8. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  9. Making Dutch pupils media conscious: preadolescents' self-assessment of possible media risks and the need for media education

    NARCIS (Netherlands)

    Küter-Luks, Theresa; Heuvelman, A.; Peters, O.

    2011-01-01

    Despite clear European and Dutch policies about media education, there is currently no media education curriculum in Dutch schools. A survey among preadolescents (n = 257) in six primary schools in the Netherlands included questions regarding media access, fears, risks, parental mediation of

  10. Looking to the future of new media in health marketing: deriving propositions based on traditional theories.

    Science.gov (United States)

    Della, Lindsay J; Eroglu, Dogan; Bernhardt, Jay M; Edgerton, Erin; Nall, Janice

    2008-01-01

    Market trend data show that the media marketplace continues to rapidly evolve. Recent research shows that substantial portions of the U.S. media population are "new media" users. Today, more than ever before, media consumers are exposed to multiple media at the same point in time, encouraged to participate in media content generation, and challenged to learn, access, and use the new media that are continually entering the market. These media trends have strong implications for how consumers of health information access, process, and retain health-related knowledge. In this article we review traditional information processing models and theories of interpersonal and mass media access and consumption. We make several theory-based propositions for how traditional information processing and media consumption concepts will function as new media usage continues to increase. These propositions are supported by new media usage data from the Centers for Disease Control and Prevention's entry into the new media market (e.g., podcasting, virtual events, blogging, and webinars). Based on these propositions, we conclude by presenting both opportunities and challenges that public health communicators and marketers will face in the future.

  11. The New News Media: Democratic implications of undergraduate education and news consumption over social and traditional media

    OpenAIRE

    Miller, Jennifer

    2013-01-01

    Communication students at Simon Fraser University were surveyed and interviewed to deduce perceptions and behaviour of news consumption over social and traditional media. Both social media and traditional media are used to consume news with traditional media acting as the primary news source and as more accessible and reliable than social media. News stories considered important or having various perspectives were verified the most, especially world news. Extent of accessibility of sources an...

  12. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  13. Personalised Access to Social Media

    NARCIS (Netherlands)

    M. Clements (Maarten)

    2010-01-01

    htmlabstractOn many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making

  14. [Media use with developmental benefits].

    Science.gov (United States)

    Hipeli, E; Süss, D

    2012-08-01

    For children of school age television is still the dominant medium. TV consumption isn't only limited on the TV set, but also happens on the computer with internet access and mobile devices. Computer games take a high priority for boys. For girls reading is still an important experience space. Parents influence the media use of their children by their role model, and the rates for shared non-media experiences. Neighborhoods which aren't child-friendly can cause children's withdraw into home media spaces. Restrictions and controls are less important than the conversations that are conducted around media interests of the child and parents attention to early signs of problematic media use. Potentially irritating media content for children (such as violence or sex) can have strong effects when there's no open debate taking place in the family around these issues. Today's media diversity leads to parallel surfing and multi-tasking. In order that this doesn't influence children's cognitive development and learning negatively a culture of regular restriction to one activity, to which they devote their full attention, is required.

  15. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  16. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  17. Personalised Access to Social Media

    NARCIS (Netherlands)

    Clements, M.

    2010-01-01

    On many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making use of

  18. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  19. The Military and The Media in Combat: Winning the Hearts and Minds of the American Public

    National Research Council Canada - National Science Library

    Stinnette, Murrell

    2000-01-01

    .... This paper seeks to frame the current relationship between the military and media by examining past operations in Grenada, Panama, and Iraq in terms of evolving media access and military control since Vietnam...

  20. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  1. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  2. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  3. High job control enhances vagal recovery in media work.

    Science.gov (United States)

    Lindholm, Harri; Sinisalo, Juha; Ahlberg, Jari; Jahkola, Antti; Partinen, Markku; Hublin, Christer; Savolainen, Aslak

    2009-12-01

    Job strain has been linked to increased risk of cardiovascular diseases. In modern media work, time pressures, rapidly changing situations, computer work and irregular working hours are common. Heart rate variability (HRV) has been widely used to monitor sympathovagal balance. Autonomic imbalance may play an additive role in the development of cardiovascular diseases. To study the effects of work demands and job control on the autonomic nervous system recovery among the media personnel. From the cross-sectional postal survey of the employees in Finnish Broadcasting Company (n = 874), three age cohorts (n = 132) were randomly selected for an analysis of HRV in 24 h electrocardiography recordings. In the middle-aged group, those who experienced high job control had significantly better vagal recovery than those with low or moderate control (P work rather than low demands seemed to enhance autonomic recovery in middle-aged media workers. This was independent of poor health habits such as smoking, physical inactivity or alcohol consumption.

  4. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  5. Media analysis of radioactive wastes

    International Nuclear Information System (INIS)

    Janowski, M.J.

    1989-01-01

    The radioactive waste cleanup community has not effectively utilized its most powerful communications tool to inform the general public; the print and broadcast media. Environmental interest groups have known of the value of accessing the media for their message for years and have used it effectively. The radioactive waste cleanup community's efforts to date have not been focused on education of the media so that they in turn can inform the public of our cleanup mission. Their focus must be to learn of the importance of the media, develop training programs that train technical people in how to know and respond to the media's needs for information, and then incorporate that training into a comprehensive program of public information in which access to the media is a key communications tool. This paper discusses how media education and access is a cost-effective means of accomplishing community relations goals of public information and public participation in radioactive waste cleanup and has been effectively utilized at the Weldon Spring Site Remedial Action Project

  6. Making Dutch Pupils Media Conscious: Preadolescents' Self-Assessment of Possible Media Risks and the Need for Media Education

    Science.gov (United States)

    Kuter-Luks, Theresa; Heuvelman, Ard; Peters, Oscar

    2011-01-01

    Despite clear European and Dutch policies about media education, there is currently no media education curriculum in Dutch schools. A survey among preadolescents (n = 257) in six primary schools in the Netherlands included questions regarding media access, fears, risks, parental mediation of television and the internet, and the need for media…

  7. Youth media lifestyles

    NARCIS (Netherlands)

    van Kruistum, Claudia; Leseman, Paul Pm; de Haan, Mariëtte

    2014-01-01

    In this article, the concept of "media lifestyles" is adopted in order to develop a comprehensive approach toward youth engagement in communication media. We explore how 503 Dutch eighth grade students with full access to new technology combine a broad range of media by focusing on their engagement

  8. Access to specific social resources across different social media : divergent consequences of the time spent with new contacts

    NARCIS (Netherlands)

    Matzat, U.; Sadowski, B.M.

    2015-01-01

    Despite a large number of studies on the social impact of the Internet, little is known about the specific social resources to which social media provide access. Most studies have either examined issues surrounding the question whether or not new online contacts have been established or they have

  9. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  10. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  11. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  12. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  13. Desensitization to media violence: links with habitual media violence exposure, aggressive cognitions, and aggressive behavior.

    Science.gov (United States)

    Krahé, Barbara; Möller, Ingrid; Huesmann, L Rowell; Kirwil, Lucyna; Felber, Juliane; Berger, Anja

    2011-04-01

    This study examined the links between desensitization to violent media stimuli and habitual media violence exposure as a predictor and aggressive cognitions and behavior as outcome variables. Two weeks after completing measures of habitual media violence exposure, trait aggression, trait arousability, and normative beliefs about aggression, undergraduates (N = 303) saw a violent film clip and a sad or a funny comparison clip. Skin conductance level (SCL) was measured continuously, and ratings of anxious and pleasant arousal were obtained after each clip. Following the clips, participants completed a lexical decision task to measure accessibility of aggressive cognitions and a competitive reaction time task to measure aggressive behavior. Habitual media violence exposure correlated negatively with SCL during violent clips and positively with pleasant arousal, response times for aggressive words, and trait aggression, but it was unrelated to anxious arousal and aggressive responding during the reaction time task. In path analyses controlling for trait aggression, normative beliefs, and trait arousability, habitual media violence exposure predicted faster accessibility of aggressive cognitions, partly mediated by higher pleasant arousal. Unprovoked aggression during the reaction time task was predicted by lower anxious arousal. Neither habitual media violence usage nor anxious or pleasant arousal predicted provoked aggression during the laboratory task, and SCL was unrelated to aggressive cognitions and behavior. No relations were found between habitual media violence viewing and arousal in response to the sad and funny film clips, and arousal in response to the sad and funny clips did not predict aggressive cognitions or aggressive behavior on the laboratory task. This suggests that the observed desensitization effects are specific to violent content.

  14. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  15. Open access monographs: a humanities research perspective

    Directory of Open Access Journals (Sweden)

    Dr Jim Cheshire

    2014-04-01

    Full Text Available This article discusses the thoughts of a humanities researcher in relation to open access (OA publishing. Digital media have dramatically improved access to historic texts but library e-books are frustrating due to software and loan arrangements. Authors of illustrated books risk losing control of book design, although new media offer opportunities to improve image quality and access. Alfred Tennyson's career shows that authors have been sensitive about the physical form of their work since the Victorian period and ignoring the material significance of the book could make us overlook the fundamental changes that the e-book represents. Monographs retain value as a way of evaluating substantive research projects and those published through the OA process will have great advantages over the commercial e-book. ‘Green’ OA publishing is impractical for humanities scholars and funded ‘gold’ OA publishing is likely to involve a labour-intensive application process.

  16. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  17. Does Media Multitasking Always Hurt?

    Directory of Open Access Journals (Sweden)

    Lui Fai Hong

    2011-05-01

    Full Text Available Chronic heavy media multitaskers have been found impaired cognitive performance on certain cognitive tasks (Ophir, Nass & Wagner, 2009. However, the poor performance may be caused by their breadth-biased style of cognitive control rather than a deficit in cognitive abilities such as the ability to filter out interference from irrelevant stimuli and representations in memory. In this study, a new media multitasking index was invented to differentiate heavy and light media multitaskers by adding three open ended questions to the Media Use Questionnaire used by Ophir, Nass and Wagner (2009. Also, four different cognitive tasks, which access the ability of attentional capture, attention allocation to infrequent information, task switching and crossmodal integration, were used to investigate whether the poor performance of heavy media multitaskers is general to a wider range of tasks. Preliminary results found that heavy media multitaskers showed better improvement in accuracy between the sound present condition and sound absent condition of Pip and Pop Task (Van der Burg, Olivers, Bronkhorst, & theeuwes, 2008. Heavy media multitaskers appeared to have better ability of crossmodal integration than light medie multitaskers; hence, their poor performance is limited in only certain cognitive tasks.

  18. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  19. Association Between Portable Screen-Based Media Device Access or Use and Sleep Outcomes: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Carter, Ben; Rees, Philippa; Hale, Lauren; Bhattacharjee, Darsharna; Paradkar, Mandar S

    2016-12-01

    Sleep is vital to children's biopsychosocial development. Inadequate sleep quantity and quality is a public health concern with an array of detrimental health outcomes. Portable mobile and media devices have become a ubiquitous part of children's lives and may affect their sleep duration and quality. To conduct a systematic review and meta-analysis to examine whether there is an association between portable screen-based media device (eg, cell phones and tablet devices) access or use in the sleep environment and sleep outcomes. A search strategy consisting of gray literature and 24 Medical Subject Headings was developed in Ovid MEDLINE and adapted for other databases between January 1, 2011, and June 15, 2015. Searches of the published literature were conducted across 12 databases. No language restriction was applied. The analysis included randomized clinical trials, cohort studies, and cross-sectional study designs. Inclusion criteria were studies of school-age children between 6 and 19 years. Exclusion criteria were studies of stationary exposures, such as televisions or desktop or personal computers, or studies investigating electromagnetic radiation. Of 467 studies identified, 20 cross-sectional studies were assessed for methodological quality. Two reviewers independently extracted data. The primary outcomes were inadequate sleep quantity, poor sleep quality, and excessive daytime sleepiness, studied according to an a priori protocol. Twenty studies were included, and their quality was assessed. The studies involved 125 198 children (mean [SD] age, 14.5 [2.2] years; 50.1% male). There was a strong and consistent association between bedtime media device use and inadequate sleep quantity (odds ratio [OR], 2.17; 95% CI, 1.42-3.32) (P sleep quality (OR, 1.46; 95% CI, 1.14-1.88) (P = .003, I2 = 76%), and excessive daytime sleepiness (OR, 2.72; 95% CI, 1.32-5.61) (P = .007, I2 = 50%). In addition, children who had access to (but did not use) media

  20. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  1. Randomized Controlled Trial of Social Media: Effect of Increased Intensity of the Intervention.

    Science.gov (United States)

    Fox, Caroline S; Gurary, Ellen B; Ryan, John; Bonaca, Marc; Barry, Karen; Loscalzo, Joseph; Massaro, Joseph

    2016-04-27

    A prior randomized controlled trial of social media exposure at Circulation determined that social media did not increase 30-day page views. Whether insufficient social media intensity contributed to these results is uncertain. Original article manuscripts were randomized to social media exposure compared with no social media exposure (control) at Circulation beginning in January 2015. Social media exposure consisted of Facebook and Twitter posts on the journal's accounts. To increase social media intensity, a larger base of followers was built using advertising and organic growth, and posts were presented in triplicate and boosted on Facebook and retweeted on Twitter. The primary outcome was 30-day page views. Stopping rules were established at the point that 50% of the manuscripts were randomized and had 30-day follow-up to compare groups on 30-day page views. The trial was stopped for futility on September 26, 2015. Overall, 74 manuscripts were randomized to receive social media exposure, and 78 manuscripts were randomized to the control arm. The intervention and control arms were similar based on article type (P=0.85), geographic location of the corresponding author (P=0.33), and whether the manuscript had an editorial (P=0.80). Median number of 30-day page views was 499.5 in the social media arm and 450.5 in the control arm; there was no evidence of a treatment effect (P=0.38). There were no statistically significant interactions of treatment by manuscript type (P=0.86), by corresponding author (P=0.35), by trimester of publication date (P=0.34), or by editorial status (P=0.79). A more intensive social media strategy did not result in increased 30-day page views of original research. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  2. Mitigating concerns and maximizing returns: social media strategies for injury prevention non-profits.

    Science.gov (United States)

    McMillan-Cottom, Tressie

    2014-08-01

    Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs) with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  3. Mitigating Concerns and Maximizing Returns: Social Media Strategies for Injury Prevention Non-profits

    Directory of Open Access Journals (Sweden)

    Tressie McMillan-Cottom

    2014-08-01

    Full Text Available Injury prevention programs can use social media to disseminate information and recruit participants. Non-profit organizations have also used social media for fundraising and donor relationship management. Non-profit organizations (NPOs with injury prevention missions often serve vulnerable populations. Social media platforms have varied levels of access and control of shared content. This variability can present privacy and outreach challenges that are of particular concern for injury prevention NPOs. This case report of social media workshops for injury prevention NPOs presents concerns and strategies for successfully implementing social media campaigns.

  4. A secure transmission scheme of streaming media based on the encrypted control message

    Science.gov (United States)

    Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li

    2007-09-01

    As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.

  5. Tobacco control advocacy in the age of social media: using Facebook, Twitter and change.

    Science.gov (United States)

    Hefler, Marita; Freeman, Becky; Chapman, Simon

    2013-05-01

    The tobacco industry's use of social media sites, such as Facebook, is an emerging area of research; however, this is the first study of the potential for social media to advance tobacco control. This paper presents three case studies of using social media for tobacco control advocacy, demonstrates how social media can facilitate direct and effective action, and provides tools and lessons learned for future campaigns.

  6. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  7. Synthesis of results of randomized controlled trials of contrast media

    International Nuclear Information System (INIS)

    Kinnison, M.L.; Powe, N.R.; Steinberg, E.P.

    1988-01-01

    The authors review 100 randomized controlled trials (RCTs) that examine the safety or efficacy of new low-osmolality contrast media (LOM) and focus on the 43 RCTs judged to be of the highest quality. These RCTs showed no consistent differences in nephrotoxicity between high- and low-osmolality contrast media. Certain cardiovascular parameters were altered less with low-osmolality agents during intracardiac injection, but the clinical significance of these differences in unclear. Heat and pain sensations occurred less often with low-osmolality contrast media. No differences were noted in the incidence of nausea, vomiting, urticaria, or bronchospasm. Even with numerous RCTs comparing these media, physicians still must make economically significant choices about contrast media without sufficient data about their relative safety

  8. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  9. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  10. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  11. How Turkish radiology residents access information related to their profession in this social media and smartphone era.

    Science.gov (United States)

    Ozutemiz, Can; Dicle, Oguz; Koremezli, Nevin

    2015-01-01

    To evaluate the frequency of mobile technology and social media usage among radiology residents and their access to professional information. A questionnaire consisting of 24 questions prepared using Google Drive was sent via e-mail to 550 radiology residents throughout the country. Of the 176 participating residents, 74 completed the survey via the internet, and 102 completed it at three different national radiology meetings. Response rates and its relationship with responses given to different questions were assessed. Hundred two male and 74 female residents participated in the survey. 141 (81.3%) residents thought that they had appropriate internet access in their department. The number of residents using a smartphone was 153 (86.9%). The android operating system (70, 45.8%) was the preferred operating system of respondants. Only 24 (15.7%) of the smartphone users thought that there were enough radiology related applications. "Radiology assistant" (18.9%), "Radiopedia" (7.8%) and "Radiographics" (7.8%) were the most utilized applications. Of the smartphone users, 87(56.9%) stated that they used cell phones in order to find radiological information, and the most used web pages were Google (165, 93.8%), Radiopaedia.org (129, 73.3%), Radiologyassistant.nl (135, 76.7%), and Pubmed (114, 64.8%). Social media usages were as follows: None (10, 5.7%), Facebook (139, 79%), Twitter (55, 31.3%), Google + (51, 29%) and YouTube (44, 25%). While smartphone usage rates among the residents were high, the use of radiology specific applications was not common. Social media usage was very common among residents.

  12. How Turkish radiology residents access information related to their profession in this social media and smartphone era

    International Nuclear Information System (INIS)

    Ozutemiz, Can; Dicle, Oguz; Koremezli, Nevin

    2015-01-01

    To evaluate the frequency of mobile technology and social media usage among radiology residents and their access to professional information. A questionnaire consisting of 24 questions prepared using Google Drive was sent via e-mail to 550 radiology residents throughout the country. Of the 176 participating residents, 74 completed the survey via the internet, and 102 completed it at three different national radiology meetings. Response rates and its relationship with responses given to different questions were assessed. Hundred two male and 74 female residents participated in the survey. 141 (81.3%) residents thought that they had appropriate internet access in their department. The number of residents using a smartphone was 153 (86.9%). The android operating system (70, 45.8%) was the preferred operating system of respondants. Only 24 (15.7%) of the smartphone users thought that there were enough radiology related applications. “Radiology assistant” (18.9%), “Radiopedia” (7.8%) and “Radiographics” (7.8%) were the most utilized applications. Of the smartphone users, 87(56.9%) stated that they used cell phones in order to find radiological information, and the most used web pages were Google (165, 93.8%), Radiopaedia.org (129, 73.3%), Radiologyassistant.nl (135, 76.7%), and Pubmed (114, 64.8%). Social media usages were as follows: None (10, 5.7%), Facebook (139, 79%), Twitter (55, 31.3%), Google + (51, 29%) and YouTube (44, 25%). While smartphone usage rates among the residents were high, the use of radiology specific applications was not common. Social media usage was very common among residents

  13. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  14. How socially aware are social media privacy controls?

    OpenAIRE

    Misra, Gaurav; Such Aparicio, Jose Miguel

    2016-01-01

    Social media sites are key mediators of online communication. Yet the privacy controls for these sites are not fully socially aware, even when privacy management is known to be fundamental to successful social relationships.

  15. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  16. Advancing cancer control research in an emerging news media environment.

    Science.gov (United States)

    Smith, Katherine C; Niederdeppe, Jeff; Blake, Kelly D; Cappella, Joseph N

    2013-12-01

    Cancer is both highly feared and highly newsworthy, and there is a robust body of research documenting the content and effects of cancer news coverage on health behaviors and policy. Recent years have witnessed ongoing, transformative shifts in American journalism alongside rapid advances in communication technology and the public information environment. These changes create a pressing need to consider a new set of research questions, sampling strategies, measurement techniques, and theories of media effects to ensure continued relevance and adaptation of communication research to address critical cancer control concerns. This paper begins by briefly reviewing what we know about the role of cancer news in shaping cancer-related beliefs, attitudes, behaviors, and policies. We then outline challenges and opportunities, both theoretical and methodological, posed by the rapidly changing news media environment and the nature of audience engagement. We organize our discussion around three major shifts associated with the emerging news media environment as it relates to health communication: 1) speed and dynamism of news diffusion, 2) increased narrowcasting of media content for specialized audiences, and 3) broadened participation in shaping media content. In so doing, we articulate a set of questions for future theory and research, in an effort to catalyze innovative communication scholarship to improve cancer prevention and control.

  17. Public Access; Public Interest. The Network Project. Notebook Number 11.

    Science.gov (United States)

    Columbia Univ., New York, NY. Network Project.

    The transcript of a panel discussion and an essay on public access to and control of society's information resources are presented. It is contended that the electronic Media--including radio, television, and communication satellites--are controlled by a select group of individuals and corporations and that they are not meeting the public interest.…

  18. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  19. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  20. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  1. Perceptions of journalists on women access, employment and participation in news production: A case study of Uganda's print media-The New Vision

    OpenAIRE

    Anyango, Jane

    2009-01-01

    Abstract The thesis, “Perceptions of journalists on women access, employment and participation in news production” constitutes an assessment of the situation of female journalists in one of Uganda’s print media, The New Vision. The study connects the problematic relationship that women have with news media, both as subjects and sources of news stories as well as their experiences and status as practitioners within the news industries. The study was concerned over what in this profession...

  2. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  3. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  5. Turkish Press in Social Media

    OpenAIRE

    AYTEN, Adem

    2013-01-01

    Social media, is one of the most researched facts today by the commications fellows. To get in use by Web 2.0 social media becomes common due to the rise of using mobile technologies. Instead of competing with traditional media and being an alternative media, social media is a new media that traditional media can transfer its content to it and can benefit its advantages. Indeed,the traditional media carried its content to the websites to access of their readers/listeners/watchers to compete ...

  6. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  7. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  8. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  9. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  10. Exposure research going mobile: A smartphone-based measurement of media exposure to political information in a convergent media environment

    NARCIS (Netherlands)

    Ohme, J.; Albæk, E.; de Vreese, C.H.

    2016-01-01

    In today’s convergent media environment, media exposure becomes increasingly channel-independent and social media-bound, and media content is more frequently accessed on mobile devices. This calls for new approaches to measuring media exposure. This study applies an innovative approach to survey (n

  11. Influence of media enlightenment programme on control and ...

    African Journals Online (AJOL)

    The study examined the influence of media enlightenment programmes on control and prevention of cerebrospinal meningitis among people of Ilorin metropolis, Kwara State, Nigeria. The study population comprised all the people within Ilorin metropolis, Kwara state. A descriptive research design of survey method was ...

  12. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  13. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  14. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  15. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  16. Perceptions of Tobacco Control Media Campaigns Among Smokers With Lower Socioeconomic Status.

    Science.gov (United States)

    McCullough, Anna; Meernik, Clare; Baker, Hannah; Jarman, Kristen; Walsh, Barbara; Goldstein, Adam O

    2017-11-01

    People with low socioeconomic status (SES) in the United States have disparately high rates of smoking and experience disproportionately high burdens of smoking-related disease. Tobacco control media campaigns are a critical strategy for reducing tobacco use prevalence, but evidence is mixed about the optimal use of mass media to reach and promote tobacco use cessation among people with low SES. Improved understanding of the factors influencing how low-SES tobacco users evaluate tobacco control media campaigns may inform development of more effective messages and strategies. Focus groups with primarily low-SES smokers in Connecticut were conducted, finding that participants had seen many tobacco control television ads that used graphic imagery and testimonials, but participants voiced two main themes that limited ad effectiveness: (1) skepticism about the content of ads, the role of the tobacco industry and the government in sponsoring the ads, and the safety and efficacy of cessation supports; and (2) barriers to quitting such as stress, social contexts, and addiction that participants perceived as being underappreciated in the context of the ads. Tobacco control media campaigns targeting low-SES tobacco users may need additional messages, tools, or refinements to more optimally motivate this group to make quit attempts.

  17. Distributed predictive control of spiral wave in cardiac excitable media

    International Nuclear Information System (INIS)

    Zheng-Ning, Gan; Xin-Ming, Cheng

    2010-01-01

    In this paper, we propose the distributed predictive control strategies of spiral wave in cardiac excitable media. The modified FitzHugh–Nagumo model was used to express the cardiac excitable media approximately. Based on the control-Lyapunov theory, we obtained the distributed control equation, which consists of a positive control-Lyapunov function and a positive cost function. Using the equation, we investigate two kinds of robust control strategies: the time-dependent distributed control strategy and the space-time dependent distributed control strategy. The feasibility of the strategies was demonstrated via an illustrative example, in which the spiral wave was prevented to occur, and the possibility for inducing ventricular fibrillation was eliminated. The strategies are helpful in designing various cardiac devices. Since the second strategy is more efficient and robust than the first one, and the response time in the second strategy is far less than that in the first one, the former is suitable for the quick-response control systems. In addition, our spatiotemporal control strategies, especially the second strategy, can be applied to other cardiac models, even to other reaction-diffusion systems. (general)

  18. The Impact of Social Network Media on Brand Equity in SMEs

    OpenAIRE

    Mohammad Reza Nemat Gorgani

    2016-01-01

    Given the virtual world’s controlling role in everyday life, no one can ignore its crucial impacts on the physical world. In this term social network media play a considerable role in peoples’ daily lives and business by information sharing and the impressions of friends’ comments on own view. Dealing with change, continuing to develop in the dynamic marketplace furthermore, access to information on a level never experienced before are possible benefits to companies;Social media influences co...

  19. Technology consumption and cognitive control: Contrasting action video game experience with media multitasking.

    Science.gov (United States)

    Cardoso-Leite, Pedro; Kludt, Rachel; Vignola, Gianluca; Ma, Wei Ji; Green, C Shawn; Bavelier, Daphne

    2016-01-01

    Technology has the potential to impact cognition in many ways. Here we contrast two forms of technology usage: (1) media multitasking (i.e., the simultaneous consumption of multiple streams of media, such a texting while watching TV) and (2) playing action video games (a particular subtype of video games). Previous work has outlined an association between high levels of media multitasking and specific deficits in handling distracting information, whereas playing action video games has been associated with enhanced attentional control. Because these two factors are linked with reasonably opposing effects, failing to take them jointly into account may result in inappropriate conclusions as to the impacts of technology use on attention. Across four tasks (AX-continuous performance, N-back, task-switching, and filter tasks), testing different aspects of attention and cognition, we showed that heavy media multitaskers perform worse than light media multitaskers. Contrary to previous reports, though, the performance deficit was not specifically tied to distractors, but was instead more global in nature. Interestingly, participants with intermediate levels of media multitasking sometimes performed better than both light and heavy media multitaskers, suggesting that the effects of increasing media multitasking are not monotonic. Action video game players, as expected, outperformed non-video-game players on all tasks. However, surprisingly, this was true only for participants with intermediate levels of media multitasking, suggesting that playing action video games does not protect against the deleterious effect of heavy media multitasking. Taken together, these findings show that media consumption can have complex and counterintuitive effects on attentional control.

  20. Rancang Bangun Prototype Media Pembelajaran Fisika Berbasis Micro Controller NodeMCU

    Directory of Open Access Journals (Sweden)

    Fayakun Muchlis

    2017-04-01

    Full Text Available Penelitian ini bertujuan menghasilkan prototype media pembelajaran fisika berbasis micro controller NodeMCU. Prototype media pembelajaran fisika tentang Hukum II Newton telah dikembangkan dengan mengkombinasikan sensor IR obstacle, NodeMCU, dan sketch program Arduino IDE sebagai counter waktu dan papan track, kubus berlubang, katrol, benang, dan kepingan logam sebagai perangkat pendukung. Hasil eksperimen telah memperlihatkan nilai percepatan benda pada bidang licin lebih besar daripada bidang kasar. Hasil analisis grafik hubungan percepatan vs resultan gaya eksternal menunjukkkan berbanding lurus dan grafik hubungan percepatan vs massa benda menunjukkan berbanding terbalik. Dengan demikian dapat disimpulkan media pembelajaran fisika berbasis NodeMCU mampu memvisualisasikan, menjelaskan dan membuktikan Hukum II Newton. This research is aimed to develop a prototype of physics instructional media based on micro controller. Physics learning media about Newton’s second law prototype has been developed by combining IR sensor obstacle, NodeMCU, and sketch program the Arduino IDE as counter time, and tracking, block, pulley, rope and metal strip as support device. The experimental results show that the value of acceleration of the object on a slippery plane is larger than the rough plane. The results of the analysis of the acceleration and the resultant graph shows that the external force is directly proportional and a graph showing the acceleration vs the object's mass is inversely proportional. Thus we can conclude that Physics learning media based on NodeMCU is valid in explaining and proving Newton's II.

  1. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  2. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  3. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  4. Teaching Students about Violent Media Effects

    Science.gov (United States)

    Bushman, Brad J.

    2018-01-01

    Although violent entertainment has existed for centuries, the media have made it more accessible than ever before. In modern societies, people are immersed in media, like fish in water. Using hand-held devices, people can consume media just about anywhere they want, anytime they want. Moreover, violence is a common theme in the media, and research…

  5. From media crossing to media mining

    NARCIS (Netherlands)

    de Jong, Franciska M.G.; Piperidis, S.; Cunningham, H.; Tablan, V.

    2006-01-01

    This paper reviews how the concept of Media Crossing has contributed to the advancement of the application domain of information access and explores directions for a future research agenda. These will include themes that could help to broaden the scope and to incorporate the concept of

  6. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  7. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  8. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  9. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  10. Streaming movies, media, and instant access

    CERN Document Server

    Dixon, Wheeler Winston

    2013-01-01

    Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.

  11. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  12. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  13. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  14. Role-Based Access Control in Retrospect

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of

  15. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  16. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  17. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  18. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  19. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  20. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  1. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  2. Perceived social and media influences on tobacco use among Samoan youth.

    Science.gov (United States)

    McCool, Judith; Freeman, Becky; Tanielu, Helen

    2014-10-23

    Tobacco use among young Pacific populations continues to undermine efforts to reduce the escalating rates of non-communicable disease in the region. Reducing tobacco use to less than 5 percent by 2025 is now a World Health Organisation (WHO) mandated target for the Pacific region. Yet, little is known about the drivers to uptake of tobacco use among young people in the Pacific. Family and peers are expected to be important in this process, but similarly, tobacco marketing may also play an important role. The tobacco industry has been highly adaptive to the changing media environment across the Pacific Islands. The aim of this study was to develop an understanding of the social cultural and media drivers to tobacco uptake and use among young Samoans to contribute to the design of effective tobacco control intervention. We examined high school students (aged 16 and 17 years) perceptions of tobacco use in their community, access and use of media channels and the extent to which they are cognizant of both pro and anti-tobacco imagery across a range of media. Data was collected through in-depth semi-structured interviews. A thematic analysis of the interview data identified common and divergent beliefs, attitudes and behaviours surrounding tobacco use and the influence of the media. Family is critically important for representing normative tobacco use in Samoa. The use of media, in particular digital media, was found to be conditioned by parental views on the use of media in the home. Media access remains highly regulated within more traditional households. Loyalty to traditional cultural practices (Fa'a Samoa) underpinned views on the limited influence of media on social norms around tobacco use. Parents were thought to have the greatest influence on youth smoking. Tobacco use was viewed as a personal, or family issue, and not a problem that was amendable to change at a societal level. In order to develop effective and culturally relevant tobacco control policies, the

  3. Let the Revolution Begin, 140 Characters at a Time: Social Media and Unconventional Warfare

    Science.gov (United States)

    2015-06-01

    controllable P2P construct. Although the Egyptian government was able to block client-server network architectures , such as Facebook and Twitter...interpersonal applications are extremely accessible, they tend to operate on a peer-to-peer (P2P) networking architecture , which is also less secure than its...client-server counterpart. The differences in social media networking architectures boil down to relative levels of centralization, access, and

  4. Education and Social Media: Toward a Digital Future. MacArthur Foundation Series on Digital Media and Learning

    Science.gov (United States)

    Greenhow, Christine, Ed.; Sonnevend, Julia, Ed.; Agur, Colin, Ed.

    2016-01-01

    How are widely popular social media such as Facebook, Twitter, and Instagram transforming how teachers teach, how kids learn, and the very foundations of education? What controversies surround the integration of social media in students' lives? The past decade has brought increased access to new media, and with this new opportunities and…

  5. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  6. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  7. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  8. Pengaruh Penggunaan Media Konvensional Dan New Media Terhadap Tingkat Sosialisasi Politik Mahasiswa Fisip Undip (Studi Kasus Mahasiswa Strata Satu)

    OpenAIRE

    Triwijanarko, Ramadhan; Utomo, Susilo; Widayati, Wiwik

    2013-01-01

    Political socialization is a process of how the political system introduced to someone,and how to determine the person's response and reaction to the political phenomenon. One of theagents of political socialization is the mass media. In the modern era of mass media has beendivided into two camps, the conventional media and new media. Widespread development oftechnology and inexpensive price make the new media accessible to many people. Whileconventional media slowly began to incontestably wi...

  9. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  10. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  11. Quantum production. Visual Media Services at Fermilab

    CERN Multimedia

    Klapow, S

    2003-01-01

    Visual Media Services, a department of eight full-time employees at Fermi National Accelerator Laboratory, is responsible for translating the laboratories research into accessible and engaging media (1 page)

  12. Young people, new media and sport

    OpenAIRE

    Wong, Donna Shy Yun

    2009-01-01

    This thesis investigates how sport is employed in the new media age as mediated sport goes through the liminal phase of new media. Set against the contextual background of recurrent ‘moral panics’ that accompanied each new wave of media innovation, this study aimed to chart young people’s involvement in sport via the use of new media technology. The thesis concentrated on three research issues: access to, uses of, and the displacement effect of new media. Four major forms of ne...

  13. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  14. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  15. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  16. An Access Control Model for the Uniframe Framework

    National Research Council Canada - National Science Library

    Crespi, Alexander M

    2005-01-01

    ... security characteristics from the properties of individual components would aid in the creation of more secure systems In this thesis, a framework for characterizing the access control properties...

  17. Cost-effectiveness of a smokeless tobacco control mass media campaign in India.

    Science.gov (United States)

    Murukutla, Nandita; Yan, Hongjin; Wang, Shuo; Negi, Nalin Singh; Kotov, Alexey; Mullin, Sandra; Goodchild, Mark

    2017-08-10

    Tobacco control mass media campaigns are cost-effective in reducing tobacco consumption in high-income countries, but similar evidence from low-income countries is limited. An evaluation of a 2009 smokeless tobacco control mass media campaign in India provided an opportunity to test its cost-effectiveness. Campaign evaluation data from a nationally representative household survey of 2898 smokeless tobacco users were compared with campaign costs in a standard cost-effectiveness methodology. Costs and effects of the Surgeon campaign were compared with the status quo to calculate the cost per campaign-attributable benefit, including quit attempts, permanent quits and tobacco-related deaths averted. Sensitivity analyses at varied CIs and tobacco-related mortality risk were conducted. The Surgeon campaign was found to be highly cost-effective. It successfully generated 17 259 148 additional quit attempts, 431 479 permanent quits and 120 814 deaths averted. The cost per benefit was US$0.06 per quit attempt, US$2.6 per permanent quit and US$9.2 per death averted. The campaign continued to be cost-effective in sensitivity analyses. This study suggests that tobacco control mass media campaigns can be cost-effective and economically justified in low-income and middle-income countries. It holds significant policy implications, calling for sustained investment in evidence-based mass media campaigns as part of a comprehensive tobacco control strategy. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  18. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  19. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  20. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  1. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  2. Pro Android Media Developing Graphics, Music, Video, and Rich Media Apps for Smartphones and Tablets

    CERN Document Server

    Every, Shawn

    2010-01-01

    Mobile devices have evolved to focus on rich media production and consumption. Developers of mobile applications are able to create applications that allow people to play, capture, and share media in a variety of new ways on mobile devices. The popularity of Android has soared in part because the platform offers developers a rich set of capabilities including access to media capturing and playback functions. Pro Android Media provides concise and clear instruction on how to utilize the media APIs made available through Android to create dynamic apps. It takes you from a simple means to gain ac

  3. Preferred health resources and use of social media to obtain health and depression information by adolescent mothers.

    Science.gov (United States)

    Logsdon, M Cynthia; Bennett, Gary; Crutzen, Rik; Martin, LuAnn; Eckert, Diane; Robertson, Ashley; Myers, John; Tomasulo, Roselyn; Gregg, Jennifer; Barone, Michael; Lynch, Tania; Flamini, Laura

    2014-11-01

    Little is known about how adolescent mothers use social media and the Internet, especially to access health information. In this cross-sectional, descriptive study, adolescent mothers were recruited from an academic medical center after the birth of their child (n = 94) or from a state-funded, home visitation program during the first year after birth (n = 91). They completed the Pew Internet Survey: 37 questions related to use of social media and Internet, particularly in regard to obtaining health information. All adolescent mothers used a computer and almost all went online. Most accessed the Internet by cell phone (67.4%) and used social media. The health topics searched most frequently were pregnancy/birth control (85.8%), sexually transmitted diseases (n = 134, 72.6%) and HIV (66.3%). Response to survey questions differed between the two groups (adolescent mothers surveyed after birth from academic medical center and adolescent mothers surveyed in the first postpartum year in the community). Adolescent mothers spend significant time on the Internet including searching for health information. Cell phones are their preferred methods for accessing the Internet, and they use social media. Thus, social media and the Internet are potentially feasible and acceptable vehicles to deliver health interventions to adolescent mothers. © 2014 Wiley Periodicals, Inc.

  4. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  5. Social Media Tools for Teaching and Learning

    Science.gov (United States)

    Wagner, Ronald

    2011-01-01

    According to Wikipedia, "social media is the media designed to be disseminated through social interaction, created using highly accessible scalable techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue." Social networks, such as Facebook and Twitter, contain millions of members who…

  6. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  7. The Roles of Mass Media in Disseminating Agricultural Information ...

    African Journals Online (AJOL)

    The study further shows that access to mass media on agricultural information is through radio and television, and most of them indicated that the media sources are conventional, accessible and preferred to listen to the agricultural progammes in the night time (8pm -11.59pm).The respondents identified purchasing and ...

  8. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  9. African media coverage of tobacco industry corporate social responsibility initiatives.

    Science.gov (United States)

    McDaniel, Patricia A; Cadman, Brie; Malone, Ruth E

    2018-02-01

    Guidelines for implementing the World Health Organization's Framework Convention on Tobacco Control (FCTC) recommend prohibiting tobacco industry corporate social responsibility (CSR) initiatives, but few African countries have done so. We examined African media coverage of tobacco industry CSR initiatives to understand whether and how such initiatives were presented to the public and policymakers. We searched two online media databases (Lexis Nexis and Access World News) for all news items published from 1998 to 2013, coding retrieved items through a collaborative, iterative process. We analysed the volume, type, provenance, slant and content of coverage, including the presence of tobacco control or tobacco interest themes. We found 288 news items; most were news stories published in print newspapers. The majority of news stories relied solely on tobacco industry representatives as news sources, and portrayed tobacco industry CSR positively. When public health voices and tobacco control themes were included, news items were less likely to have a positive slant. This suggests that there is a foundation on which to build media advocacy efforts. Drawing links between implementing the FCTC and prohibiting or curtailing tobacco industry CSR programmes may result in more public dialogue in the media about the negative impacts of tobacco company CSR initiatives.

  10. Engaging Moms on Teen Indoor Tanning Through Social Media: Protocol of a Randomized Controlled Trial

    Science.gov (United States)

    Baker, Katie; Griffith, Julia; Oleski, Jessica L; Palumbo, Ashley; Walkosz, Barbara J; Hillhouse, Joel; Henry, Kimberly L; Buller, David B

    2016-01-01

    Background Indoor tanning elevates the risk for melanoma, which is now the most common cancer in US women aged 25-29. Public policies restricting access to indoor tanning by minors to reduce melanoma morbidity and mortality in teens are emerging. In the United States, the most common policy restricting indoor tanning in minors involves parents providing either written or in person consent for the minor to purchase a tanning visit. The effectiveness of this policy relies on parents being properly educated about the harms of indoor tanning to their children. Objective This randomized controlled trial will test the efficacy of a Facebook-delivered health communication intervention targeting mothers of teenage girls. The intervention will use health communication and behavioral modification strategies to reduce mothers’ permissiveness regarding their teenage daughters’ use of indoor tanning relative to an attention-control condition with the ultimate goal of reducing indoor tanning in both daughters and mothers. Methods The study is a 12-month randomized controlled trial comparing 2 conditions: an attention control Facebook private group where content will be relevant to teen health with 25% focused on prescription drug abuse, a topic unrelated to tanning; and the intervention condition will enter participants into a Facebook private group where 25% of the teen health content will be focused on indoor tanning. A cohort of 2000 mother-teen daughter dyads will be recruited to participate in this study. Only mothers will participate in the Facebook groups. Both mothers and daughters will complete measures at baseline, end of intervention (1-year) and 6 months post-intervention. Primary outcomes include mothers’ permissiveness regarding their teenage daughters’ use of indoor tanning, teenage daughters’ perception of their mothers’ permissiveness, and indoor tanning by both mothers and daughters. Results The first dyad was enrolled on March 31, 2016, and we

  11. The Emerging Neuroscience of Social Media.

    Science.gov (United States)

    Meshi, Dar; Tamir, Diana I; Heekeren, Hauke R

    2015-12-01

    Social media use is a global phenomenon, with almost two billion people worldwide regularly using these websites. As Internet access around the world increases, so will the number of social media users. Neuroscientists can capitalize on the ubiquity of social media use to gain novel insights about social cognitive processes and the neural systems that support them. This review outlines social motives that drive people to use social media, proposes neural systems supporting social media use, and describes approaches neuroscientists can use to conduct research with social media. We close by noting important directions and ethical considerations of future research with social media. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  13. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  14. Remote Control Childhood: Combating the Hazards of Media Culture in Schools

    Science.gov (United States)

    Levin, Diane

    2010-01-01

    Background: Media culture touches most aspects of the lives of children growing up today, beginning at the earliest ages. It is profoundly the lessons children learn as well as how they learn, thereby contributing to what this article characterizes as "remote control childhood." Educators need to understand remote control childhood so…

  15. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  16. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  17. Social media in public health care

    DEFF Research Database (Denmark)

    Andersen, Kim Normann; Medaglia, Rony; Henriksen, Helle Zinner

    2012-01-01

    This paper investigates the impacts of social media use in Danish public health care with respect to capabilities, interactions, orientations, and value distribution. Taking an exploratory approach, the paper draws on an array of quantitative and qualitative data, and puts forward four propositions......: social media transform the access to health-related information for patients and general practitioners, the uptake of social media can be a cost driver rather than a cost saver, social media provide empowerment to patients, and the uptake of social media is hindered by legal and privacy concerns...

  18. Domestic connectivity: media, gender and the domestic sphere in Kenya

    DEFF Research Database (Denmark)

    Gustafsson, Jessica

    2017-01-01

    This article explores how increased media access influences Kenyan women’s everyday life and alters the domestic space. The study, which is set in Uasin Gishu County, Kenya, is based on 30 in-depth interviews with women. The article demonstrates that women have incorporated newly attained media i...... their traditional gender roles.......This article explores how increased media access influences Kenyan women’s everyday life and alters the domestic space. The study, which is set in Uasin Gishu County, Kenya, is based on 30 in-depth interviews with women. The article demonstrates that women have incorporated newly attained media...... into their daily lives and routines and that increased media access has opened up the home, turned the domestic space from a secluded place to a connected space, where women can get input from, connect and interact with the world beyond their immediate surrounding, while remaining at home concurrently fulfilling...

  19. Social media monitoring of asthmatic children treated in a specialized program: Parents and caregivers expectations

    Directory of Open Access Journals (Sweden)

    Marilyn Urrutia-Pereira

    2015-11-01

    Conclusion: Parents or caregivers of children attending the PIPA program expressed high interest in using social media. However, few use it to control their children’s disease. While providing a great benefit to use social media as a mean of communication in health, the content needs to be monitored for reliability and quality. The privacy of users (doctors and patients must be preserved and it is very important to facilitate the access to Internet.

  20. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  1. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future beh...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  2. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  3. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  5. Otitis media con efusión: estudio de casos y controles Otitis media with effusion: study of cases and controls

    Directory of Open Access Journals (Sweden)

    Sonia Grisales

    1992-01-01

    Full Text Available Se realizó un estudio en 66 niños y 34 niñas de 2 a 12 años. Cincuenta fueron casos de otitis media con efusión (OME y 50 controles. El grupo etario más numeroso fue el de dos años. Los síntomas y signos más frecuentes fueron otalgia y fiebre (70% e hipoacusia (40%. Veintinueve casos (58% y sólo 12 controles (24% presentaron adenoides hipertróficas (p < 0.01 . La pérdida auditiva fue significativamente mayor en el grupo de casos y las curvas timpanométricas se relacionaron directamente con ella. No se demostró que la alergia fuera un elemento importante en la génesis de la OME, a diferencia de la hipertrofia de adenoides que constituyó nuestro hallazgo más importante.

    Between July 1988 and May 1989 we studied 100 children aged2-14 years; there were fifty cases of otitis media with effusion (OME and fifty controls. Each group Included 33 boys and 17 girls. The predominant age group was 2 years. The most frequent clinical manifestations of OME were earache and fever (70% each and reduced hearing (40%. In 29 cases (58% and in only 12 controls (24% enlarged adenoids were found (p < 0.01 . impaired hearing was significantly most frequent In the cases and the tympanometric curves had direct relationship with reduced hearing. Despite Its high prevalence allergy was not found to be of importance In the etiology of OME; by contrast, enlarged adenoids were the most relevant determinant of this disease In our series.

  6. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  7. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  8. System identification of propagating wave segments in excitable media and its application to advanced control

    Science.gov (United States)

    Katsumata, Hisatoshi; Konishi, Keiji; Hara, Naoyuki

    2018-04-01

    The present paper proposes a scheme for controlling wave segments in excitable media. This scheme consists of two phases: in the first phase, a simple mathematical model for wave segments is derived using only the time series data of input and output signals for the media; in the second phase, the model derived in the first phase is used in an advanced control technique. We demonstrate with numerical simulations of the Oregonator model that this scheme performs better than a conventional control scheme.

  9. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  10. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  11. Effects of a brief school-based media literacy intervention on digital media use in adolescents: cluster randomized controlled trial.

    Science.gov (United States)

    Walther, Birte; Hanewinkel, Reiner; Morgenstern, Matthis

    2014-09-01

    The aim of this study was to evaluate the effects of a four-session school-based media literacy curriculum on adolescent computer gaming and Internet use behavior. The study comprised a cluster randomized controlled trial with three assessments (baseline, posttest, and 12-month follow-up). At baseline, a total of 2,303 sixth and seventh grade adolescents from 27 secondary schools were assessed. Of these, 1,843 (80%) could be reached at all three assessments (Mage=12.0 years; SD=0.83). Students of the intervention group received the media literacy program Vernetzte www.Welten ("Connected www.Worlds ") implemented by trained teachers during class time. The control group attended regular class. Main outcome measures were adolescents' computer gaming and Internet use: days per month, hours per day, and addictive use patterns. Parental media monitoring and rules at home were assessed as secondary outcomes. Results of multilevel growth-curve models revealed a significant intervention effect in terms of a lower increase in self-reported gaming frequency (β = -1.10 [95% CI -2.06, -0.13]), gaming time (β = -0.27 [95% CI -0.40, -0.14]), and proportion of excessive gamers (AOR=0.21 [95% CI 0.08, 0.57]) in the intervention group. There were also significant group-time interactions for the addictive gaming scale (β=-0.08 [95% CI -0.12, -0.04]), and the Internet Addiction Scale (β = -0.06 [95% CI -0.10, -0.01]). No effect was found for days and hours of Internet use or parental media behavior. The study shows that the program Vernetzte www.Welten can influence adolescents' media use behavior. Future research should address mediating and moderating variables of program effects.

  12. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  13. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  14. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  15. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  16. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  17. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  18. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  19. Media Use in School-Aged Children and Adolescents.

    Science.gov (United States)

    2016-11-01

    This policy statement focuses on children and adolescents 5 through 18 years of age. Research suggests both benefits and risks of media use for the health of children and teenagers. Benefits include exposure to new ideas and knowledge acquisition, increased opportunities for social contact and support, and new opportunities to access health-promotion messages and information. Risks include negative health effects on weight and sleep; exposure to inaccurate, inappropriate, or unsafe content and contacts; and compromised privacy and confidentiality. Parents face challenges in monitoring their children's and their own media use and in serving as positive role models. In this new era, evidence regarding healthy media use does not support a one-size-fits-all approach. Parents and pediatricians can work together to develop a Family Media Use Plan (www.healthychildren.org/MediaUsePlan) that considers their children's developmental stages to individualize an appropriate balance for media time and consistent rules about media use, to mentor their children, to set boundaries for accessing content and displaying personal information, and to implement open family communication about media. Copyright © 2016 by the American Academy of Pediatrics.

  20. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  1. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  2. Youth access, creation, and content of smokeless tobacco ("dip") videos in social media.

    Science.gov (United States)

    Seidenberg, Andrew B; Rodgers, Elizabeth J; Rees, Vaughan W; Connolly, Gregory N

    2012-04-01

    Smokeless tobacco (SLT) use among white adolescent males has increased in recent years, and prevalence of SLT use among adolescent males exceeds that for smoking in several U.S. states. Recent reports have described the presence of cigarette-related content on social media Web sites popular among youth; however, little has been reported on SLT content. The YouTube video search engine was searched for the popular SLT brand Skoal, and the first 50 search results were downloaded. Video statistics data were collected for and content analysis was performed on all videos featuring smokeless use (82%). Access to SLT YouTube videos by youth was also determined by assessing whether YouTube permits youth viewing and creation of SLT videos. Mean number of views for videos analyzed was 15,422, and the most watched video had 124,276 views. Descriptions of SLT flavor/smell and social references/interactions were found in 48.8% and 63.4% of videos, respectively. By contrast, references to drug (nicotine) effects (12.2%) and public health messaging (9.8%) were less common. None of the SLT videos in the sample had restrictions that would block youth viewing. In addition, evidence of self-identified youth creating SLT videos was found for 13% of unique users in the sample. YouTube does not restrict youth from creating or viewing "dip videos." Proactive efforts are needed to ensure that YouTube and other online media do not become influential vehicles for tobacco promotion to youth. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  4. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  5. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  6. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  7. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  8. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  9. [Accessible health information: a question of age?].

    Science.gov (United States)

    Loos, E F

    2012-04-01

    Aging and digitalisation are important trends which have their impact on information accessibility. Accessible information about products and services is of crucial importance to ensure that all citizens can participate fully as active members of society. Senior citizens who have difficulties using new media run the risk of exclusion in today's information society. Not all senior citizens, however, encounter problems with new media. Not by a long shot. There is much to be said for 'aged heterogeneity', the concept that individual differences increase as people age. In two explorative qualitative case studies related to accessible health information--an important issue for senior citizens--that were conducted in the Netherlands, variables such as gender, education level and frequency of internet use were therefore included in the research design. In this paper, the most important results of these case studies will be discussed. Attention will be also paid to complementary theories (socialisation, life stages) which could explain differences in information search behaviour when using old or new media.

  10. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  11. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  12. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. Role of Mass Media in Agricultural Productivity in Adamawa State ...

    African Journals Online (AJOL)

    The study examined the role of mass media in agriculture in Adamawa State. Specifically, it focused on the extent to which mass media have been used to communicate agricultural information dissemination, farmers' media preference, challenges experienced in accessing information through the media and the need to ...

  15. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  16. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  17. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  18. Social media use in the United States: implications for health communication.

    Science.gov (United States)

    Chou, Wen-ying Sylvia; Hunt, Yvonne M; Beckjord, Ellen Burke; Moser, Richard P; Hesse, Bradford W

    2009-11-27

    Given the rapid changes in the communication landscape brought about by participative Internet use and social media, it is important to develop a better understanding of these technologies and their impact on health communication. The first step in this effort is to identify the characteristics of current social media users. Up-to-date reporting of current social media use will help monitor the growth of social media and inform health promotion/communication efforts aiming to effectively utilize social media. The purpose of the study is to identify the sociodemographic and health-related factors associated with current adult social media users in the United States. Data came from the 2007 iteration of the Health Information National Trends Study (HINTS, N = 7674). HINTS is a nationally representative cross-sectional survey on health-related communication trends and practices. Survey respondents who reported having accessed the Internet (N = 5078) were asked whether, over the past year, they had (1) participated in an online support group, (2) written in a blog, (3) visited a social networking site. Bivariate and multivariate logistic regression analyses were conducted to identify predictors of each type of social media use. Approximately 69% of US adults reported having access to the Internet in 2007. Among Internet users, 5% participated in an online support group, 7% reported blogging, and 23% used a social networking site. Multivariate analysis found that younger age was the only significant predictor of blogging and social networking site participation; a statistically significant linear relationship was observed, with younger categories reporting more frequent use. Younger age, poorer subjective health, and a personal cancer experience predicted support group participation. In general, social media are penetrating the US population independent of education, race/ethnicity, or health care access. Recent growth of social media is not uniformly distributed across

  19. Exploring Media Convergence: Evidence from Italy

    Directory of Open Access Journals (Sweden)

    Debora Bettiga

    2013-12-01

    Full Text Available The evolution of media and devices is enabling the ubiquitous and multi-device access to media and information, so that a media mutual contamination is in play. New forms of user interactions with media, in which different devices are used simultaneously in different contexts, have emerged. These new interactions are significantly impacting on users’ attitudes towards the media and their way of searching and generating content. Such a change, called “media convergence”, has a strong potential impact on marketing and communication processes, but as yet has not been deeply analysed in the literature. This paper presents the outcomes of several studies aimed at exploring media convergence on the demand-side to advance possible implications for marketers and managers.

  20. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  1. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  2. Porous media geometry and transports

    CERN Document Server

    Adler, Pierre

    1992-01-01

    The goal of ""Porous Media: Geometry and Transports"" is to provide the basis of a rational and modern approach to porous media. This book emphasizes several geometrical structures (spatially periodic, fractal, and random to reconstructed) and the three major single-phase transports (diffusion, convection, and Taylor dispersion).""Porous Media"" serves various purposes. For students it introduces basic information on structure and transports. Engineers will find this book useful as a readily accessible assemblage of al the major experimental results pertaining to single-phase tr

  3. Social media as a means to access millennial wine consumers

    OpenAIRE

    Fuentes Fernández, R.; Vriesekoop, F.; Urbano, B.

    2017-01-01

    Purpose \\ud The purpose of this research is to gain insights of\\ud the use of social media (SM) in the wine industry. From the theoretical viewpoint to analyze wineries’ social media segmentation, targeting and positioning (STP) to help the wine industry to improve the effectiveness of SM communication. \\ud Design/methodology/approach \\ud An observational study of Spanish wineries’ SM presence and traffic was carried out during a three-month period in 2013 and repeated in 2016. During this pe...

  4. Exposure Research Going Mobile: A Smartphone-Based Measurement of Media Exposure to Political Information in a Convergent Media Environment

    DEFF Research Database (Denmark)

    Ohme, J.; Albaek, E.; H. de Vreese, C.

    2016-01-01

    platform modes. The study furthermore confirms limitations of mere usage time measurements of social media platforms in effects research and explores a range of actual content types that citizens encounter in social networks. It recommends more frequent use of mobile exposure measurements and argues...... for a content-related assessment of social media use in effects research. © 2016 Taylor & Francis.......In today’s convergent media environment, media exposure becomes increasingly channel-independent and social media-bound, and media content is more frequently accessed on mobile devices. This calls for new approaches to measuring media exposure. This study applies an innovative approach to survey (n...

  5. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  6. Children and Adolescents and Digital Media.

    Science.gov (United States)

    Reid Chassiakos, Yolanda Linda; Radesky, Jenny; Christakis, Dimitri; Moreno, Megan A; Cross, Corinn

    2016-11-01

    Today's children and adolescents are immersed in both traditional and new forms of digital media. Research on traditional media, such as television, has identified health concerns and negative outcomes that correlate with the duration and content of viewing. Over the past decade, the use of digital media, including interactive and social media, has grown, and research evidence suggests that these newer media offer both benefits and risks to the health of children and teenagers. Evidence-based benefits identified from the use of digital and social media include early learning, exposure to new ideas and knowledge, increased opportunities for social contact and support, and new opportunities to access health promotion messages and information. Risks of such media include negative health effects on sleep, attention, and learning; a higher incidence of obesity and depression; exposure to inaccurate, inappropriate, or unsafe content and contacts; and compromised privacy and confidentiality. This technical report reviews the literature regarding these opportunities and risks, framed around clinical questions, for children from birth to adulthood. To promote health and wellness in children and adolescents, it is important to maintain adequate physical activity, healthy nutrition, good sleep hygiene, and a nurturing social environment. A healthy Family Media Use Plan (www.healthychildren.org/MediaUsePlan) that is individualized for a specific child, teenager, or family can identify an appropriate balance between screen time/online time and other activities, set boundaries for accessing content, guide displays of personal information, encourage age-appropriate critical thinking and digital literacy, and support open family communication and implementation of consistent rules about media use. Copyright © 2016 by the American Academy of Pediatrics.

  7. Examining the use of evidence-based and social media supported tools in freely accessible physical activity intervention websites.

    Science.gov (United States)

    Vandelanotte, Corneel; Kirwan, Morwenna; Rebar, Amanda; Alley, Stephanie; Short, Camille; Fallon, Luke; Buzza, Gavin; Schoeppe, Stephanie; Maher, Carol; Duncan, Mitch J

    2014-08-17

    It has been shown that physical activity is more likely to increase if web-based interventions apply evidence-based components (e.g. self-monitoring) and incorporate interactive social media applications (e.g. social networking), but it is unclear to what extent these are being utilized in the publicly available web-based physical activity interventions. The purpose of this study was to evaluate whether freely accessible websites delivering physical activity interventions use evidence-based behavior change techniques and provide social media applications. In 2013, a systematic search strategy examined 750 websites. Data was extracted on a wide range of variables (e.g. self-monitoring, goal setting, and social media applications). To evaluate website quality a new tool, comprising three sub-scores (Behavioral Components, Interactivity and User Generated Content), was developed to assess implementation of behavior change techniques and social media applications. An overall website quality scored was obtained by summing the three sub-scores. Forty-six publicly available websites were included in the study. The use of self-monitoring (54.3%), goal setting (41.3%) and provision of feedback (46%) was relatively low given the amount of evidence supporting these features. Whereas the presence of features allowing users to generate content (73.9%), and social media components (Facebook (65.2%), Twitter (47.8%), YouTube (48.7%), smartphone applications (34.8%)) was relatively high considering their innovative and untested nature. Nearly all websites applied some behavioral and social media applications. The average Behavioral Components score was 3.45 (±2.53) out of 10. The average Interactivity score was 3.57 (±2.16) out of 10. The average User Generated Content Score was 4.02 (±2.77) out of 10. The average overall website quality score was 11.04 (±6.92) out of 30. Four websites (8.7%) were classified as high quality, 12 websites (26.1%) were classified as moderate

  8. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  9. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  10. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  11. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  12. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  13. Engaging Moms on Teen Indoor Tanning Through Social Media: Protocol of a Randomized Controlled Trial.

    Science.gov (United States)

    Pagoto, Sherry L; Baker, Katie; Griffith, Julia; Oleski, Jessica L; Palumbo, Ashley; Walkosz, Barbara J; Hillhouse, Joel; Henry, Kimberly L; Buller, David B

    2016-11-29

    Indoor tanning elevates the risk for melanoma, which is now the most common cancer in US women aged 25-29. Public policies restricting access to indoor tanning by minors to reduce melanoma morbidity and mortality in teens are emerging. In the United States, the most common policy restricting indoor tanning in minors involves parents providing either written or in person consent for the minor to purchase a tanning visit. The effectiveness of this policy relies on parents being properly educated about the harms of indoor tanning to their children. This randomized controlled trial will test the efficacy of a Facebook-delivered health communication intervention targeting mothers of teenage girls. The intervention will use health communication and behavioral modification strategies to reduce mothers' permissiveness regarding their teenage daughters' use of indoor tanning relative to an attention-control condition with the ultimate goal of reducing indoor tanning in both daughters and mothers. The study is a 12-month randomized controlled trial comparing 2 conditions: an attention control Facebook private group where content will be relevant to teen health with 25% focused on prescription drug abuse, a topic unrelated to tanning; and the intervention condition will enter participants into a Facebook private group where 25% of the teen health content will be focused on indoor tanning. A cohort of 2000 mother-teen daughter dyads will be recruited to participate in this study. Only mothers will participate in the Facebook groups. Both mothers and daughters will complete measures at baseline, end of intervention (1-year) and 6 months post-intervention. Primary outcomes include mothers' permissiveness regarding their teenage daughters' use of indoor tanning, teenage daughters' perception of their mothers' permissiveness, and indoor tanning by both mothers and daughters. The first dyad was enrolled on March 31, 2016, and we anticipate completing this study by October 2019

  14. MEDIA INDUSTRY IN THE DIGITAL WORLD

    OpenAIRE

    Daniel Burtic

    2014-01-01

    The development of the internet and the expansion of digitalization changed the way society works, especially mass-media. The question is if the internet was an advantage or a disadvantage for mass-media? Apparently, on one hand digitalization determined the reduction of production and distribution costs but also content diversification. At the same time, social media and rapid documentation brought an accession in the quality of journalistic product as well as the entering on the market of m...

  15. Pharmacy 2.0: a scoping review of social media use in pharmacy.

    Science.gov (United States)

    Grindrod, Kelly; Forgione, Andrea; Tsuyuki, Ross T; Gavura, Scott; Giustini, Dean

    2014-01-01

    New "social" information and communication technologies such as social media and smartphones are allowing non-experts to access, interpret and generate medical information for their own care and the care of others. Pharmacists may also benefit from increased connectivity, but first there needs to be an understanding of how pharmacists engage with social media. A scoping review methodology was used to describe pharmacist and pharmacy student participation in social media networks and to describe the gaps in research. Three themes that emerged from reviewing social media use in pharmacy education were student engagement, boundaries and e-professionalism. For pharmacists, the themes of liability and professional use were prominent. Few pharmacy leadership organizations are providing guidance on social media but that appears to be changing. As the control of medical knowledge shifts from health professionals to the larger social community, pharmacists need to be present. Social media use and training in undergraduate programs is promising but experienced pharmacists also need to join the conversation. Copyright © 2014 Elsevier Inc. All rights reserved.

  16. Social Movements And Social Media: Surveillance And Unintended Consequences

    Science.gov (United States)

    2017-12-01

    developed under Section 215 of the PATRIOT Act “disrupted more than 50 terrorist plots in the United States and abroad, including a plan to bomb the New...Enforcement Taps Social Media Monitoring Software,” Emergency Management, December 23, 2016, accessed 12 June, 2017, http://www.govtech.com/ em /safety...Management, December 23, 2016. Accessed 12 June, 2017. http://www.govtech.com/ em /safety/Local-Law-Enforcement-Taps-Social-Media- Monitoring

  17. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  18. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  19. Social media and suicide prevention: a systematic review.

    Science.gov (United States)

    Robinson, Jo; Cox, Georgina; Bailey, Eleanor; Hetrick, Sarah; Rodrigues, Maria; Fisher, Steve; Herrman, Helen

    2016-04-01

    Social media platforms are commonly used for the expression of suicidal thoughts and feelings, particularly by young people. Despite this, little is known about the ways in which social media can be used for suicide prevention. The aim of this study was to conduct a systematic review to identify current evidence pertaining to the ways in which social media are currently used as a tool for suicide prevention. Medline, PsycInfo, Embase, CINHAL and the Cochrane Library were searched for articles published between 1991 and April 2014. English language articles with a focus on suicide-related behaviour and social media were included. No exclusion was placed on study design. Thirty studies were included; 4 described the development of social media sites designed for suicide prevention, 6 examined the potential of social media in terms of its ability to reach or identify people at risk of suicide, 15 examined the ways in which people used social media for suicide prevention-related purposes, and 5 examined the experiences of people who had used social media sites for suicide prevention purposes. No intervention studies were identified. Social media platforms can reach large numbers of otherwise hard-to-engage individuals, may allow others to intervene following an expression of suicidal ideation online, and provide an anonymous, accessible and non-judgmental forum for sharing experiences. Challenges include difficulties controlling user behaviour and accurately assessing risk, issues relating to privacy and confidentiality and the possibility of contagion. Social media appears to hold significant potential for suicide prevention; however, additional research into its safety and efficacy is required. © 2015 Wiley Publishing Asia Pty Ltd.

  20. The influence of social media and easily accessible online information on the aesthetic plastic surgery practice: literature review and our own experience.

    Science.gov (United States)

    Montemurro, Paolo; Porcnik, Ales; Hedén, Per; Otte, Maximilian

    2015-04-01

    Patients interested in aesthetic plastic surgery procedures increasingly seek advice on social media and rely on easily accessible online information. The investigatory goal was to determine the impact of this phenomenon on the everyday aesthetic plastic surgery practice. Five hundred consecutive patients completed a questionnaire prior to their consultation with a plastic surgeon at our clinic. A questionnaire was also completed by 128 plastic surgeons practising in 19 different countries. A literature review was performed. Almost all patients (95%) used the internet to collect information prior to consultation, for 68% of them it being their first search method. Social media were used by 46% of patients and 40% of these were strongly influenced when choosing a specific doctor. The majority of plastic surgeons (85%) thought the information found on social media could lead to unrealistic expectations. However, 45% of plastic surgeons believed that their consultations became easier after the advent of social media, 29% found them more difficult. A literature review showed a high percentage of poor quality internet websites regarding plastic surgery and an increase in use of social media among plastic surgeons. The internet and social media play an important and growing role in plastic surgery. This results in more informed patients but may create unrealistic expectations. Even if the internet provides ample information, it cannot replace the face-to-face consultation, which always should remain a detailed process, covering both risks and limitations of alternative procedures. Available literature on how social media influences the medical practice is still scarce and further research is needed. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266.

  1. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  2. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  3. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  4. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  5. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  6. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  7. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  8. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    or treatment. Improving access and quality of care in a. TB control programme. Vera Scott, Virginia Azevedo, Judy Caldwell. Objectives. To use a quality improvement approach to improve access to and quality of tuberculosis (TB) diagnosis and care in. Cape Town. Methods. Five HIV/AIDS/sexually transmitted infections/TB.

  9. Migration Performance for Legacy Data Access

    Directory of Open Access Journals (Sweden)

    Kam Woods

    2008-12-01

    Full Text Available We present performance data relating to the use of migration in a system we are creating to provide web access to heterogeneous document collections in legacy formats. Our goal is to enable sustained access to collections such as these when faced with increasing obsolescence of the necessary supporting applications and operating systems. Our system allows searching and browsing of the original files within their original contexts utilizing binary images of the original media. The system uses static and dynamic file migration to enhance collection browsing, and emulation to support both the use of legacy programs to access data and long-term preservation of the migration software. While we provide an overview of the architectural issues in building such a system, the focus of this paper is an in-depth analysis of file migration using data gathered from testing our software on 1,885 CD-ROMs and DVDs. These media are among the thousands of collections of social and scientific data distributed by the United States Government Printing Office (GPO on legacy media (CD-ROM, DVD, floppy disk under the Federal Depository Library Program (FDLP over the past 20 years.

  10. ANALYSIS OF SOCIAL MEDIA’S ACCESS; RELATION TO CHARACTER OF VOCATIONAL STUDENT IN BOGOR

    Directory of Open Access Journals (Sweden)

    Sudi Herlin Rahmawati

    2014-05-01

    Full Text Available Recently, the existence of social media in Indonesia is consequence of acculturation both of culture and technology. This study aimed to analyze the relation of social media on the teenagers’ character development, particularly responsibility, respectful, and courtesy. The observation was conducted in two vocational private high schools in Bogor, West Java Province. The selected schools were chosen as schools with high involvement on juvenile delinquency such as gang fight, drugs, and free-sex based on the data from local government official. Total participants were 100 students consist of 50 male and 50 female students at 1st and 2nd grade. Based on the analysis, there was significant difference between male and female student on accessing the social media (both on intensity and content. Females’ scored higher than male in accessing Facebook, Twitter, YouTube, etc. On average, females’ use of social media was between 2-3 hours per day, whereas for male it was only 1 hour. However, male had greater access to pornography than the females. The study found significant correlation between media social intensity and content access with the character. Highly teenagers’ access to social media; correlate with the low of responsibility, respectful and courtesy character. 

  11. Ego Defense and Media Access: Conflicting Rhetorical Needs of a Contemporary Social Movement.

    Science.gov (United States)

    Turner, Kathleen J.

    1980-01-01

    Describes the relationship among the social movements of the 1960s, particularly the feminist movement and the mass media. Analyzes the nature of the rhetoric of social activism in that period which is characterized by the ego-defensive responses to media-created reality and by ego-building responses to media's reality-creating potential. (JMF)

  12. Media perspective - new opportunities for reaching audiences

    Science.gov (United States)

    Haswell, Katy

    2007-08-01

    The world of media is experiencing a period of extreme and rapid change with the rise of internet television and the download generation. Many young people no longer watch standard TV. Instead, they go on-line, talking to friends and downloading pictures, videos, music clips to put on their own websites and watch/ listen to on their laptops and mobile phones. Gone are the days when TV controllers determined what you watched and when you watched it. Now the buzzword is IPTV, Internet Protocol Television, with companies such as JOOST offering hundreds of channels on a wide range of subjects, all of which you can choose to watch when and where you wish, on your high-def widescreen with stereo surround sound at home or on your mobile phone on the train. This media revolution is changing the way organisations get their message out. And it is encouraging companies such as advertising agencies to be creative about new ways of accessing audiences. The good news is that we have fresh opportunities to reach young people through internet-based media and material downloaded through tools such as games machines, as well as through the traditional media. And it is important for Europlanet to make the most of these new and exciting developments.

  13. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  14. Media and Youth Development: An Overview of Issues, Theory, and Research

    Directory of Open Access Journals (Sweden)

    Christine McCauley Ohannessian

    2014-03-01

    Full Text Available The homes of today’s youth are filled with a variety of media options, ranging from televisions (71% and video game consoles (50% in their bedrooms to portable handheld devices (e.g., iPods/mp3 players, 76% and cell phones (71% that can accompany youth wherever they go. Of course, youth also have access to centralized media found in homes, such as televisions (99% of homes and computers with and without Internet access (93% and 84% of homes, respectively. Not surprisingly, youth consume media for about 7.5 hours per day, much of which involves using more than one media at the same time (i.e., multitasking, with adolescents consuming significantly more media than children (Lenhart, 2012; Rideout, Foehr, & Roberts, 2010.

  15. The dynamics of short envelope solitons in media with controlled dispersion

    International Nuclear Information System (INIS)

    Aseeva, N.V.; Gromov, E.M.; Tyutin, V.V.

    2007-01-01

    The dynamics of short envelope solitons in media with controlled dispersion is investigated in the framework of the third-order nonlinear Schroedinger equation. Evolution of the solitons amplitude is analyzed in the adiabatic approximation. The existence of short envelope solitons independent from linear dispersion inhomogeneity is shown

  16. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    delays and also by the choice of the time instances at which sensor information is accessed. In order to optimize the latter, we introduce an information quality metric and a mathematical model based on Markov chains, which are compared performance-wise to a heuristic approach for finding this parameter......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  17. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  18. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  19. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  20. Social Media: Developing an Acceptable Use Policy. Research Brief

    Science.gov (United States)

    Williamson, Ronald

    2010-01-01

    The growing use of social media by students and staff has led many schools to consider developing acceptable use policies. There is tremendous opportunity for improving education through the use of social media. There is also potential risk because social media can be used to access age inappropriate information and to engage in aggressive online…

  1. Supporting continuous media communications and applications by exploiting their special characteristics

    OpenAIRE

    Fan, C.

    1998-01-01

    Distributed multimedia applications need end-to-end support from both the networks and the endsystems. The operating systems are critical both for accessing networking services and for controlling the activities on the endsystems. It is therefore vital to enhance the functionality and performance of the operating system in order to provide feasible support for multimedia communications and applications. The work proposes to support multimedia, especially continuous media, communications and a...

  2. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  3. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  4. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  5. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  6. Video game access, parental rules, and problem behavior: a study of boys with autism spectrum disorder.

    Science.gov (United States)

    Engelhardt, Christopher R; Mazurek, Micah O

    2014-07-01

    Environmental correlates of problem behavior among individuals with autism spectrum disorder remain relatively understudied. The current study examined the contribution of in-room (i.e. bedroom) access to a video game console as one potential correlate of problem behavior among a sample of 169 boys with autism spectrum disorder (ranging from 8 to 18 years of age). Parents of these children reported on (1) whether they had specific rules regulating their child's video game use, (2) whether their child had in-room access to a variety of screen-based media devices (television, computer, and video game console), and (3) their child's oppositional behaviors. Multivariate regression models showed that in-room access to a video game console predicted oppositional behavior while controlling for in-room access to other media devices (computer and television) and relevant variables (e.g. average number of video game hours played per day). Additionally, the association between in-room access to a video game console and oppositional behavior was particularly large when parents reported no rules on their child's video game use. The current findings indicate that both access and parental rules regarding video games warrant future experimental and longitudinal research as they relate to problem behavior in boys with autism spectrum disorder. © The Author(s) 2013.

  7. The Role of Social Media User Experience as a Mediator for Understanding Social Media User Behavior in Indonesia’s Museum Industry: Literature Review

    Science.gov (United States)

    Sundjaja, A. M.; LumanGaol, F.; Budiarti, T.; Abbas, B. S.; Abdinagoro, S. B.; Ongowarsito, H.

    2017-01-01

    Social media has changed the interaction between the customer and the business, social media has proven to provide new opportunities in facilitating access to information, efficiency and ease of interaction between customers and businesses that are distributed geographically dispersed. Ease of interaction to improve access to information about products, services, and prices have proven to have a positive impact for consumers. The purpose of this article is to develop a conceptual model to test the effect of user motivation, user expectations, and online community involvement to the intention of behavior that is mediated by the use of social media museum experience. This article is a literature study on exploration of social media user experiences museum in Indonesia. Authors searched and examined 85 articles from google scholar with the following keywords: motivation, expectations, online communities, user experience, social media, Technology Acceptance Model, Experiential Marketing, Uses and Gratification Theory. Proposed data collection techniques are literature study, survey and observation. The sample used in this research is 400 respondents of social media users that follow the social media managed by Indonesia’s museum. The sampling technique are systematic sampling. We use Structural Equation Model with AMOS for analyze the data.

  8. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  9. Professional use of social media by pharmacists.

    Science.gov (United States)

    Barry, Arden R; Pearson, Glen J

    2015-01-01

    A recent trend among health care professionals is the use of social media for professional purposes. These rapidly expanding media allow for timely and efficient access to health information, but they also carry the potential for increased liability. There is a paucity of research detailing how health care professionals, specifically pharmacists, use social media. To characterize the use of social media by pharmacists in the Canadian province of Alberta and to identify independent determinants of and perceived barriers to using social media for professional purposes. Data for this mixed-methods study were collected by an online survey in March and April 2014. Alberta pharmacists were invited to participate via e-mail distributed by 2 professional organizations. The survey had 273 respondents. Of these, 226 (82.8%) stated that they had a social media account for either personal or professional purposes, and 138 (61.1%) of these reported using social media for professional purposes, although most respondents used social media predominantly for personal reasons. The most commonly reported social media applications were Facebook and Twitter, accessed primarily via smartphones. Of the 273 respondents, 206 (75.5%) had a Facebook account, and 101 (49.0%) of these used Facebook to some extent for professional purposes. Twitter users (104 [38.1%] of respondents) had a higher rate of professional utilization (57/104 [54.8%]). The most commonly identified barrier to using social media for professional purposes was concern over liability. Positive predictors of use of social media for professional purposes included younger age and fewer years of professional experience. Participants perceived the most beneficial aspect of social media (in professional terms) as connecting with pharmacist colleagues. More than 80% of pharmacists in Alberta reported that they had a social media account, and over half of them reported using their accounts for professional purposes. Although

  10. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  11. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  12. Older teen attitudes toward birth control access in pharmacies: a qualitative study.

    Science.gov (United States)

    Wilkinson, Tracey A; Miller, Courtney; Rafie, Samantha; Landau, Sharon Cohen; Rafie, Sally

    2018-03-01

    To examine adolescent attitudes toward accessing contraception through a new pharmacist prescribing model in the State of California. In-depth telephone interviews were conducted in summer 2015 with 30 females ages 18 to 19 in California. Participants were recruited using a social media advertisement. Semi-structured interviews utilized open-ended questions to understand teens' experiences with pharmacies, experiences obtaining contraception, and views on pharmacist prescribing of contraception. Responses were transcribed and qualitatively analyzed using an independent-coder method to identify salient themes. Participants were ethnically diverse and primarily living in suburban areas. All participants had completed high school and many had completed one year of college. Nearly all participants were supportive of California's new law allowing pharmacist prescribing of contraception. Thematic analyses revealed that while participants were satisfied with traditional service providers and valued those relationships, they appreciated the benefit of increased access and convenience of going directly to a pharmacy. Participants expected increased access to contraception in pharmacies would lead to both personal and societal benefits. They expressed concerns regarding parental involvement, as well as confidentiality in the pharmacy environment and with insurance disclosures. Older teens in California are very supportive of pharmacies and pharmacists as direct access points for contraception, but confidentiality concerns were noted. Policy makers and pharmacies can incorporate study findings when designing policies, services, and physical pharmacy spaces to better serve teens. Further research is warranted after pharmacies implement this new service to assess teen utilization and satisfaction as well as outcomes. Several states recently passed legislation enabling pharmacists to prescribe contraception and other states are considering similar legislation. Older teens are

  13. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    grids, which targets a reduction of over- and under voltage level situations by adjusting reactive power production of selected low voltage grid assets. The paper models different information access schemes between remote assets and controller, which is activated only when certain voltage thresholds...... stochastic models. We investigate in this paper the suitability for using these two metrics for optimization in a voltage grid control scenario. We conclude that, while the mismatch probability is very useful compared to the simpler information age metric from a network designers and operators point of view...

  14. Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制

    Institute of Scientific and Technical Information of China (English)

    陶宇炜; 符彦惟

    2011-01-01

    针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

  15. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  16. [Social-professional status, identity, social participation and media utilization. Analysis of a complex dynamics].

    Science.gov (United States)

    Laflamme, Simon; Roggero, Pascal; Southcott, Chris

    2010-08-01

    This article examines the link between the domain and level of occupation, on the one hand, and use of media, including internet, on the other. It adds to this investigation an analysis of identity in its relation to media use and accessibility. It challenges the hypothesis of a strong correlation between level of occupation and use and accessibility to media. It reveals complex phenomena of social homogenization and differentiation. Data is extracted from a sample of workers who completed a questionnaire which focused on use of media.

  17. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  18. “Having to Belong to Be”: The Consumption of New Medias and the Identity Projection These Days

    Directory of Open Access Journals (Sweden)

    Cíntia Dal Bello

    2008-08-01

    Full Text Available Based on the emergency of the hi-tech youth, we look into the necessity of consumption of communication and information technologies, relating the context in which the new media are necessary and their involvements in social relations as well in the perception of the individual himself. For that, we try to understand the importance of new media for the experience of the post modern subject in a global, capitalist and media society, organized in net. In this society, the new media have access devices, and without them, the youth could not get connected to access and be accessible. Thus, the consumption for the access. Without these devices, how can a person belong to a new net of relations that are established in the media environment? If one does not belong, how can he exist?

  19. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  20. Command and Control Research and Technology Symposium (2004):The Power Age Concepts and Technologies. Improving Tactical PSYOP Video Dissemination in Media-Austere Operating Environments

    National Research Council Canada - National Science Library

    Tulak, Arthur

    2004-01-01

    .... Recent operations demonstrate the requirement for video PSYOP in media-austere environments where the target audience lacks access to television, due to poverty, or lack of supporting infrastructure...

  1. Aplikasi Media Inspirasi Berbasis Web dan Android

    OpenAIRE

    Ferryanto, Sulistya; Yulia, Yulia; Handojo, Andreas

    2016-01-01

    Nowadays application for storing images and videos have been very easy to find. Videos and images can be found on social media appplications. However, images and videos are not too restricted to be submitted by member in social media applications. It makes the user rather difficult to find videos or images that are inspiring. In general, inspiration media application only for showing videos or images. Besides that, there are applications that can only be accessed on the website or Android. In...

  2. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  3. Social media-delivered sexual health intervention: a cluster randomized controlled trial.

    Science.gov (United States)

    Bull, Sheana S; Levine, Deborah K; Black, Sandra R; Schmiege, Sarah J; Santelli, John

    2012-11-01

    Youth are using social media regularly and represent a group facing substantial risk for sexually transmitted infection (STI). Although there is evidence that the Internet can be used effectively in supporting healthy sexual behavior, this has not yet extended to social networking sites. To determine whether STI prevention messages delivered via Facebook are efficacious in preventing increases in sexual risk behavior at 2 and 6 months. Cluster RCT, October 2010-May 2011. Individuals (seeds) recruited in multiple settings (online, via newspaper ads and face-to-face) were asked to recruit three friends, who in turn recruited additional friends, extending three waves from the seed. Seeds and waves of friends were considered networks and exposed to either the intervention or control condition. Exposure to Just/Us, a Facebook page developed with youth input, or to control content on 18-24 News, a Facebook page with current events for 2 months. Condom use at last sex and proportion of sex acts protected by condoms. Repeated measures of nested data were used to model main effects of exposure to Just/Us and time by treatment interaction. A total of 1578 participants enrolled, with 14% Latino and 35% African-American; 75% of participants completed at least one study follow-up. Time by treatment effects were observed at 2 months for condom use (intervention 68% vs control 56%, p=0.04) and proportion of sex acts protected by condoms (intervention 63% vs control 57%, p=0.03) where intervention participation reduced the tendency for condom use to decrease over time. No effects were seen at 6 months. Social networking sites may be venues for efficacious health education interventions. More work is needed to understand what elements of social media are compelling, how network membership influences effects, and whether linking social media to clinical and social services can be beneficial. This study is registered at www.clinicaltrials.govNCT00725959. Copyright © 2012 American

  4. Conference Review - Languages & The Media, 6th International Conference & Exhibition on Language Transfer in Audiovisual Media, October 25-27, 2006, Berlin

    Directory of Open Access Journals (Sweden)

    Ellen Christoffersen

    2012-08-01

    Full Text Available The participants of the conference, which had as its theme “Free Access – Priceless Rights?”, were professionals involved in subtitling, voice-over or translation, language industry specialists, distributors of audiovisual media products, producers of media programmes, broadcasters, researchers and representatives of viewer organisations.

  5. Conference Review - Languages & The Media, 6th International Conference & Exhibition on Language Transfer in Audiovisual Media, October 25-27, 2006, Berlin

    Directory of Open Access Journals (Sweden)

    Ellen Christoffersen

    2007-03-01

    Full Text Available The participants of the conference, which had as its theme “Free Access – Priceless Rights?”, were professionals involved in subtitling, voice-over or translation, language industry specialists, distributors of audiovisual media products, producers of media programmes, broadcasters, researchers and representatives of viewer organisations.

  6. 45 CFR 702.16 - Attendance of news media at public sessions.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Attendance of news media at public sessions. 702... Attendance of news media at public sessions. Reasonable access for coverage of public sessions shall be provided to the various communications media, including newspapers, magazines, radio, newsreels, and...

  7. Adolescents and media literacy.

    Science.gov (United States)

    McCannon, Robert

    2005-06-01

    In the face of media industry consolidation, fewer people control media content which makes it harder for parents and citizens to know the research about media-related issues, such as video game violence, nutrition, and sexual risk-taking. Media literacy offers a popular and potentially successful way to counter the misinformation that is spread by Big Media public relations.

  8. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  9. Improving control of duponchelia fovealis (Lepidoptera: Pyralidae) by rooting media related strategies

    NARCIS (Netherlands)

    Blok, C.; Messelink, G.J.

    2009-01-01

    Soil-dwelling predatory mites can be very effective as biological control agents against larvae of the lepidopteral pest Duponchelia fovealis. Some growing media were reported to have natural high level and stable populations of predatory mite. The objective of this experiment was to define

  10. Social Media Addition and Undergraduate Students' Self-Perception ...

    African Journals Online (AJOL)

    A questionnaire named “Social Media Utilisation, Addiction and Self-Perception Questionnaire” (r=0.77) was used for data collection. Seven research questions were answered in the study. Facebook (751 or 90.2%) and Twitter (646 or 77.6%) were the most commonly accessible social media networks while meeting with ...

  11. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  12. Assessing Sentiment In Conflict Zones Through Social Media

    Science.gov (United States)

    2016-12-01

    polling and social media data, utilizing over 1.4 million geo-referenced messages sent through the Twitter network from Yemen over the period from...a difficult test country. Compared to Western countries, Yemen has low levels of Internet access and social media users. The country is also beset...consisted of over 1.4 million tweets, observed in Yemen over the period October 2013 to January 2014. From our research we conclude that social media

  13. IMPACT OF THE NEW MEDIA KNOWLEDGE ON THE ORGANIZATION MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Mihaela STOICA

    2014-06-01

    Full Text Available Due to globalization new media strongly impacts organizations and management approaches. Access to social media platforms, open source movement, online collaboration, rapid communication and increasing power of consumers push hierarchical organization towards flexibility and adaptability. New media offers a wide range of channels for information on competitors, for brand promotion and to new markets. But competitors have also access to the same instruments. Globalization in terms of communication on collaborative platforms, determines organizations to adopt cross-cultural and cross-organizational approaches to ensure sending the right message to the right market at the right time. Maintaining organization globally competitive implies top human resources with a trans-disciplinary background and knowledge of using the new media infrastructure sustained by a right organizational structure. This paper aims at demonstrating, with some examples too, how new media is leading decision making process to a new level for protecting organization’s image setting new norms and principles for organization and people in order to achieve best results.

  14. Access Denied: Ending the Exclusion of Disabled Students from Media Production Courses in Higher Education

    Science.gov (United States)

    Cubbage, Jayne

    2017-01-01

    As the acceptance of media literacy increases among educators, media producers and consumers, one group is often missing from the dialogue--persons with disabilities. This absence is witnessed in the marginalized media depictions of the disabled. To gain entry into the media professions, some form of higher education is required. Using muted group…

  15. RELASI INTERNET DAN MEDIA SOSIAL DALAM PEMBENTUKAN BRAND AWARENESS, IMAGE DAN EXPERIENCE PRODUK ASING

    OpenAIRE

    Ina Nur Ratriyana

    2016-01-01

    The effect of globalization on communication process appears especially in digital media which made communication exchange faster. Cultural process also create homogenization of product choice, when global brand looks more familiar than local brand. Internet and social media give an opportunity for consumer to access the product information and interact with them. Interactivity as part of digital media offers unlimited access and the power of word of mouth in terms of internet and social medi...

  16. Delivery of Instructions via Mobile Social Media App Increases Quality of Bowel Preparation.

    Science.gov (United States)

    Kang, Xiaoyu; Zhao, Lina; Leung, Felix; Luo, Hui; Wang, Limei; Wu, Ji; Guo, Xiaoyang; Wang, Xiangping; Zhang, Linhui; Hui, Na; Tao, Qin; Jia, Hui; Liu, Zhiguo; Chen, Zhangqin; Liu, Junjun; Wu, Kaichun; Fan, Daiming; Pan, Yanglin; Guo, Xuegang

    2016-03-01

    Bowel preparation is closely linked to the quality of colonoscopy. We investigated whether delivery of instructions via a social media app increases the quality of colonoscopy by improving adequacy of bowel preparation. We performed a prospective study at 3 endoscopic centers in China of 770 colonoscopy outpatients (18-80 years old) with convenient access to Wechat (a widely used mobile social media app) from May through November 2014. Patients were randomly assigned to groups that received standard education along with delivery of interactive information via Wechat (n = 387) or standard education (controls, n = 383). The primary outcome was proportion of patients with adequate bowel preparation (Ottawa score <6). Secondary outcomes included rates of adenoma detection and cecal intubation, cecal intubation time, rates of incomplete compliance with instructions, and patient willingness to repeat bowel preparation. Demographic features were comparable between the groups. A higher proportion of patients in the group that received social media instruction had adequate bowel preparation than the control group (82.2% vs 69.5%, P < .001). Among patients with successful colonoscopies, the group that received social media instruction had lower mean total and segmental Ottawa scores (P < .05). A higher proportion of patients receiving social media instruction also had cecal intubation (97.2% vs 93.2% in controls, P = .014) and were found to have adenomas (18.6% vs 12.0% in controls, P = .012). Instruction via a mobile social media app, in conjunction with regular instruction, increases subjective measures of adequacy of bowel preparation. Use of the app significantly increased the proportion of patients with successful cecal intubation and in whom adenomas were detected, indicating increased quality of colonoscopy. ClinicalTrials.gov number: NCT02140827. Copyright © 2016 AGA Institute. Published by Elsevier Inc. All rights reserved.

  17. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    In this study, a fuzzy expert system Trust-Based Access Control (TBAC) model for improving the Quality of crowdsourcing using emotional affective computing is presented. This model takes into consideration a pre-processing module consisting of three inputs such as crowd-workers category, trust metric and emotional ...

  18. A Queer Critical Media Literacies Framework in a Digital Age

    Science.gov (United States)

    Leent, Lisa; Mills, Kathy

    2018-01-01

    Media literacy skills are focal for many educators across the globe in an age of ubiquitous access to the Internet and the rapid circulation of digital texts. A critical media literacies perspective is often a key element in teaching adolescents to read a range of texts. A queer critical media literacies pedagogy supports a social justice agenda…

  19. Integrating CERN e-groups into TWiki access control.

    CERN Document Server

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  20. Spontaneous Hedonic Reactions to Social Media Cues.

    Science.gov (United States)

    van Koningsbruggen, Guido M; Hartmann, Tilo; Eden, Allison; Veling, Harm

    2017-05-01

    Why is it so difficult to resist the desire to use social media? One possibility is that frequent social media users possess strong and spontaneous hedonic reactions to social media cues, which, in turn, makes it difficult to resist social media temptations. In two studies (total N = 200), we investigated less-frequent and frequent social media users' spontaneous hedonic reactions to social media cues using the Affect Misattribution Procedure-an implicit measure of affective reactions. Results demonstrated that frequent social media users showed more favorable affective reactions in response to social media (vs. control) cues, whereas less-frequent social media users' affective reactions did not differ between social media and control cues (Studies 1 and 2). Moreover, the spontaneous hedonic reactions to social media (vs. control) cues were related to self-reported cravings to use social media and partially accounted for the link between social media use and social media cravings (Study 2). These findings suggest that frequent social media users' spontaneous hedonic reactions in response to social media cues might contribute to their difficulties in resisting desires to use social media.

  1. Take control of media on your iPad

    CERN Document Server

    Carlson, Jeff

    2011-01-01

    Join media-savvy author Jeff Carlson as he helps you enjoy media on your iPad like never before. Jeff explains basic and advanced ways of adding media to your iPad, and gives you a thorough grounding in Apple's core media apps-iBooks, iPod, Videos, and Photos. He also helps you integrate your iPad with an Apple TV and looks at various ways of using an iPad as a TV remote. You'll also get plenty of suggestions for third-party apps and products, whether you want to read books not available in the iBookstore, stream music from the Internet to your iPad, convert your own DVD library to iPad-frien

  2. Social media in dermatology: moving to Web 2.0.

    Science.gov (United States)

    Travers, Robin L

    2012-09-01

    Patient use of social media platforms for accessing medical information has accelerated in parallel with overall use of the Internet. Dermatologists must keep pace with our patients' use of these media through either passive or active means are outlined in detail for 4 specific social media outlets. A 5-step plan for active engagement in social media applications is presented. Implications for medical professionalism, Health Insurance Portability and Accountability Act compliance, and crisis management are discussed. Copyright © 2012. Published by Elsevier Inc.

  3. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  4. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  5. Creative Artist: A Journal of Theatre and Media Studies: Journal ...

    African Journals Online (AJOL)

    Creative Artist: A Journal of Theatre and Media Studies: Journal Sponsorship. Journal Home > About the Journal > Creative Artist: A Journal of Theatre and Media Studies: Journal Sponsorship. Log in or Register to get access to full text downloads.

  6. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  7. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  8. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. Longitudinal study of Thai people media exposure, knowledge, and behavior on dengue fever prevention and control.

    Science.gov (United States)

    Boonchutima, Smith; Kachentawa, Kirati; Limpavithayakul, Manasanun; Prachansri, Anan

    Dengue hemorrhagic fever is transmitted through a bite by a dengue -infected Aedes aegypti mosquito. It was first reported in the mid -20th century in Thailand, and since then its epidemiology has been of great concern and has spread all across the country. The alarming incidence of dengue posed a serious threat to human health in all major cities of Thailand. This study was aimed at identifying the level of awareness of dengue fever in Thai population knowledge for prevention and control, and most importantly contribution of media in educating masses for dengue control measures. It is longitudinal in nature and was conducted in 25 provinces of Thailand during 2013-2015. Approximately 7772 respondents participated in this study, with the selection of provinces based on considerations like population, prevalence and demography. A pre-tested structured questionnaire was used to collect information relevant to study participants' demographic profile, pre-existing knowledge about dengue fever and its reinforcement through media, and population attitudes toward prevention and control. Over the period of three years, a positive trend was revealed relevant to the contribution of media in educating and reminding the Thai population of dengue, without any uniformity or powerful campaigns. Based on the results drawn from this study, we conclude that despite the measures undertaken to prevent dengue fever, there is insufficient media exposure. An interdisciplinary approach involving the community participation, media, and government is needed to overcome dengue threat in Thailand. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  10. The bid to lose weight: impact of social media on weight perceptions, weight control and diabetes.

    Science.gov (United States)

    Das, Leah; Mohan, Ranjini; Makaya, Tafadzwa

    2014-01-01

    Over the last decade the internet has come to permeate every aspect of our lives. With huge leaps in accessibility of the internet via mobile personal devices such as smart cellular phones and tablets, individuals are connected to the internet virtually all the time. It is no surprise therefore that social media now dominates the lives of many people within society. The authors take a look at how social media is influencing diabetes with particular focus on weight perception, weight management and eating behaviours. The authors explore the concept of how the advertising of Size 0 models and photo-shopping of images which are easily available on line and via social media is causing an increase in the number of young people with distorted body images. This has led to an increased number of people resorting to sometimes drastic weight loss programmes. We focus on the bid for 'low-fat' consumption and highlight how this could actually be leading to an increased risk for developing diabetes or worsening the complications of diabetes. We also discuss the increase of eating disorder in diabetes related to this distorted body image.

  11. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  12. The role of tobacco-specific media exposure, knowledge, and smoking status on selected attitudes toward tobacco control.

    Science.gov (United States)

    Blake, Kelly D; Viswanath, K; Blendon, Robert J; Vallone, Donna

    2010-02-01

    In August 2007, the President's Cancer Panel urged the leadership of the nation to "summon the political will to address the public health crisis caused by tobacco use" (President's Cancer Panel, N, 2007, Promoting healthy lifestyles: Policy, program, and personal recommendations for reducing cancer risk. http://deainfo.nci.nih.gov/advisory/pcp/pcp07rpt/pcp07rpt.pdf). While some research has examined predictors of public support for tobacco control measures, little research has examined modifiable factors that may influence public attitudes toward tobacco control. We used the American Legacy Foundation's 2003 American Smoking and Health Survey 2 to examine the contribution of smoking status, knowledge of the negative effects of tobacco, and tobacco-specific media exposure (antitobacco messages, news coverage of tobacco issues, and protobacco advertising) on U.S. adults' attitudes toward tobacco control. In addition, we assessed whether smoking status moderates the relationship between tobacco-specific media exposure and policy attitudes. Weighted multivariable logistic regression models were employed. Results suggest that knowledge of the negative effects of tobacco and smoking status are associated with attitudes toward tobacco control and that exposure to tobacco-specific information in the media plays a role only in some instances. We found no evidence of effect modification by smoking status on the impact of exposure to tobacco-specific media on attitudes toward tobacco control. Understanding the impact of readily modifiable factors that shape policy attitudes is essential if we are to target outreach and education in a way that is likely to sway public support for tobacco control.

  13. News media old and new

    DEFF Research Database (Denmark)

    Schrøder, Kim Christian

    2014-01-01

    This article presents and discusses three different approaches to the exploration of the cross-media challenges facing news audiences, as they seek access to, navigate in and make sense of the multitude of news sources across print, broadcasting, online and mobile media platforms. From a modernized...... uses and gratifications perspective, based on the notion of “worthwhileness” as the determinant of people's everyday selections from the “supermarket of news”, the article first reports from a longitudinal survey study in Denmark in which the author's foundational mapping of cross-media news...... consumption in pre-mobile 2008 is compared with replicating mappings carried out in 2011 and 2012, in a collaborative project between academics and news publishers. The analytical interest here focuses on the fluctuations between traditional news media and the surging digital news outlets of the internet...

  14. Associations between media use and health information-seeking behavior on vaccinations in South Korea

    Directory of Open Access Journals (Sweden)

    Jiyeon Kim

    2017-09-01

    Full Text Available Abstract Background Although vaccinations are critical for preventing emerging infectious diseases, scant research has been conducted on risk communication. With socio-economic characteristics, health behavior, and underlying diseases under control, we investigated associations between media use, health information-seeking behavior, health information type, and vaccination in the population. Methods This study relied on a national survey of Korean adults (n = 1367. Participants were adult males and females age 20 and older. Web and face-to-face surveys were conducted throughout July 2014. The main outcome was vaccination (categorized as yes or no. Independent variables were time spent on media, frequency of health information-seeking behavior, and types of health information sought. Results Controlling for co-variates, logistic regression analysis was conducted to identify factors that influence Korean adults being vaccinated. Results revealed that accessible information about emerging infectious diseases, listening to the radio, and reading the newspaper were associated with increased odds of being vaccinated. Active seeking health information as well as being female and of higher socio-economic status were positively correlated with Korean adults being vaccinated. Conclusion It is critical to promote health information-seeking behavior and use diverse media channels to increase acceptance and awareness of emerging infectious diseases and vaccinations. Because there are differences in vaccination awareness depending on social class, it is critical to reduce communication inequality, strengthen accessibility to vaccinations, and devise appropriate risk communication strategies that ensure Korean adults receive vaccinations.

  15. Associations between media use and health information-seeking behavior on vaccinations in South Korea.

    Science.gov (United States)

    Kim, Jiyeon; Jung, Minsoo

    2017-09-11

    Although vaccinations are critical for preventing emerging infectious diseases, scant research has been conducted on risk communication. With socio-economic characteristics, health behavior, and underlying diseases under control, we investigated associations between media use, health information-seeking behavior, health information type, and vaccination in the population. This study relied on a national survey of Korean adults (n = 1367). Participants were adult males and females age 20 and older. Web and face-to-face surveys were conducted throughout July 2014. The main outcome was vaccination (categorized as yes or no). Independent variables were time spent on media, frequency of health information-seeking behavior, and types of health information sought. Controlling for co-variates, logistic regression analysis was conducted to identify factors that influence Korean adults being vaccinated. Results revealed that accessible information about emerging infectious diseases, listening to the radio, and reading the newspaper were associated with increased odds of being vaccinated. Active seeking health information as well as being female and of higher socio-economic status were positively correlated with Korean adults being vaccinated. It is critical to promote health information-seeking behavior and use diverse media channels to increase acceptance and awareness of emerging infectious diseases and vaccinations. Because there are differences in vaccination awareness depending on social class, it is critical to reduce communication inequality, strengthen accessibility to vaccinations, and devise appropriate risk communication strategies that ensure Korean adults receive vaccinations.

  16. Media, State and Society in Bahia, Brazil

    Directory of Open Access Journals (Sweden)

    Julián Durazo Herrmann

    2016-08-01

    Full Text Available In this paper, I seek to assess the role of the media in ongoing subnational democratization processes from a State-in-society perspective. I use the case of Bahia, a state in North-Eastern Brazil, to assess ownership and social access to the media, the media’s autonomy from both the State and social actors as well as how conflicts between public interest and private profit are solved. We will thus understand the role of subnational media in sustaining pluralism and in providing independent sources of information, two critical dimensions of democracy.

  17. Health effects of media on children and adolescents.

    Science.gov (United States)

    Strasburger, Victor C; Jordan, Amy B; Donnerstein, Ed

    2010-04-01

    Youth spend an average of >7 hours/day using media, and the vast majority of them have access to a bedroom television, computer, the Internet, a video-game console, and a cell phone. In this article we review the most recent research on the effects of media on the health and well-being of children and adolescents. Studies have shown that media can provide information about safe health practices and can foster social connectedness. However, recent evidence raises concerns about media's effects on aggression, sexual behavior, substance use, disordered eating, and academic difficulties. We provide recommendations for parents, practitioners, the media, and policy makers, among others, for ways to increase the benefits and reduce the harm that media can have for the developing child and for adolescents.

  18. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  19. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  20. The role of sleep in the relation between young children’s mobile media use and effortful control

    NARCIS (Netherlands)

    Nathanson, A.I.; Beyens, I.

    We explored the relations among young children's mobile media use, sleep, and a form of self‐regulation, temperamental effortful control (EC), among a national sample of 402 mothers who completed an online survey. We found that the relation between mobile media use and EC was moderated by children's

  1. Parent and child screen-viewing time and home media environment.

    Science.gov (United States)

    Jago, Russell; Stamatakis, Emmanuel; Gama, Augusta; Carvalhal, Isabel Mourão; Nogueira, Helena; Rosado, Vítor; Padez, Cristina

    2012-08-01

    Screen-viewing time has been associated with adverse health outcomes. Data on the predictors of youth screen-viewing time is predominately from older children in North America. Parental and home media environment factors that are associated with screen-viewing time could be targeted in interventions. Examine if parental screen-viewing time and electronic media (access to game equipment, TVs, PCs, and laptops) environment factors were associated with Portuguese children's screen-viewing time and if associations differed by child age (families with children aged 3-10 years. Data were collected in 2009-2010 and analyzed in 2011. Outcomes were child spending ≥2 hours watching TV and ≥1 hour per day playing with combined other media. Exposures were mothers and fathers watching ≥2 hours of TV and electronic media variables. Parental TV-viewing time was strongly associated with child weekday and weekend TV-viewing time across all four gender and age subgroups. Maternal TV-viewing time was a stronger predictor of child TV-viewing time than paternal TV-viewing time. There was very limited evidence that parental TV-viewing time was associated with combined other media time among boys or girls. Access to electronic game equipment increased the likelihood that children spent >1 hour using combined other media on weekdays and weekend days. Parental TV-viewing time was associated with Portuguese children's TV-viewing time. The numbers of TVs in the household and electronic games equipment access were also associated with TV- and combined other media-viewing/usage time. Copyright © 2012 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  2. Post Media Literacy: Menyaksikan Kuasa Media Bersama Michel Foucault

    Directory of Open Access Journals (Sweden)

    Iswandi Syahputra

    2017-01-01

    Full Text Available This article would like to present Michel Foucault’s idea concerning Knowledge and Power in media industry. As a contemporary intellectual, Foucault’s thought has a unique style of postmodernism. His thought had gone beyond traditional critical theory whose trying to disclose the relation of power and economic behind the ideology of media. Foucault’s thought had given new perspective in understanding how the media produce truth under tightly control process into something that seems normal. With the assumption of media has the power to create mass culture, which has to be studied critically by media literacy approach, Foucault’s thought had given new space of discursive. An alternative thought on how to estimate the work of mass media as supervisor of truth and creator of information trough normalization practice.

  3. Modeling the state dependent impulse control for computer virus propagation under media coverage

    Science.gov (United States)

    Liang, Xiyin; Pei, Yongzhen; Lv, Yunfei

    2018-02-01

    A state dependent impulsive control model is proposed to model the spread of computer virus incorporating media coverage. By the successor function, the sufficient conditions for the existence and uniqueness of order-1 periodic solution are presented first. Secondly, for two classes of periodic solutions, the geometric property of successor function and the analogue of the Poincaré criterion are employed to obtain the stability results. These results show that the number of the infective computers is under the threshold all the time. Finally, the theoretic and numerical analysis show that media coverage can delay the spread of computer virus.

  4. Controllable soliton propagation based on phase-front curvature in asymmetrical nonlocal media

    Science.gov (United States)

    Zhang, Huafeng; Lü, Hua; Luo, Jianghua; Sun, Lihui

    2016-08-01

    The influence of phase-front curvature on the dynamical behavior of the fundamental mode soliton during its transmission in asymmetrical nonlocal media is studied in detail and the phase-front curvature can be imposed on the fundamental mode soliton by reshaping or phase imprinting technologies. By changing the phase-front curvature or its imposed position, controllable soliton propagation in asymmetrical nonlocal media can be achieved. Project supported by the National Natural Science Foundation of China (Grants Nos. 11547007 and 11304024), the Innovation Personnel Training Plan for Excellent Youth of Guangdong University Project (Grant No. 2013LYM_0023), and the Yangtze Fund for Youth Teams of Science and Technology Innovation (Grant No. 2015cqt03).

  5. Inner Security in Media from the perspective of social science and media studies

    Directory of Open Access Journals (Sweden)

    Oliver Bidlo

    2012-07-01

    Full Text Available Security and entertainment are moving closer together. The term Securitainment expresses in this context, the mediation of security through entertainment formats. This will open a new space for Internal Security, which includes its own actors and patterns of interpretation. This space is portrayed in the media and follows the logic of media for attention but is also part of the process of social control. The mass media are therefore an instance of the design of internal security, social control and an interpretation producer. Mass media become actors of the internal security. They provide a symbolic representation of security.

  6. The Perception of Teachers and School Library Media Specialist on ...

    African Journals Online (AJOL)

    The Perception of Teachers and School Library Media Specialist on the Role of School Library Media Specialists in Selected Secondary Schools in Ogun State. ... Journal Home > Vol 9, No 1 (2012) >. Log in or Register to get access to full text ...

  7. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  8. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  9. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  10. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  11. Comparative Study of Media Use Capacity for 8th Grade Students

    OpenAIRE

    川上, 善郎; 鈴木, 裕久

    1996-01-01

     The world is experiencing a variety of changes resulting from the widespread diffusion of information technology. It is very important to measure the information literacy which allows people to access or to use various information media including computers or wordprocessors. The purpose of this paper is to measure and compare the media use capacity of 8th grade students in Japan, Taiwan and the United States. Specifically, 1. to determine media availability, media knowledge, media skills and...

  12. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  13. Update on Otitis Media in Children.

    Science.gov (United States)

    Schoem, Scott R.

    1997-01-01

    This article discusses otitis media in children. It addresses risk factors for otitis media, pathogenesis, diagnosis, bacteria causing otitis media, and treatment for acute otitis media, recurrent acute otitis media, and persistent otitis media with effusion, including antibiotics, steroids, allergy control, autoinflation, mechanical ventilation,…

  14. Effects of pre-sleep media use on sleep/wake patterns and daytime functioning among adolescents: the moderating role of parental control.

    Science.gov (United States)

    Pieters, Delphine; De Valck, Elke; Vandekerckhove, Marie; Pirrera, Sandra; Wuyts, Johan; Exadaktylos, Vasileios; Haex, Bart; Michiels, Nina; Verbraecken, Johan; Cluydts, Raymond

    2014-01-01

    The aim of this cross-sectional study was to investigate the influence of media use in the hour before bedtime on sleep/wake patterns and daytime functioning among adolescents and to examine the moderating role of parental control. A total of 1,926 Belgian students, 55% girls and 45% boys, with a mean age of 16.9 ± 1.5 years, completed a modified version of the School Sleep Habits Survey. Correlational analyses showed that media use, except television viewing, was associated with later bedtimes and longer sleep latencies. Cell phone and computer usage was negatively associated with daytime functioning. On schooldays, parental control had a moderating effect on the relationship between bedtime and computer use (β = .05; p moderating role between bedtime and television viewing (β = .06; p = .01). As media use can influence the sleep of adolescents considerably, parental control is necessary to regulate the exposure of adolescents to media and to moderate the detrimental effect of media use on sleep.

  15. Post Media Literacy: Menyaksikan Kuasa Media Bersama Michel Foucault

    OpenAIRE

    Iswandi Syahputra

    2017-01-01

    This article would like to present Michel Foucault’s idea concerning Knowledge and Power in media industry. As a contemporary intellectual, Foucault’s thought has a unique style of postmodernism. His thought had gone beyond traditional critical theory whose trying to disclose the relation of power and economic behind the ideology of media. Foucault’s thought had given new perspective in understanding how the media produce truth under tightly control process into something that seems normal. ...

  16. New media coming to Vumilia

    DEFF Research Database (Denmark)

    Gustafsson, Jessica

    2017-01-01

    with a steady increase in television ownership. Moreover, cheaper handsets in general, and smart phones in particular, have made Internet and social media available to a growing part of the Kenyan population. Kenya is often referred to as one of the countries on the African continent that is in the forefront....... Nonetheless, it is equally important to recognise that there are variations within this general urban/rural divide, as categories such as gender, age and class do influence people’s access to and use of media. Moreover, rural and urban areas are naturally connected in numerous ways and thus exchange between......In the last two decades, the media landscape has changed rapidly in Kenya. In the 1990s, the Kenyan media market was deregulated, resulting in a substantial increase of private FM stations and TV stations. In recent years, the enormous uptake of mobile telephones has taken place parallel...

  17. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  18. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  19. Earned print media in advancing tobacco control in Himachal Pradesh, India: a descriptive study.

    Science.gov (United States)

    Sharma, Renu; Shewade, Hemant Deepak; Gopalan, Balasubramaniam; Badrel, Ramesh Kumar; Rana, Jugdeep Singh

    2017-01-01

    The Union-Bloomberg Initiative tobacco control projects were implemented in Himachal Pradesh (a hilly state in North India) from 2007 to 2014. The project focused on the establishment of an administrative framework; increasing the capacity of stakeholders; enforcement of legislation; coalition and networking with multiple stakeholders; awareness generation with focus on earned media and monitoring and evaluation with policy-focussed research. This study aimed to systematically analyse all earned print news items related to the projects. In this cross-sectional descriptive study, quantitative content analysis of earned print news items was carried out using predetermined codes related to areas of tobacco control policies. We also carried out a cost description of the hypothetical value of this earned media. The area of the news item in cm 2 was multiplied by the average rate of space for the paid news item in that particular newspaper. There were 6348 news items: the numbers steadily increased with time. Focus on Monitoring tobacco use, Protecting people from tobacco smoke, Offering help to quit, Warning about dangers of tobacco, Enforcing a ban on tobacco advertising and promotion, Raising tax on tobacco products was seen in 24, 17, 9, 23, 22 and 3% of news items, respectively. Press releases were highest at 44% and report by correspondents at 24%. Further, 55, 23 and 21% news items focused on smoking, smokeless and both forms of tobacco use, respectively. Sixty-six per cent and 34% news items, respectively, were focused on youth and women. The news items had a hypothetical value of US$1503 628.3, which was three times more than the funds spent on all project activities. In the absence of funding for paid media, the project strategically used earned media to promote tobacco control policies in the state.

  20. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  1. Literasi Media Internet di Kalangan Mahasiswa

    Directory of Open Access Journals (Sweden)

    Gracia Rachmi Adiarsi

    2015-10-01

    Full Text Available This study aims to find out to what extent the Internet users in line with media literacy. According to Indonesia Internet Service Provider Association (APJII and BPS Statistic Indonesia, it was found that Internet users in Indonesia have grown since three years ago up to 13% or become 71.19 million people until the end of 2013. According to research survey MarkPlus Insight, “netizen” or Internet users who spend more than three hours per day on Internet. Moreover, they are increasing from 24,2 Million people in 2012 and become 31,7 million people in 2013. This research used qualitative method by gathering the data through Focus Group Discussion (FGD to private university students who spent for Internet 5 hours per day and less than 5 hours per day. The theory used in this research was media literacy. The result of this research stated that students who accessed the Internet below 5 hours per day were already busy with work and not too intense in using the Internet either via smartphone or a computer. Different findings came up from the students who accessed the Internet over 5 hours per day. Most of the time, they used the Internet for social media and instant messaging (instant messenger through smartphones. Critical attitude towards the media message depends on the informants’ interest toward the information. 

  2. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  3. [Detection of rifampicin concentration in cerebrospinal fluid by online enrichment and restricted-access media coupled with high-performance liquid chromatography].

    Science.gov (United States)

    Yang, Xiaoping; Zhang, Xiaohui; Huang, Yanping; Wang, Rong; Xia, Hua; Li, Wenbin; Guo, YouMin

    2015-11-01

    To establish a method for detecting rifampicin in human cerebrospinal fluid (CSF) with restricted access media coupled with high-performance liquid chromatography that allows online direct sample injection and enrichment. We used the column of restricted access media as the pre-treatment column and a C18 column as the analytical column. The mobile phase of pre-treatment column was water-methanol (95:5,V/V) and the flow rate was 1 mL/min; the mobile phase of the analytical column was methanol-acetonitrile-10 mmol/L ammonuium acetate (volume ratio of 60:5:35). The detection wavelength was 254 nm and the column temperature was set at 25 degrees celsius;. For an injection volume of 100 µL, the peak area of rifampicin was 5.33 times that for an injection volume of 20 µL, and the limit of detection was effectively improved. The calibration curve showed an excellent linear relationship (r=0.9997) between rifampicin concentrations and peak areas within the concentration range of 0.25 to 8 µg/mL in CSF. The limits of detection and quantification was 0.07 µg/mL and 0.25 µg/mL, respecetively, with intra-day and inter-day assay precisions and relative standard deviation (RSD%) all below 5%. The recoveries of rifampicin at 3 blank spiked levels (low, medium, and high) ranged from 87.69% to 102.11%. In patients taking oral rifampicin at the dose of 10 mg/kg, the average rifampicin concentration was 0.29 in the CSF at 2 h after medication. The method we established is simple and fast for detecting rifampicin in CSF and allows direct online injection and enrichment with good detection precisions and accuracies.

  4. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  5. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  6. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  7. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  8. Deflection of slow light by magneto-optically controlled atomic media

    International Nuclear Information System (INIS)

    Zhou, D. L.; Wang, R. Q.; Zhou, Lan; Yi, S.; Sun, C. P.

    2007-01-01

    We present a semiclassical theory for light deflection by a coherent Λ-type three-level atomic medium in an inhomogeneous magnetic field or an inhomogeneous control laser. When the atomic energy levels (or the Rabi coupling by the control laser) are position-dependent due to the Zeeman effect caused by the inhomogeneous magnetic field (or due to inhomogeneity of the control field profile), the spatial dependence of the refraction index of the atomic medium will result in an observable deflection of slow signal light when the electromagnetically induced transparency cancels medium absorption. Our theoretical approach based on Fermat's principle in geometrical optics not only provides a consistent explanation for the most recent experiment in a straightforward way, but also predicts the two-photon detuning dependent behaviors and larger deflection angles by three orders of magnitude for the slow signal light deflection by the atomic media in an inhomogeneous off-resonant control laser field

  9. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    Administrator

    participant observation of gender roles and relations in the study community. ..... in domestic and public spheres, access to and control over locally available ...... Proposal on Leadership Initiatives in Awra Amba Community Case Study on.

  10. The Role of Multicultural Media in Connecting Municipal Governments with Ethnocultural Communities: The Case of Ottawa

    Directory of Open Access Journals (Sweden)

    Luisa Veronis

    2015-12-01

    Full Text Available This paper aims to advance understanding of the role ethnic and multicultural media can play in connecting municipal governments and Ethnocultural and Immigrant Communities (EICs. Using an innovative mixed-methods approach and methodological triangulation, we compare the access to and use of multicultural media among four EICs—the Chinese, Latin American, Somali and South Asian—in Ottawa, Canada. Our cross-comparative study yields three main findings: 1 members of participating communities proactively and strategically use a variety of sources to access information about local services; 2 noteworthy differences exist in the access to and use of different types of media both across and within the four EICs, due to demographic and cultural differences; and 3 participants shared challenges and opportunities that multicultural media afford to better connect municipal government and EICs. The paper’s findings make important empirical contributions to the literature on the integrative potential of ethnic and multicultural media by strengthening the reliability of data, validity of findings, and broadening and deepening understanding the role multicultural media play in promoting collaboration between city governments and diverse EICs.

  11. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  12. Creative Artist: A Journal of Theatre and Media Studies

    African Journals Online (AJOL)

    The Creative Artist is an annual publication devoted to the advancement of knowledge in all areas of Theatre and Media arts. Vol 11, No 1 (2017). DOWNLOAD FULL TEXT Open Access DOWNLOAD FULL TEXT Subscription or Fee Access. Table of Contents. Articles. Aquatic theatre: women as performing audience ...

  13. TESOL and Media Education: Navigating Our Screen-Saturated Worlds

    Science.gov (United States)

    Chamberlin-Quinlisk, Carla

    2012-01-01

    Much has changed for today's language learners. The people, artifacts, and popular culture of a target language are often highly accessible to language learners and teachers, despite geographical barriers. This accessibility, of course, is possible through mass media and electronic forms of communication. This is phenomenal. But with this…

  14. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  15. [Social media monitoring of asthmatic children treated in a specialized program: Parents and caregivers expectations].

    Science.gov (United States)

    Urrutia-Pereira, Marilyn; Ávila, Jennifer Bg; Cherrez-Ojeda, Ivan; Ivancevich, Juan Carlos; Solé, Dirceu

    2015-01-01

    Social media has been used in support of patients with asthma. However, it remains unclear what are the expectations of parents or caregivers of asthmatic patients. To evaluate the expectations of parents or caregivers of asthmatic children treated at Children's Asthma Prevention Program (PIPA), Uruguaiana, RS, in relation to the use of social media. An observational, descriptive, cross-sectional survey of parents or caregivers of children seen at Children's Asthma Prevention Program through responses to a written questionnaire on the use of new technologies and different applications to enhance information about asthma. 210 parents or caregivers (median age: 25 years; age range: 18-42 years of patients were enrolled. The mean age of their children was 7.3 years (age range: 2 to 18 years), the mean duration of asthma was 4.7 years and 65% of parents/caregivers of these children had less than eight years of schooling. Most of them (72%) had no access to the Internet via cell/mobile phones and only 18% actively used to gathered information about asthma by internet. There was high interest (87%) in receiving information via social media. Parents or caregivers of children attending the PIPA program expressed high interest in using social media. However, few use it to control their children's disease. While providing a great benefit to use social media as a mean of communication in health, the content needs to be monitored for reliability and quality. The privacy of users (doctors and patients) must be preserved and it is very important to facilitate the access to Internet.

  16. Trends in mass media exposure upon women: A review of Bangladesh Demographic and Health Survey

    Directory of Open Access Journals (Sweden)

    Yasmin Jahan

    2017-01-01

    Full Text Available Background With the rapid advancement of technology, mass media acquired widespread exposure upon major portion of the world population. The overall media platform has smooth access into peoples’ everyday lifestyle through routine tele transmission of all the existing media (such as broadcast, print, digital, outdoor media etc.. Mass media platform is one of the few most powerful influential factors causing dynamic behavioral changes. Objective To assess mass media exposure and it’s changing trends in Bangladesh using data from the Bangladesh Demographic and Health Survey (BDHS from 1993- 94 to 2014. Methods The study used data from the published reports of Bangladesh Demographic and Health Surveys (BDHS 1993-1994 to BDHS 2014. Results In the years of 1999-2000, 2004, 2007, 2014 women aged 20-24 years (41%, 54%, 56%, 57% respectively have passed more time watching television in weekly basis than the other age groups. Higher percentage was observed among the educated women than uneducated from 1999-2000 to 2014 who has made access to all three media (television, radio and newspaper at least once a week. Proportion of women who had accessed all three media at least once a week was much higher in the highest quintile families than the lowest quintile families and more exposure in urban women than the rural women. The region-wise coverage was higher in 1999-2000 in case of Chittagong (5.2%, Dhaka (4.7%, Khulna (5.1%, Rajshahi (3.1%, and Sylhet (3.9% division with access to all three media at least once a week except Barisal division. Conclusion Findings show higher percentage of television watching tendency among comparatively more educated and economically flourished urban women. Therefore, the major policy challenge addressees the need for designing of communications strategies targeting the less privileged, rural and illiterate people who constitute the majority of population in Bangladesh.

  17. Social Media, Education and Data Sharing

    Science.gov (United States)

    King, T. A.; Walker, R. J.; Masters, A.

    2011-12-01

    Social media is a blending of technology and social interactions which allows for the creation and exchange of user-generated content. Social media started as conversations between groups of people, now companies are using social media to communicate with customers and politicians use it to communicate with their constituents. Social media is now finding uses in the science communities. This adoption is driven by the expectation of students that technology will be an integral part of their research and that it will match the technology they use in their social lifes. Students are using social media to keep informed and collaborate with others. They have also replaced notepads with smart mobile devices. We have been introducing social media components into Virtual Observatories as a way to quickly access and exchange information with a tap or a click. We discuss the use of Quick Response (QR) codes, Digital Object Identifiers (DOIs), unique identifiers, Twitter, Facebook and tiny URL redirects as ways to enable easier sharing of data and information. We also discuss what services and features are needed in a Virtual Observatory to make data sharing with social media possible.

  18. Pengguna Media Interaktif Sebagai Kenyataan Maya: Studi Resepsi Khalayak Suarasurabaya.net Sebagai Media Interaktif

    Directory of Open Access Journals (Sweden)

    Ido Prijana Hadi

    2011-07-01

    , journalism and local media on the site of SuaraSurabaya.net and how to access subjective meanings that they have created based on t heir understanding on online media so far. The research is also interested in looking into user reception on information and communication technology based on its relevance with the selected theme namely discourses on global media in website of Radio Suara Surabaya.

  19. Women and the media in South Asia.

    Science.gov (United States)

    Sharma, S; Weerackody, I; Panday, N R; Al-mujahid, S; Musa, A B

    1987-01-01

    This article gives a brief overview of women's access to journalism and communication training, status of women in the media, their needs for development of skills, and portrayal of women in the media, in Bangladesh, Nepal, Pakistan, India and Sri Lanka. 5 authors from those countries contributed sections subdivided into each of these subheadings. In India, women have access to training, but their positions in the media are limited. They are often falsely stereotyped, sensationalized or exploited, or totally absent. In Sri Lanka, however, women are closer to being equal to men, in terms of training, hiring and employment, although they tend to work in women's periodicals. Women are shown in most of the advertisements, and are generally portrayed as perpetually in pursuit of glamour, food, clothes and cosmetics. Media in Nepal are comparatively new; for example, television is only 1 year old. Therefore, opportunities for women are few, and men dominate the hierarchy. Women are portrayed in the media negatively or sensationally, and used extensively in commercials. Women's position in Pakistan is limited in the cities by purdah and in rural areas by the feudal heritage, in which women are chattel. A minority of women are enrolled in journalism schools a employed in the media: those are excelling. Women are often either idealized, abused or caricatured as interested only in consumption. Women have recently entered the journalism profession in Bangladesh, now totaling 24 women. Mores do not permit women to work at night or on outside assignments. The media are liberal in Bangladesh, airing news about dowry abuse and female oppression openly. In most of the countries, women tend to work only until marriage, or afterward are limited by domestic duties.

  20. Social Media Data in the Academic Environment: Crimson Hexagon in the Library

    OpenAIRE

    Tulley, Stephanie; Dennis, Tim

    2016-01-01

    Social media data is a high-profile resource across academic disciplines, in areas as diverse as understanding voter behavior, tracking social communication networks, and identifying sources and effects of pollution on human health. While manual data collection and review from public social media sites can provide some insight into the content of these sources, bulk access to data is preferred for more complex and deeper analysis into the content. A certain amount of data can be accessed dire...

  1. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  2. Guidelines for Accessibility to Microblogging: an Integral Approach

    OpenAIRE

    Martín García, Yod Samuel; Álvarez Alba, Laura; Yelmo Garcia, Juan Carlos

    2011-01-01

    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to ...

  3. Assessing vaccination sentiments with online social media: implications for infectious disease dynamics and control.

    Science.gov (United States)

    Salathé, Marcel; Khandelwal, Shashank

    2011-10-01

    There is great interest in the dynamics of health behaviors in social networks and how they affect collective public health outcomes, but measuring population health behaviors over time and space requires substantial resources. Here, we use publicly available data from 101,853 users of online social media collected over a time period of almost six months to measure the spatio-temporal sentiment towards a new vaccine. We validated our approach by identifying a strong correlation between sentiments expressed online and CDC-estimated vaccination rates by region. Analysis of the network of opinionated users showed that information flows more often between users who share the same sentiments - and less often between users who do not share the same sentiments - than expected by chance alone. We also found that most communities are dominated by either positive or negative sentiments towards the novel vaccine. Simulations of infectious disease transmission show that if clusters of negative vaccine sentiments lead to clusters of unprotected individuals, the likelihood of disease outbreaks is greatly increased. Online social media provide unprecedented access to data allowing for inexpensive and efficient tools to identify target areas for intervention efforts and to evaluate their effectiveness.

  4. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  5. Technology for People, Not Disabilities: Ensuring Access and Inclusion

    Science.gov (United States)

    Foley, Alan; Ferri, Beth A.

    2012-01-01

    The potential of technology to connect people and provide access to education, commerce, employment and entertainment has never been greater or more rapidly changing. Communication technologies and new media promise to "revolutionize our lives" by breaking down barriers and expanding access for disabled people. Yet, it is also true that technology…

  6. Hashtags and How to Use Them on Social Media.

    Science.gov (United States)

    Knapp, Laura; Baum, Neil

    2015-01-01

    A paradigm shift is taking place in American healthcare. We are moving from word-of-mouth marketing to word-of-mouse. Patients and potential patients are accessing the Internet in increasing numbers, and the Yellow Pages is becoming obsolete as fewer patients are using traditional methods of accessing medical practices. Just a few years ago, having a Web site was all that was required to communicate with patients. However, most practices will need to embrace a so- cial media component. This article discusses the role of hashtags in social media and how they enable practices to enhance communications with both existing patients and potential new patients.

  7. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  8. Social Media: Valuable Tools in Today’s Operational Environment

    Science.gov (United States)

    2011-05-04

    Lee Odden, ―Best and Worst Practices Social Media Marketing,‖ Top Rank® Online Market Blog, entry posted 12 February 2009, http://www.toprankblog.com...1001 (accessed 30 March 2011). Odden, Lee. ―Best and Worst Practices Social Media Marketing.‖ Top Rank® Online Market Blog, entry posted 12

  9. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  10. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  11. Risk of Social Media for Teens in an Urban Setting

    OpenAIRE

    Megan Knowles MD; Sara Hirschfeld Lee MD; MaryAnn O’Riordan PhD; Rina Lazebnik MD

    2014-01-01

    Purpose. To describe the self-reported risky behaviors associated with adolescent social media use. Methods. Adolescents ages 13 to 21 years were recruited from a large, urban academic center to complete a written survey regarding social media use. Results are presented as frequencies and percentage; nominal variables were compared using ?2 analysis. Results. Almost all participants (93%) reported belonging to a social media site. The majority of adolescents (72%) access the Internet with a p...

  12. Media Literacy: Smart In Educating Society In Information Technology Era

    Directory of Open Access Journals (Sweden)

    Darwadi MS

    2017-08-01

    Full Text Available Communication Media has been developed in the form of printed Media and electronic Media.   This development is not only easy to communicate and receive information fast wherever and whenever we go but also cheap. Besides positive impacts, it has negative influence to children and teenagers growth and adults. In other word it brings great influence to people. That is why Media literacy is needed so people will be able to know what Media is. Media presents through a long process. What we see is not 100% true.  There are politics, economics, culture etc in it. People have to know and understand Media. So, media literacy is so important to educate society when they access information in mass media. The program must be doing together, comprehensive from all element in society in structural and cultural way.

  13. The impact of open access on the medical literature: a review of current literature

    Directory of Open Access Journals (Sweden)

    Nana Turk

    2017-02-01

    Full Text Available Background: the aim of the article is to conduct an overview of the impact of OA on the medical articles based on 3-part categorization.Methods: Data were identified by a search strategy with eight combinations of keywords (open access, citation impact, citation advantage, citation count, article download, article usage, social media attention, altmetrics and searched in three different databases.Results: the analysis was conducted on 107 studies dealing with citations, downloads and social impact. Sixty-seven of them simply employed the counting citations to OA and non-OA articles; nineteen articles compared the downloads and citations counts; and twenty-one articles investigated the social impact of OA articles. Twenty-five articles investigated the citations, download counts, and social impact of medical articles.Conclusions: The studies investigating the citation impact mostly showed citation advantages. Those that employed citation and download counts of medical articles using randomized controlled trials showed that OA articles were downloaded significantly more frequently, but found no evidence of a citation advantage for open access articles. The citation advantage from open access might be caused by other factors. Results of the studies comparing the social media attention and citations/downloads of the medical articles are often diametrically opposed.

  14. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  15. Emotion regulation's relationships with depression, anxiety and stress due to imagined smartphone and social media loss.

    Science.gov (United States)

    Elhai, Jon D; Hall, Brian J; Erwin, Meredith Claycomb

    2018-03-01

    A sample of 359 students participated in a web survey, administered the Emotion Regulation Questionnaire, and Depression Anxiety Stress Scale-21 (DASS-21) as a pre-test. We subsequently randomly assigned subjects to either 1) a smart phone loss group or 2) social media accounts loss group. We asked them to imagine losing two days' access to the technology in their respective group, and rate associated symptoms using the DASS-21. Compared to subjects in the smartphone loss group, social media loss subjects evidenced stronger relations between suppressive emotion regulation with depression, anxiety and stress from imagined loss. Controlling for age and gender, social media loss subjects' increased use of suppression, and decreased use of cognitive reappraisal in emotion regulation, were related to depression, stress and (for suppression only) anxiety due to imagined lost social media. Emotion regulation was not related to psychopathology for subjects in the smartphone loss scenario. Results suggest that emotion dysregulation may be associated with psychopathology from social media loss. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Smart surfaces with switchable superoleophilicity and superoleophobicity in aqueous media: Toward controllable oil/water separation

    KAUST Repository

    Zhang, L.; Zhang, Z.; Wang, Peng

    2012-01-01

    Advanced materials with surfaces that have controllable oil wettability when submerged in aqueous media have great potential for various underwater applications. Here we have developed smart surfaces on commonly used materials, including non

  17. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  18. Young learners' use of social media for information seeking

    DEFF Research Database (Denmark)

    Hyldegård, Jette Seiden

    2015-01-01

    information seeking activities, strategies and preferences can be identified when young learners use social media for information seeking in relation to course work and other study-related work tasks? 2) What motivations can be identified among young learners for using social media for information seeking....... The reported factors motivating information seeking were convenience and easy access to information, in addition to the content associated with specific social media types. Students’ use of social media for information seeking was associated primarily with their private information landscape. Contributions......Background. Increased use of social media for information seeking and learning calls for more research and knowledge of how these emerging technologies can support students’ learning. Objectives. The focus is on recent studies of young learners’ use of social media for information seeking...

  19. Language Planning and Media in Minority Language and Plurilingual Contexts

    Science.gov (United States)

    Hogan-Brun, Gabrielle

    2011-01-01

    The proliferation of media and their associated platforms is creating radical changes in the way we interact with the world. Social media in particular have increased the manner of communication between people, with on-demand access to content any time, anywhere. With virtual communities being established online through a growing range of…

  20. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  1. Control of media browning in micropropagation of guava (Psidium guajava L.)

    International Nuclear Information System (INIS)

    Ahmad, I.; Nafees, M.; Ashraf, I.

    2016-01-01

    Guava (Psidium guajava L.) is a highly valuable fruit of the tropical regions of the world. This species faces browning or blackening of culture medium during In vitro culture due to leaching of phenolic, microbial contagion and tissue recalcitrance. A study therefore designed to evaluate the effects of antioxidants in reduction of phenolic exudation which hampers In vitro regeneration. The nodal explants of the plant were cultured on MS media after pre-soaking in antioxidant solutions of citric acid, ascorbic acid, poly vinyl pyrrolidine (PVP) and charcoal. After culturing explants, the amount of phenolic exude was determined periodically on spectrophotometer at 750 nm absorbance. Phenolic exudation from guava was significantly reduced in nodes treated with charcoal as compared to control and rest of the treatments. Moreover, guava nodes survival percentage was also significantly increased in charcoal treated nodes. It is concluded that pre-soaking in different antioxidants significantly reduced the media browning and thus micro-propagation of guava could be achieved on commercial basis. (author)

  2. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  3. IPTV based on IP network and streaming media service station

    Science.gov (United States)

    Sun, Jifeng; Gao, Songbo

    2007-11-01

    IPTV can be a new service performed on the Internet in that network transmission and streaming media technologies are getting mature. In this paper, IPTV system infrastructure of UTStarcom, key technologies deployed, and applications will be discussed and evaluated. The key technologies to achieve IPTV services include 1) codec and compression; 2) streaming media; and 3) broadband networks and access to such networks. The implementation of Media Switch IPTV system in Harbin CNC city network is also discussed.

  4. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    .... The derivation of the author's thesis focuses awareness on effective information allocation that is reliable and accurate while maintaining its confidentiality based upon some level of discretionary access control (DAC...

  5. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  6. Global communications: democratic access for women.

    Science.gov (United States)

    1995-01-01

    In preparation for the 1995 World Conference on Women, women of the Latin American Information Agency prepared a statement for the UN about the importance of communications and information in the contemporary world and the role of women in the media. The statement includes the following specific suggestions: 1) that the UN promote the democratization of communications with a gender focus, 2) that women be assured access to new communications technologies that empower their communicational capacity, 3) that steps be taken to ensure that media content projects a positive and nondiscriminatory image of women, and 4) that guidelines be drawn up to promote labor equality between the genders and a greater presence of women in decision-making positions in the media.

  7. Media literacy for clinicians and parents.

    Science.gov (United States)

    Villani, V Susan; Olson, Cheryl K; Jellinek, Michael S

    2005-07-01

    Families and children are in the midst of a media revolution. Television, Internet access, instant messaging, cell phones, and interactive video games are delivering more information for more hours than ever in history. Exposure is occurring at younger and younger ages, often without parental oversight or interpretation. The impact on children is just beginning to be studied. Does media exposure prepare children for the world in which they live or deprive them of critical developmental opportunities? Does the steady display of violence contribute to violent behavior? This article presents a developmental context, discusses the research conducted to date, reviews the recommendations of major organizations, and tries to take a balanced perspective in the midst of a rising tide of media, technology, commercialism, and controversy.

  8. Making the message count: a new CNA media relations strategy

    International Nuclear Information System (INIS)

    Metza, P.

    1996-01-01

    The points made, in anecdotal form, are that: experts should be accessible to the media; the CNA should be active in speaking to the media; simple language should be used; the industry should present a human face; nobody should be surprised that reporters are cynical, suspicious and skeptical about industry, government and ''the establishment''

  9. Making the message count: a new CNA media relations strategy

    Energy Technology Data Exchange (ETDEWEB)

    Metza, P [Canadian Nuclear Association, Toronto, ON (Canada)

    1997-12-31

    The points made, in anecdotal form, are that: experts should be accessible to the media; the CNA should be active in speaking to the media; simple language should be used; the industry should present a human face; nobody should be surprised that reporters are cynical, suspicious and skeptical about industry, government and ``the establishment``.

  10. Suspect online sellers and contraceptive access.

    Science.gov (United States)

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2012-11-01

    Issues surrounding contraception access have been a national focus. During this debate, adolescent and adult women may seek these products online. Due to safety concerns, including potential counterfeit forms, we wished to assess whether online "no prescription" contraceptives were available. We assessed online availability of reversible, prescription contraceptive methods resulting in online pharmacy marketing is shifting from direct search engine access to social media (Facebook, Twitter, Slidehare, flickr). Online contraceptive sales represent patient safety risks and a parallel system of high-risk product access absent professional guidance. Providers should educate patients, while policy makers employ legal strategies to address these systemic risks. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. The Influence of Social Media on Collaborative Learning in a Cohort Environment

    OpenAIRE

    Natasha James-Waldon; Debbi Bromley; Zandra Henry; Silas Wandera

    2016-01-01

    This paper provides an overview of the impact that social media has on the development of collaborative learning within a cohort environment in a doctoral program. The researchers surveyed doctoral students in an education program to determine how social media use has influenced the doctoral students. The study looked at the following areas: a) the ability of social media use to develop a collaborative learning environment, b) access to social media content which supports learning, and c) whe...

  12. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  14. Developing nursing leadership in social media.

    Science.gov (United States)

    Moorley, Calvin; Chinn, Teresa

    2016-03-01

    A discussion on how nurse leaders are using social media and developing digital leadership in online communities. Social media is relatively new and how it is used by nurse leaders and nurses in a digital space is under explored. Discussion paper. Searches used CINAHL, the Royal College of Nursing webpages, Wordpress (for blogs) and Twitter from 2000-2015. Search terms used were Nursing leadership + Nursing social media. Understanding the development and value of nursing leadership in social media is important for nurses in formal and informal (online) leadership positions. Nurses in formal leadership roles in organizations such as the National Health Service are beginning to leverage social media. Social media has the potential to become a tool for modern nurse leadership, as it is a space where can you listen on a micro level to each individual. In addition to listening, leadership can be achieved on a much larger scale through the use of social media monitoring tools and exploration of data and crowd sourcing. Through the use of data and social media listening tools nursing leaders can seek understanding and insight into a variety of issues. Social media also places nurse leaders in a visible and accessible position as role models. Social media and formal nursing leadership do not have to be against each other, but they can work in harmony as both formal and online leadership possess skills that are transferable. If used wisely social media has the potential to become a tool for modern nurse leadership. © 2016 John Wiley & Sons Ltd.

  15. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... Statistics Denmark. The outcome measure was BP control defined as BP...

  16. Lexical Access in L2 Speech Production: a controlled serial search task

    Directory of Open Access Journals (Sweden)

    Gicele Vergine Vieira

    2017-09-01

    Full Text Available When it comes to lexical access in L2 speech production, working memory (WM seems to play a central role as for less automatized procedures require more WM capacity to be executed (Prebianca, 2007. With that in mind, this paper aims at claiming that bilingual lexical access qualifies as a controlled serial strategic search task susceptible to individual differences in WM capacity. Evidence in support of such claim is provided by the results of AUTHOR's (2010 study conducted so as to investigate the relationship between L2 lexical access, WMC and L2 proficiency. AUTHOR's (2010 findings indicate that bilingual lexical access entails underlying processes such as cue generation, set delimitation, serial search and monitoring, which to be carried out, require the allocation of attention. Attention is limited and, as a result, only higher spans were able to perform these underlying processes automatically.

  17. Access Control Mechanism for Blog Posts with Fine-Grained Ability Using Simple Operations

    Institute of Scientific and Technical Information of China (English)

    Yi-Hui Chen; Chi-Shiang Chan; Yuan-Yu Tsai

    2017-01-01

    Access control enables the owners to assign different users different permissions to see different views. The current blog system does not support fine-grained authorization. That is, the bloggers disallow to just assign partial contents of the blog posts (i.e., a paragraph or several paragraphs) to readers. The management cost is no doubt to be significantly increased while handling the authorizations on the huge amount of blog articles. In this paper, we propose a scheme for supporting a fine-grained access control mechanism on blog articles. The advantage is that bloggers are able to authorize partial contents of blog posts to different users or groups of users.

  18. Inside the Digital Wild West: How School Leaders Both Access and Avoid Social Media

    Science.gov (United States)

    Corrigan, Laurie; Robertson, Lorayne

    2015-01-01

    This study examines the roles of Canadian school leaders in response to the rising phenomenon of student use of social media which impacts school climate and safety. The use of social media has resulted in more online text and image-based communication to multiple users and less face-to-face communication with single users. Adolescent…

  19. MEDIA MASSA DAN RUANG PUBLIK (Analisis Perilaku Penggunaan Sosial Media dan Kemampuan Remaja dalam menulis

    Directory of Open Access Journals (Sweden)

    Juwono Tri Atmodjo

    2015-11-01

    Full Text Available Mass communication media facilitate new web-based way to send a message and the transformation of a media value to others . It appears once as the number and types of social media with an excess of the ability to express ideas, opinions, funny stories, vent arena, and the troubled space with varying terminology The procedure varies penggunaannyapun penggunaannyapun more varied behavior . The survey was to assess the use of social media by ramaja and writing skills gained from the use of social media . Based on data analysis that ; social media most used by teens are Facebook, Twitter , and Yahoo! Messenger and chat through the use of social media is often done . Respondents are not familiar with the use of blogs, SlideShare , instagram, flicker, Skype, Myspace, Friendfeed, and Fhorum . Average use of social media by teens for 3 hours per day , which is accessed through the most HP to update the status, respondents were able to express the idea/ideas and feelings in writing, listening to other people's posts , teens learn the language, able to use symbols used teen, easy of expression, described feeling depressed and juvenile writing skills by using social media .   media komunikasi massa memfasilitasi cara berbasis web untuk mengirim pesan dan transformasi nilai media untuk orang lain. Tampaknya sekali sebagai jumlah dan jenis media sosial dengan kelebihan kemampuan untuk mengekspresikan ide, pendapat, cerita lucu, arena ventilasi, dan ruang bermasalah dengan berbagai terminologi. Prosedur bervariasi penggunaannyapun penggunaannyapun perilaku yang lebih bervariasi. survei ini adalah untuk menilai penggunaan media sosial oleh ramaja dan menulis keterampilan yang diperoleh dari penggunaan media sosial. Berdasarkan analisis data yang; media sosial paling banyak digunakan oleh remaja Facebook, Twitter, dan Yahoo! Messenger dan chatting melalui penggunaan media sosial sering dilakukan. Responden tidak akrab dengan penggunaan blog, Slide

  20. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  1. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    This paper explores gender relations in access to and control over resources in Awra Amba Community of Amhara Region, Ethiopia. The study employed primary and secondary data sources. The primary data were gathered through semistructured interviews with selected community members and key informants, focus ...

  2. The Role of Multicultural Media in Connecting Municipal Governments with Ethnocultural and Immigrant Communities: The Case of Ottawa

    Directory of Open Access Journals (Sweden)

    Luisa Veronis

    2015-12-01

    Full Text Available This paper aims to advance understanding of the role ethnic and multicultural media can play in connecting municipal governments and Ethnocultural and Immigrant Communities (EICs. Using an innovative mixed-methods approach and methodological triangulation, we compare the access to and use of multicultural media among four EICs—the Chinese, Latin American, Somali, and South Asian—in Ottawa, Canada. Our cross-comparative study yields three main findings: 1 members of participating communities proactively and strategically use a variety of sources to access information about local services; 2 noteworthy differences exist in the access to and use of different types of media both across and within the four EICs, due to demographic and cultural differences; and 3 participants shared challenges and opportunities that multicultural media afford to better connect municipal government and EICs. The paper’s findings make important empirical contributions to the literature on the integrative potential of ethnic and multicultural media by strengthening the reliability of data, validity of findings, and broadening and deepening understanding the role multicultural media play in promoting collaboration between city governments and diverse EICs.

  3. Quantification and Control of Wall Effects in Porous Media Experiments

    Science.gov (United States)

    Roth, E. J.; Mays, D. C.; Neupauer, R.; Crimaldi, J. P.

    2017-12-01

    Fluid flow dynamics in porous media are dominated by media heterogeneity. This heterogeneity can create preferential pathways in which local seepage velocities dwarf system seepage velocities, further complicating an already incomplete understanding of dispersive processes. In physical models of porous media flows, apparatus walls introduce preferential flow paths (i.e., wall effects) that may overwhelm other naturally occurring preferential pathways within the apparatus, leading to deceptive results. We used planar laser-induced fluorescence (PLIF) in conjunction with refractive index matched (RIM) porous media and pore fluid to observe fluid dynamics in the porous media, with particular attention to the region near the apparatus walls in a 17 cm x 8 cm x 7 cm uniform flow cell. Hexagonal close packed spheres were used to create an isotropic, homogenous porous media field in the interior of the apparatus. Visualization of the movement of a fluorescent dye revealed the influence of the wall in creating higher permeability preferential flow paths in an otherwise homogenous media packing. These preferential flow paths extended approximately one half of one sphere diameter from the wall for homogenously packed regions, with a quickly diminishing effect on flow dynamics for homogenous media adjacent to the preferential pathway, but with major influence on flow dynamics for adjoining heterogeneous regions. Multiple approaches to mitigate wall effects were investigated, and a modified wall was created such that the fluid dynamics near the wall mimics the fluid dynamics within the homogenous porous media. This research supports the design of a two-dimensional experimental apparatus that will simulate engineered pumping schemes for use in contaminant remediation. However, this research could benefit the design of fixed bed reactors or other engineering challenges in which vessel walls contribute to unwanted preferential flow.

  4. Analysis of library patrons' usage of social media in a Nigerian ...

    African Journals Online (AJOL)

    The findings revealed that Whatsapp and facebook were greatly used as it creates current awareness on the happening in the institution; it also established that social media enabled students to access local and web contents of information needs globally. The findings revealed that critical social media literacy is needed to ...

  5. Fake News Detection on Social Media: A Data Mining Perspective

    OpenAIRE

    Shu, Kai; Sliva, Amy; Wang, Suhang; Tang, Jiliang; Liu, Huan

    2017-01-01

    Social media for news consumption is a double-edged sword. On the one hand, its low cost, easy access, and rapid dissemination of information lead people to seek out and consume news from social media. On the other hand, it enables the wide spread of "fake news", i.e., low quality news with intentionally false information. The extensive spread of fake news has the potential for extremely negative impacts on individuals and society. Therefore, fake news detection on social media has recently b...

  6. Freedom and Responsibility in First Amendment Theory: Defamation Law and Media Credibility.

    Science.gov (United States)

    Hunsaker, David M.

    1979-01-01

    Explores the concepts of freedom and responsibility in the context of First Amendment theory through an examination of the interrelationships between defamation law, access to media, and media credibility. Calls for a reassessment of the importance of defamation law in First Amendment theory. (JMF)

  7. Social Media Influencing C2 in Underdeveloped and Degraded Operational Environments

    Science.gov (United States)

    2013-06-01

    soldiers standing guard at the Tomb of the Unknown Soldier, a picture of a giant wave slamming into 18 th ICCRTS Paper ID: 103 | Social Media...efforts. Network monitoring site BGPmon found that 88 percent of Egyptian networks had become unreachable, with many Egyptian internet service providers...upheaval [69]. The Egyptian society was able to participate in social media because of the reach of the relevant media. In Egypt, youngsters had access to

  8. INSIGHTS INTO THE DYNAMICS OF BUSINESS MODELS IN THE MEDIA INDUSTRY

    OpenAIRE

    Westerlund, Mika; Rajala, Risto; Leminen, Seppo

    2011-01-01

    Media production and consumption are under a drastic change. The digitalization of content production, delivery and use as well as the increase of the broadband Internet access in both fi xed and mobile networks allow the use of media contents in a myriad of different terminals. Simultaneously, media consumption is becoming increasingly social, participatory, ubiquitous and multi-channeled by nature. The novel technologies that enable shared public and interpersonal communications are of sign...

  9. Social media ‘on the go’: Examining the impact of age

    OpenAIRE

    Bolat, Elvira; Cutler-Smith, H.

    2016-01-01

    Social media can, therefore, be seen as an extension of people’s lives with opportunities to construct virtual identities as well as personal, social and professional spaces that altogether extend boundaries of offline contexts. Social media consumption is particularly immersive and complex in the cases when individuals are accessing and using social media on the go, via mobile devices. Although extensive number of studies explored the consumers’ adoption of mobile technology and adoption of ...

  10. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  11. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  12. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  13. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  14. Social media and activist communication

    NARCIS (Netherlands)

    Poell, T.; van Dijck, J.; Atton, C.

    2015-01-01

    While the rise of social media has made activists much less dependent on television and mainstream newspapers, this certainly does not mean that activists have more control over the media environments in which they operate. Media power has neither been transferred to the public, nor to activists for

  15. The use of Social Media in Health Systems: Opportunities and challenges

    Directory of Open Access Journals (Sweden)

    Hasan Ashrafi-rizi

    2015-04-01

    health information in video, audio and text simultaneously, and marketing health information 4. Management. Including: accreditation of companies, institutions and individuals in the health field, access to senior managers, improving internal relationship, expanding health services marketing (4 and participating in social development, such as building hospitals. 5. Social Communication. Including: contributing to mass movements or services, such as earthquakes, floods, etc., establishing online communities (8, forming a group of fans interested in a special fields such as health tourism and AIDS, motivating the users and members of the health different fields (11, monitoring health products and services, and enhancing patient interaction with other patients as well as patients with other people. In spite of all these potentialities and capabilities provided by social media for the general public, especially health professionals, there are important questions posed by the users, active organizations in the field of media, policy makers and the health authorities. These questions are related to issues such as protection of user information, validation of information and information value (7, intellectual property, convincing the members about the usability and usefulness of the media, the lack of appropriate foundation, anxiety of users about controlling the media by other people’s fear and misconceptions about the media (12, and the quantity and quality of impact on family members, mental health, identity and education systems. It seems that paying particular attention to health researchers and providing the perfect infrastructure to provide this information in various media, including health journals, can make different aspects of this issue clear so that health administrators can easily use social media in writing strategies and plans in different fields of health.

  16. The Access Gap: Poverty and Characteristics of School Library Media Centers

    Science.gov (United States)

    Pribesh, Shana; Gavigan, Karen; Dickinson, Gail

    2011-01-01

    Stephen Krashen believes that schools can counter the effects of poverty in at least one area: access to books. However, little research has been done to determine whether students living in poverty have access to school library services comparable to those attending schools with low concentrations of students living in poverty. We examined the…

  17. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  18. The effects of media, self-esteem, and BMI on youth's unhealthy weight control behaviors.

    Science.gov (United States)

    Mayer-Brown, Sarah; Lawless, Casey; Fedele, David; Dumont-Driscoll, Marilyn; Janicke, David M

    2016-04-01

    Youth engage in a variety of methods to manage their weight, including unhealthy weight control behaviors (UWCBs). The purpose of this study was to examine factors associated with youth's engagement in UWCBs, including media influence, youth's BMI z-score and self-esteem. Participants were 179 youth, aged 10-17, attending a primary care clinic appointment. Youth completed questionnaires assessing frequency of UWCBs, global self-worth, and perception of media influence to lose weight. BMI z-score was calculated based on height and weight measurements obtained from medical charts. The SPSS macro, PROCESS, was used to conduct moderation analyses. Over 40% of youth endorsed using at least one UWCB in the past year. Girls reported using more UWCBs and engaging in UWCBs more frequently than boys. For boys, media influence to lose weight was only related to UWCB frequency for those with a BMI z-score of 1.23 and above. For girls, media influence was only related to UWCB frequency for those with low to average levels of global self-worth. Girls' and boys' use of UWCBs is impacted by different factors. Prevention efforts should consider targeting factors, such as weight status and self-esteem, which are uniquely associated with gender. Copyright © 2015. Published by Elsevier Ltd.

  19. Media ion composition controls regulatory and virulence response of Salmonella in spaceflight.

    Directory of Open Access Journals (Sweden)

    James W Wilson

    Full Text Available The spaceflight environment is relevant to conditions encountered by pathogens during the course of infection and induces novel changes in microbial pathogenesis not observed using conventional methods. It is unclear how microbial cells sense spaceflight-associated changes to their growth environment and orchestrate corresponding changes in molecular and physiological phenotypes relevant to the infection process. Here we report that spaceflight-induced increases in Salmonella virulence are regulated by media ion composition, and that phosphate ion is sufficient to alter related pathogenesis responses in a spaceflight analogue model. Using whole genome microarray and proteomic analyses from two independent Space Shuttle missions, we identified evolutionarily conserved molecular pathways in Salmonella that respond to spaceflight under all media compositions tested. Identification of conserved regulatory paradigms opens new avenues to control microbial responses during the infection process and holds promise to provide an improved understanding of human health and disease on Earth.

  20. Effective wavefield extrapolation in anisotropic media: Accounting for resolvable anisotropy

    KAUST Repository

    Alkhalifah, Tariq Ali

    2014-04-30

    Spectral methods provide artefact-free and generally dispersion-free wavefield extrapolation in anisotropic media. Their apparent weakness is in accessing the medium-inhomogeneity information in an efficient manner. This is usually handled through a velocity-weighted summation (interpolation) of representative constant-velocity extrapolated wavefields, with the number of these extrapolations controlled by the effective rank of the original mixed-domain operator or, more specifically, by the complexity of the velocity model. Conversely, with pseudo-spectral methods, because only the space derivatives are handled in the wavenumber domain, we obtain relatively efficient access to the inhomogeneity in isotropic media, but we often resort to weak approximations to handle the anisotropy efficiently. Utilizing perturbation theory, I isolate the contribution of anisotropy to the wavefield extrapolation process. This allows us to factorize as much of the inhomogeneity in the anisotropic parameters as possible out of the spectral implementation, yielding effectively a pseudo-spectral formulation. This is particularly true if the inhomogeneity of the dimensionless anisotropic parameters are mild compared with the velocity (i.e., factorized anisotropic media). I improve on the accuracy by using the Shanks transformation to incorporate a denominator in the expansion that predicts the higher-order omitted terms; thus, we deal with fewer terms for a high level of accuracy. In fact, when we use this new separation-based implementation, the anisotropy correction to the extrapolation can be applied separately as a residual operation, which provides a tool for anisotropic parameter sensitivity analysis. The accuracy of the approximation is high, as demonstrated in a complex tilted transversely isotropic model. © 2014 European Association of Geoscientists & Engineers.

  1. Effective wavefield extrapolation in anisotropic media: Accounting for resolvable anisotropy

    KAUST Repository

    Alkhalifah, Tariq Ali

    2014-01-01

    Spectral methods provide artefact-free and generally dispersion-free wavefield extrapolation in anisotropic media. Their apparent weakness is in accessing the medium-inhomogeneity information in an efficient manner. This is usually handled through a velocity-weighted summation (interpolation) of representative constant-velocity extrapolated wavefields, with the number of these extrapolations controlled by the effective rank of the original mixed-domain operator or, more specifically, by the complexity of the velocity model. Conversely, with pseudo-spectral methods, because only the space derivatives are handled in the wavenumber domain, we obtain relatively efficient access to the inhomogeneity in isotropic media, but we often resort to weak approximations to handle the anisotropy efficiently. Utilizing perturbation theory, I isolate the contribution of anisotropy to the wavefield extrapolation process. This allows us to factorize as much of the inhomogeneity in the anisotropic parameters as possible out of the spectral implementation, yielding effectively a pseudo-spectral formulation. This is particularly true if the inhomogeneity of the dimensionless anisotropic parameters are mild compared with the velocity (i.e., factorized anisotropic media). I improve on the accuracy by using the Shanks transformation to incorporate a denominator in the expansion that predicts the higher-order omitted terms; thus, we deal with fewer terms for a high level of accuracy. In fact, when we use this new separation-based implementation, the anisotropy correction to the extrapolation can be applied separately as a residual operation, which provides a tool for anisotropic parameter sensitivity analysis. The accuracy of the approximation is high, as demonstrated in a complex tilted transversely isotropic model. © 2014 European Association of Geoscientists & Engineers.

  2. #Cleft: The use of Social Media Amongst Parents of Infants with Clefts.

    Science.gov (United States)

    Khouri, Joseph S; McCheyne, Melisande J; Morrison, Clinton S

    2018-01-01

    Introduction Many societies and organizations are using social media to reach their target audience. The extent to which parents of patients with craniofacial anomalies use social media has yet to be determined. The goal of this study is to characterize and describe the use of social media by the parents of children with cleft lip and palate as it pertains to the care of their child. Materials and Methods Parents or guardian of all patients presenting for initial consultation regarding a child's congenital cleft anomaly were contacted by phone or mail to complete a survey regarding their use of social media vis-à-vis their child's cleft anomaly. Participants were asked to answer a 19-question survey. Results Thirty-two families were contacted and 25 surveys were completed. Ninety-two percent of respondents used social media to learn about their child's diagnosis. Facebook (76%) and blogs (24%) were the most commonly accessed social media outlets, followed by Instagram (8%). Education about the diagnosis and treatment of cleft pathology (87%) was the most common reason for accessing social media, followed by companionship and support (56%), and advice about perioperative care (52%). Almost half (43%) of parents used social media to obtain information on their caregiver and treatment team, and 26% of parents used information gained on social media to guide their decision on where to seek care. Conclusion Social media is a readily available resource, one that will certainly shape the experiences of our patients and families for years to come.

  3. Information Access Skills in Mothers as Containment of Internet Negative Impact

    Directory of Open Access Journals (Sweden)

    Putri Limilia

    2018-02-01

    Full Text Available Media and Information Literacy (MIL skills was one of the skills that must be possessed by netizens. These skills become important in the effort of coping with the negative impact of the internet. The high penetration of the internet is not followed by the high skill of MIL. Therefore, the writers are interested to know the skills of information and media literacy (access skills in mothers. This study uses descriptive quantitative method by using questionnaires as means of data collection. The result of the study shows that mothers tend to have moderate-level information access skills. The skills are reflected in the skills of mothers at moderate level in understanding the role of information, seeking sources of information, accessing information effectively and efficiently, and storing information.

  4. Using Media in the Foreign Language. Case Study Media Use of the Students of the Babes- Bolyai University, Romania

    Directory of Open Access Journals (Sweden)

    Meda MUCUNDORFEANU

    2010-01-01

    Full Text Available In the last few years, thanks to the Internet, access to foreign language media has become more and more easy, which is why the number of foreign language media users has increased. This research focuses on exploring the use of German speaking media by Romanian students from the German speaking departments of the Babes-Bolyai University in Cluj-Napoca. The theoretical background of the study is the Uses and Gratifications theory. The research methods applied were the focus group, followed by a survey applied to a representative number of students. Our research highlighted the fact that the students from German language programs often used German television and German websites. In regard to the German media in general, most respondents stated that they satisfy, in a very large mount, the needs described by the Uses and Gratifications model.

  5. Pharmacy, social media, and health: Opportunity for impact.

    Science.gov (United States)

    Cain, Jeff; Romanelli, Frank; Fox, Brent

    2010-01-01

    To discuss opportunities and challenges for pharmacists' use of social media to affect health care. Not applicable. Evolutions in social media (e.g., Facebook, Twitter, YouTube) are beginning to alter the way society communicates. These new applications promote openness, user-generated content, social networking, and collaboration. The technologies, along with patient behaviors and desires, are stimulating a move toward more open and transparent access to health information. Although social media applications can reach large audiences, they offer message-tailoring capabilities that can effectively target specific populations. Another powerful aspect of social media is that they facilitate the organization of people and distribution of content-two necessary components of public health services. Although implementing health interventions via social media poses challenges, several examples exist that display the potential for pharmacists to use social media in health initiatives. Pharmacists have long played a role in educating patients on matters influencing health care. Social media offer several unique features that may be used to advance the role of pharmacy in health care initiatives. Public familiarity with social media, the economical nature of using social media, and the ability to disseminate information rapidly through social media make these new applications ideal for pharmacists wanting to provide innovative health care on both an individual and public level.

  6. Problematic Online Pornography Use: A Media Attendance Perspective.

    Science.gov (United States)

    Sirianni, Joseph M; Vishwanath, Arun

    2016-01-01

    Since the rise of the popularity of the Internet, the accessibility of pornography has been a growing concern. One particular concern is the potential risk for addictive behaviors to occur as a result of the ease of viewing online pornographic material. The research presented herein explored online pornography addiction using a media attendance perspective, which allows media critics to examine the needs that people seek to fulfill from engaging with various media. Past studies that have used a media attendance perspective to explore media addiction, rephrased here as problematic media use, have done so using social cognitive theory and the concept of deficient self-regulation. Deficient self-regulation may be experienced by all media consumers and can range from normally impulsive media choices to pathological media choices which may result in detrimental life consequences. Borrowing from this, the current study reevaluated online pornography addiction using deficient self-regulation within a sociocognitive framework of media attendance. Results of our model show deficient self-regulation influences habitual online pornography consumption. Moreover, online pornography use motivated by social needs is perpetuated by deficient self-regulation and may lead to negative life consequences in some individuals. These findings contribute a new perspective and framework for understanding problematic online pornography use.

  7. Bioethics in popular science: evaluating the media impact of The Immortal Life of Henrietta Lacks on the biobank debate.

    Science.gov (United States)

    Nisbet, Matthew C; Fahy, Declan

    2013-02-28

    The global expansion of biobanks has led to a range of bioethical concerns related to consent, privacy, control, ownership, and disclosure. As an opportunity to engage broader audiences on these concerns, bioethicists have welcomed the commercial success of Rebecca Skloot's 2010 bestselling book The Immortal Life of Henrietta Lacks. To assess the impact of the book on discussion within the media and popular culture more generally, we systematically analyzed the ethics-related themes emphasized in reviews and articles about the book, and in interviews and profiles of Skloot. We conducted a content analysis of a population of relevant English-language articles and transcripts (n = 125) produced by news organizations and publications in the U.S., Canada, Great Britain/Ireland, and Australia/New Zealand. We scored each article for the emphasis and appearance of 9 ethics-related themes. These were informed consent, welfare of the vulnerable, compensation, scientific progress, control/access, accountability/oversight, privacy, public education, and advocacy. The informed consent theme dominated media discussion, with almost 39.2 percent of articles/transcripts featuring the theme as a major focus and 44.8 percent emphasizing the theme as a minor focus. Other prominent themes and frames of reference focused on the welfare of the vulnerable (18.4 percent major emphasis; 36.0 percent minor emphasis), and donor compensation (19.2 percent major; 52.8 percent minor). Ethical themes that comprised a second tier of prominence included those of scientific progress, control/access, and accountability/oversight. The least prominent themes were privacy, public education, and advocacy. The book has been praised as an opportunity to elevate media discussion of bioethics, but such claims should be re-considered. The relatively narrow focus on informed consent in the media discussion generated by Skloot's book may limit the ability of ethicists and advocates to elevate attention to

  8. Faculty Usage of Social Media and Mobile Devices: Analysis of Advantages and Concerns

    Science.gov (United States)

    Roebuck, Deborah Britt; Siha, Samia; Bell, Reginald L.

    2013-01-01

    This study seeks to understand the perceptions of professors using social media (also called Web 2.0 tools) in the classroom, what kinds of mobile devices are used to access the social media used, and what drives individuals to use them. In addition, it seeks to identify the advantages and concerns faculty has with the use of social media for…

  9. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  10. Risk of Social Media for Teens in an Urban Setting.

    Science.gov (United States)

    Knowles, Megan; Lee, Sara Hirschfeld; O'Riordan, MaryAnn; Lazebnik, Rina

    2014-01-01

    Purpose. To describe the self-reported risky behaviors associated with adolescent social media use. Methods. Adolescents ages 13 to 21 years were recruited from a large, urban academic center to complete a written survey regarding social media use. Results are presented as frequencies and percentage; nominal variables were compared using χ(2) analysis. Results. Almost all participants (93%) reported belonging to a social media site. The majority of adolescents (72%) access the Internet with a phone. Nearly half (49%) of participants accept friend requests from strangers, 42% send friend requests to strangers, and 55% of participants report meeting people from social media sites in person. Conclusion. Adolescents self-report engaging in a number of risky behaviors when they use social media. Teenagers' use of social media is an additional behavior that requires attention and monitoring.

  11. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  12. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  13. Composing Focus: Shaping Temporal, Social, Media, Social Media, and Attentional Environments

    Science.gov (United States)

    Fife, Jane

    2017-01-01

    Writers must learn to control factors that influence the ability to focus, especially in what some call a culture of distraction. In our efforts to promote metacognition and flexible writing processes, writing teachers need to engage students in study and discussion of factors in our temporal, social, media, social media, and attentional…

  14. Harm reduction in U.S. tobacco control: Constructions in textual news media.

    Science.gov (United States)

    Eversman, Michael H

    2015-06-01

    U.S. tobacco control has long emphasized abstinence, yet quitting smoking is hard and cessation rates low. Tobacco harm reduction alternatives espouse substituting cigarettes with safer nicotine and tobacco products. Policy shifts embracing tobacco harm reduction have increased media attention, yet it remains controversial. Discourse theory posits language as fluid, and socially constructed meaning as neither absolute nor neutral, elevating certain views over others while depicting "discursive struggle" between them. While an abstinence-based framework dominates tobacco policy, discourse theory suggests constructions of nicotine and tobacco use can change, for example by positioning tobacco harm reduction more favorably. Textual discourse analysis was used to explore constructions of tobacco harm reduction in 478 (308 original) U.S. textual news media articles spanning 1996-2014. Using keyword database sampling, retrieved articles were analyzed first as discrete recording units and then to identify emergent thematic content. Constructions of tobacco harm reduction shifted over this time, revealing tension among industry and policy interests through competing definitions of tobacco harm reduction, depictions of its underlying science, and accounts of regulatory matters including tobacco industry support for harm reduction and desired marketing and taxation legislation. Heightened salience surrounding tobacco harm reduction and electronic cigarettes suggests their greater acceptance in U.S. tobacco control. Various media depictions construct harm reduction as a temporary means to cessation, and conflict with other constructions of it that place no subjective value on continued "safer" tobacco/nicotine use. Constructions of science largely obscure claims of the veracity of tobacco harm reduction, with conflict surrounding appropriate public health benchmarks for tobacco policy and health risks of nicotine use. Taxation policies and e-cigarette pricing relative to

  15. THE IMAGE OF BALI TOURISM IN SOCIAL NETWORKING MEDIA

    Directory of Open Access Journals (Sweden)

    Ni Gusti Ayu Dewi Paramita Arisandi

    2016-03-01

    Full Text Available Tourism is growing very rapidly with the development of technology, especially information technology .Through information technology people can easily get access to information about various destinations and tourist attractions as well as hotel by online media communication. Therefore, this study was trying to use social media such as facebook and twitter, where both social media were widely used by companies engaged in tourism in the world as well as in Bali. Internet consists of several websites, but the most effective one to conduct the research on tourism such as webseries 2.0 or commonly called as social networking media. Social medias - Facebook and Twitter - both were wildly used by the companies running in the sector of tourism in Bali, such as Hotels, Villas, Restaurants, Spas, Travel Agents, Airlines, and Tourist Attraction Managements, to advertised their products and services in their respective field. Through those social media, tourists will be able to access the comments or reviews about the companies. The problem raised in this research is how Bali’s tourism data in social networking media were used and considered, and how was the image of Bali’s tourism in their point of viewbased on the research. The method used here was descriptive qualitative method which describes this phenomenon descriptively by analyzing the obtained comments on social networking media such as facebook and twitter, and then classified in the form of comments positive, negative, and unidentified comment. Afterwards comments were re-analyzed through 4A Approach which consist of Attraction, amenities, Ancillary, and Accessibility. Data which has been obtained re-analyzed via the data obtained from the homepage of (TripAdvisor and Agoda.com. In addition, to strengthen the research data obtained from the homepage of TripAdvisor and Agoda.com , then it has been elaborated on the point rating system which indicatedthat the company were registered in both of

  16. Empowering Indonesian women through building digital media literacy

    Directory of Open Access Journals (Sweden)

    Fiona Suwana

    2017-09-01

    Full Text Available There is still a gender digital divide in Indonesia. Indonesian women need digital media literacy skills to effectively use the Internet and to raise their quality of life. Empowering literacy abilities includes the skills of using digital media to access, search, analyze, reflect, share, and create. In this qualitative research study, founders, leaders, and participants from IWITA (Indonesian Women Information Technology Awareness and FemaleDev (Female Developer were interviewed because these organizations focus on developing digital literacy for women. The findings indicated that digital media literacy remains low because of inadequate education, lack of opportunities and the patriarchal system in Indonesia.

  17. Digital watermarking opportunities enabled by mobile media proliferation

    Science.gov (United States)

    Modro, Sierra; Sharma, Ravi K.

    2009-02-01

    Consumer usages of mobile devices and electronic media are changing. Mobile devices now include increased computational capabilities, mobile broadband access, better integrated sensors, and higher resolution screens. These enhanced features are driving increased consumption of media such as images, maps, e-books, audio, video, and games. As users become more accustomed to using mobile devices for media, opportunities arise for new digital watermarking usage models. For example, transient media, like images being displayed on screens, could be watermarked to provide a link between mobile devices. Applications based on these emerging usage models utilizing watermarking can provide richer user experiences and drive increased media consumption. We describe the enabling factors and highlight a few of the usage models and new opportunities. We also outline how the new opportunities are driving further innovation in watermarking technologies. We discuss challenges in market adoption of applications based on these usage models.

  18. The state of social media policies in higher education.

    Science.gov (United States)

    Pomerantz, Jeffrey; Hank, Carolyn; Sugimoto, Cassidy R

    2015-01-01

    This paper presents an analysis of the current state of development of social media policies at institution of higher education. Content analysis of social media policies for all institutions listed in the Carnegie Classification Data File revealed that less than one-quarter of institutions had an accessible social media policy. Analysis was done by institution and campus unit, finding that social media policies were most likely to appear at doctorate-granting institutions and health, athletics, and library units. Policies required that those affiliated with the institution post appropriate content, represent the unit appropriately, and moderate conversations with coworkers and external agencies. This analysis may inform the development and revision of social media policies across the field of higher education, taking into consideration the rapidly changing landscape of social media, issues of academic freedom, and notions of interoperability with policies at the unit and campus levels.

  19. A National Study of Social Media, Television, Radio, and Internet Usage of Adults by Sexual Orientation and Smoking Status: Implications for Campaign Design.

    Science.gov (United States)

    Seidenberg, Andrew B; Jo, Catherine L; Ribisl, Kurt M; Lee, Joseph G L; Buchting, Francisco O; Kim, Yoonsang; Emery, Sherry L

    2017-04-21

    Background : Smoking rates among lesbian, gay, and bisexual (LGB) people significantly exceed that of heterosexuals. Media interventions are an important part of tobacco control efforts, but limited information is available on LGB people's media use. Methods : A nationally representative sample of 12,900 U.S. adults completed an online questionnaire assessing media use, smoking status, and demographic information. Multivariable logistic regression was used to assess relationships between media use with sexual orientation and smoking status. Results : A total of 590 (4.6%) respondents identified as LGB, of which 29% were smokers. Regardless of sexual orientation and smoking status, the Internet was the most popular media channel used, followed by television and radio. LGB respondents had significantly greater odds of having accounts on social media websites, accessing Facebook daily, and being a frequent Internet user, compared to heterosexual respondents. Similar media use was found between smokers and non-smokers, but smokers had greater odds of being frequent television viewers and frequent Internet users, compared to non-smokers. Conclusions : Compared to heterosexuals, LGB respondents reported greater use of the Internet, especially social media. Media campaigns targeting LGB populations can maximize reach by utilizing social media alongside traditional media channels.

  20. Counting to Nowhere: Social Media Adoption and Use as an Opportunity for Public Scholarship and Engagement

    OpenAIRE

    Katy E. Pearce

    2015-01-01

    Counting social media site users is popular yet fraught with challenges. Scholars can help illuminate public discussion of social media use. An open access journal like Social Media + Society provides a platform for scholarly public engagement. This essay highlights some of the challenges of understanding social media adoption and suggests opportunities for scholars to become part of public deliberation.

  1. Biological Removal of Ammonia from Municipal Landfill Leachate (Kozodrza, Poland at Limited Oxygen Access and Presence of Kaldnes Media

    Directory of Open Access Journals (Sweden)

    Justyna Koc-Jurczyk

    2018-03-01

    Full Text Available The effect of filling the sequential batch reactor (SBR with Kaldnes biomass carrier media on the effectiveness of landfill leachate treatment was examined. The experiment was carried out under limited access to oxygen (0.5–1.0 mg·L -1 . The raw leachate was characterized with the COD concentration at the level of 7758 mg·L -1 , BOD5 – 904 mg·L -1 , and NH 4 + – 980 mg·L -1 . The nitrogen loading rate (NLR was low and amounted to 0.3 kg·m -3 ·d -1 . The fill fraction had no effect on the concentration of contaminants in effluents, but turned out to be significant as far as the ammonia nitrogen loss rate was concerned. During the first six hours of SBR operation, the reaction rate increased from 0.64 mg·L -1 ·h -1 to 6.85 mg·L -1 ·h -1 with increasing fill fraction. In the remaining time (7–23 h in the case of the reactor operating only with suspended activated sludge, and the one with 10% of filtration media, the reaction rate was comparable, i.e. 27.24 mg·L -1 ·h -1 and 27.02 mg·L -1 ·h -1 , respectively. Increasing the fill fraction to 20% resulted in a decrease of the reaction rate to 18.28 mg· L -1 ·h -1 .

  2. Student Media Usage Patterns and Non-Traditional Learning in Higher Education

    Science.gov (United States)

    Zawacki-Richter, Olaf; Müskens, Wolfgang; Krause, Ulrike; Alturki, Uthman; Aldraiweesh, Ahmed

    2015-01-01

    A total of 2,338 students at German universities participated in a survey, which investigated media usage patterns of so-called traditional and non-traditional students (Schuetze & Wolter, 2003). The students provided information on the digital devices that they own or have access to, and on their usage of media and e-learning tools and…

  3. The use of social media by state tobacco control programs to promote smoking cessation: a cross-sectional study.

    Science.gov (United States)

    Duke, Jennifer C; Hansen, Heather; Kim, Annice E; Curry, Laurel; Allen, Jane

    2014-07-10

    The promotion of evidence-based cessation services through social media sites may increase their utilization by smokers. Data on social media adoption and use within tobacco control programs (TCPs) have not been reported. This study examines TCP use of and activity levels on social media, the reach of TCP sites, and the level of engagement with the content on sites. A cross-sectional descriptive study of state TCP social media sites and their content was conducted. In 2013, 60% (30/50) of TCPs were using social media. Approximately one-quarter (26%, 13/50) of all TCPs used 3 or more social media sites, 24% (12/50) used 2, and 10% (5/50) used 1 site. Overall, 60% (30/50) had a Facebook page, 36% (18/50) had a Twitter page, and 40% (20/50) had a YouTube channel. The reach of social media was different across each site and varied widely by state. Among TCPs with a Facebook page, 73% (22/30) had less than 100 likes per 100,000 adults in the state, and 13% (4/30) had more than 400 likes per 100,000 adults. Among TCPs with a Twitter page, 61% (11/18) had less than 10 followers per 100,000 adults, and just 1 state had more than 100 followers per 100,000 adults. Seven states (23%, 7/30) updated their social media sites daily. The most frequent social media activities focused on the dissemination of information rather than interaction with site users. Social media resources from a national cessation media campaign were promoted infrequently. The current reach of state TCP social media sites is low and most TCPs are not promoting existing cessation services or capitalizing on social media's interactive potential. TCPs should create an online environment that increases participation and 2-way communication with smokers to promote free cessation services.

  4. Entrepreneurial Extension Conducted via Social Media

    Science.gov (United States)

    Cornelisse, Sarah; Hyde, Jeffrey; Raines, Christopher; Kelley, Kathleen; Ollendyke, Dana; Remcheck, James

    2011-01-01

    The widespread availability of and access to the Internet have led to the development of new forms of communication. Collectively termed "social media," these new communication tools have created vast opportunities for Extension professionals in how they perform their work and how businesses interact with consumers. This article outlines currently…

  5. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  6. The Future of the New Media in the Communication of Science

    Science.gov (United States)

    Hanson, Joseph

    2014-03-01

    New media, that which is based around social networks, ubiquitous consumer technology, and today's near-universal access to information, has transformed the way that science is communicated to the scientist and non-scientist alike. We may be in the midst of mankind's greatest shift in information consumption and distribution since the invention of the printing press. Or maybe not. The problem with predicting the future is that it's very hard, and unless you're Isaac Asimov, it's very easy to be wrong. When one predicts the future regarding the internet, that risk becomes almost a certainty. Still, we can apply lessons learned from the near and distant history of science communication to put today's new media evolution into perspective, and to give us clues as to where social media, digital journalism, open access, and online education will lead science communication in years to come. Most importantly, it remains to be seen whether this new media evolution will translate into a shift in how science is viewed by citizens and their policymakers.

  7. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... ``access'' to copyrighted works, e.g., decryption or hacking of access controls such as passwords or serial... availability for use of copyrighted works is whether the measure supports a distribution model that benefits... work, those limitations may benefit the public by providing ``use-facilitating'' models that allow...

  8. Opportunities and Limitations for Using New Media and Mobile ...

    African Journals Online (AJOL)

    Opportunities and Limitations for Using New Media and Mobile Phones to Expand Access to Sexual and Reproductive Health Information and Services for Adolescent Girls and Young Women in Six Nigerian States.

  9. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  10. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  11. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  12. Fear appeals in advanced tobacco control environments: the impact of a National Mass Media Campaign in Norway

    OpenAIRE

    Halkjelsvik, Torleif; Lund, Karl Erik; Kraft, Pål; Rise, Jostein

    2013-01-01

    - Norway has one of the most comprehensive infrastructures for tobacco control in the world and has launched several media campaigns recent years. Can yet another anti-smoking campaign, using fear appeal messages, have an immediate impact on smoking behavior, motivation to quit and health beliefs? A sample of smokers (N = 2543) completed a survey before and after a 7-week national media campaign. Individual exposure to campaign (unaided recall) was used as predictor of change. We observed ...

  13. Fear appeals in advanced tobacco control environments: the impact of a National Mass Media Campaign in Norway

    OpenAIRE

    Halkjelsvik, Torleif; Lund, Karl Erik; Kraft, Pål; Rise, Jostein

    2013-01-01

    Norway has one of the most comprehensive infrastructures for tobacco control in the world and has launched several media campaigns recent years. Can yet another anti-smoking campaign, using fear appeal messages, have an immediate impact on smoking behavior, motivation to quit and health beliefs? A sample of smokers (N = 2543) completed a survey before and after a 7-week national media campaign. Individual exposure to campaign (unaided recall) was used as predictor of change. We observed no st...

  14. Children’s Play with digital media in pre-primary school

    DEFF Research Database (Denmark)

    Jørgensen, Helle Hovgaard

    2017-01-01

    Danish schools are obliged to work ‘in a playful way’ with digital media according to the demands in the description of the curricula for the pre-primary education (Undervisningsministeriet, 2015). Much money has been spent on the digital infrastructure, but still the professionals in pre......-primary education say, that they are short of time, experience and knowledge when it comes to actual implementation of new media in every day school life. On the other hand most children come from media rich homes. The article addresses the gap between in-and-out of school from a child perspective. The key concepts...... are play and media literacy, and the project’s take on play is inspired by the paradigmatic change towards a participatory and child oriented scientific position. The understanding of media literacy is narrowed down to a trichotomy that implies having access to the media, understanding the media...

  15. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  16. A Web Service for File-Level Access to Disk Images

    Directory of Open Access Journals (Sweden)

    Sunitha Misra

    2014-07-01

    Full Text Available Digital forensics tools have many potential applications in the curation of digital materials in libraries, archives and museums (LAMs. Open source digital forensics tools can help LAM professionals to extract digital contents from born-digital media and make more informed preservation decisions. Many of these tools have ways to display the metadata of the digital media, but few provide file-level access without having to mount the device or use complex command-line utilities. This paper describes a project to develop software that supports access to the contents of digital media without having to mount or download the entire image. The work examines two approaches in creating this tool: First, a graphical user interface running on a local machine. Second, a web-based application running in web browser. The project incorporates existing open source forensics tools and libraries including The Sleuth Kit and libewf along with the Flask web application framework and custom Python scripts to generate web pages supporting disk image browsing.

  17. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  18. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  19. Control of triplet state generation in heavy atom-free BODIPY-anthracene dyads by media polarity and structural factors

    KAUST Repository

    Filatov, Mikhail A.

    2018-02-12

    A family of heavy atom-free BODIPY-anthracene dyads (BADs) exhibiting triplet excited state formation from charge-transfer states is reported. Four types of BODIPY scaffolds, different in the alkyl substitution pattern, and four anthracene derivatives have been used to access BADs. The fluorescence and intersystem crossing (ISC) in these dyads depend on donor-acceptor couplings and can be accurately controlled by the substitution or media polarity. Under conditions that do not allow charge transfer (CT), the dyads exhibit fluorescence with high quantum yields. Formation of charge-transfer states triggers ISC and the formation of long-lived triplet excited states in the dyads. The excited state properties were studied by steady-state techniques and ultrafast pump-probe spectroscopy to determine the parameters of the observed processes. Structural information for various BADs was derived from single crystal X-ray structure determinations alongside DFT molecular geometry optimization, revealing the effects of mutual orientation of subunits on the photophysical properties. The calculations showed that alkyl substituents on the BODIPY destabilize CT states in the dyads, thus controlling the charge transfer between the subunits. The effect of the dyad structure on the ISC efficiency was considered at M06-2X level of theory and a correlation between mutual orientation of the subunits and the energy gap between singlet and triplet CT states was studied using multireference CASSCF method.

  20. Control of triplet state generation in heavy atom-free BODIPY-anthracene dyads by media polarity and structural factors

    KAUST Repository

    Filatov, Mikhail A.; Karuthedath, Safakath; Polestshuk, Pavel M; Callaghan, Susan; Flanagan, Keith; Telitchko, Maxime; Wiesner, Thomas; Laquai, Fré dé ric; Senge, Mathias O

    2018-01-01

    A family of heavy atom-free BODIPY-anthracene dyads (BADs) exhibiting triplet excited state formation from charge-transfer states is reported. Four types of BODIPY scaffolds, different in the alkyl substitution pattern, and four anthracene derivatives have been used to access BADs. The fluorescence and intersystem crossing (ISC) in these dyads depend on donor-acceptor couplings and can be accurately controlled by the substitution or media polarity. Under conditions that do not allow charge transfer (CT), the dyads exhibit fluorescence with high quantum yields. Formation of charge-transfer states triggers ISC and the formation of long-lived triplet excited states in the dyads. The excited state properties were studied by steady-state techniques and ultrafast pump-probe spectroscopy to determine the parameters of the observed processes. Structural information for various BADs was derived from single crystal X-ray structure determinations alongside DFT molecular geometry optimization, revealing the effects of mutual orientation of subunits on the photophysical properties. The calculations showed that alkyl substituents on the BODIPY destabilize CT states in the dyads, thus controlling the charge transfer between the subunits. The effect of the dyad structure on the ISC efficiency was considered at M06-2X level of theory and a correlation between mutual orientation of the subunits and the energy gap between singlet and triplet CT states was studied using multireference CASSCF method.