WorldWideScience

Sample records for secure internet video

  1. Intelligent Model for Video Survillance Security System

    J. Vidhya

    2013-12-01

    Full Text Available Video surveillance system senses and trails out all the threatening issues in the real time environment. It prevents from security threats with the help of visual devices which gather the information related to videos like CCTV’S and IP (Internet Protocol cameras. Video surveillance system has become a key for addressing problems in the public security. They are mostly deployed on the IP based network. So, all the possible security threats exist in the IP based application might also be the threats available for the reliable application which is available for video surveillance. In result, it may increase cybercrime, illegal video access, mishandling videos and so on. Hence, in this paper an intelligent model is used to propose security for video surveillance system which ensures safety and it provides secured access on video.

  2. Security in Internet

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  3. Security in the internet

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  4. Internet Banking Security Strategy: Securing Customer Trust

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  5. Internet security technologies

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  6. Internetting tactical security sensor systems

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control

  7. Security in the internet; Sicherheitsaspekte im Internet

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  8. Security in Internet of Things

    Kidmose, Egon; Pedersen, Jens Myrup

    2017-01-01

    2016 was a year when the discussions about Internet of Things and security gained significant grounds. Not only was it yet another year where the challenges of cybercrime became visible to the general public, maybe the presumable Russian hacking of Hillary Clinton's emails as the most prominent...... example, but at the end of the year the Mirai Botnet used Internet of Things devices to perform successful attacks on several Internet infrastructure points....

  9. Wireless mobile Internet security

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  10. Information Security and the Internet.

    Doddrell, Gregory R.

    1996-01-01

    As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…

  11. [Security aspects on the Internet].

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  12. Security in Internet of Things

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  13. Practical Unix and Internet Security

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  14. Commercial Security on the Internet.

    Liddy, Carrie

    1996-01-01

    Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…

  15. Internet security information system implement method

    Liu Baoxu; Mei Jie; Xu Rongsheng; An Dehai; Yu Mingjian; Chen Xiangyang; Zheng Peng

    1999-01-01

    On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given

  16. [The Internet and its security].

    Masić, Izet; Ahmetović, Ademir; Jakupović, Safet; Masić, Zlatan; Zunić, Lejla

    2002-01-01

    Internet, is the greatest world net by by means of which nowadays the planet communicates, rapidly goes forward. The last years of the university in USA the commonly develop the more progressive concept of the net (Internet 2), thanks to the constant growing technologies, with the goal to answer the needs of the scientific and the educational institutions, but also the commercial institutions and the organizations. Almost the there is no more significant institution in the world which has not developed their web pages and data bases with the most actual contents available to the wider circle of the users. In this paper we have given the section of the most actual web pages. However, Internet is not immune to those users who are not benevolent and who have developed the different tools in the goal of the destroying or unabling of the normal use of all the Internet conveniences. The authors is considering the protection problem and the data security which get distributed by Internet.

  17. Internet Safety and Security Surveys - A Review

    Sharp, Robin

    This report gives a review of investigations into Internet safety and security over the last 10 years. The review covers a number of surveys of Internet usage, of Internet security in general, and of Internet users' awareness of issues related to safety and security. The focus and approach...... of the various surveys is considered, and is related to more general proposals for investigating the issues involved. A variety of proposals for how to improve levels of Internet safety and security are also described, and they are reviewed in the light of studies of motivational factors which affect the degree...

  18. Cyber Security: Rule of Use Internet Safely?

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  19. Scalable video on demand adaptive Internet-based distribution

    Zink, Michael

    2013-01-01

    In recent years, the proliferation of available video content and the popularity of the Internet have encouraged service providers to develop new ways of distributing content to clients. Increasing video scaling ratios and advanced digital signal processing techniques have led to Internet Video-on-Demand applications, but these currently lack efficiency and quality. Scalable Video on Demand: Adaptive Internet-based Distribution examines how current video compression and streaming can be used to deliver high-quality applications over the Internet. In addition to analysing the problems

  20. Security Challenges of the Internet of Things

    Goeke, Lisa

    2017-01-01

    The ‘Internet of Things’ is the buzz phrase that describes a new era of computation. Briefly, the Internet of Things can be defined as the interaction of smart objects that are connected to the Internet. These objects can sense, share and process information, upload them in the cloud, and make them available to the user via a large amount of different applications. Despite all of these promising innovations, the Internet of Things, as every other technology, faces multiple security...

  1. Problem of Information Security Traffic on Internet

    Slavko Šarić

    2012-10-01

    Full Text Available Internet information traffic becomes greater and moreimportant. With increasing growth of information importancerequirement for its security becomes indispensable. Theinformation security problem especially affect large and smallcompanies whose prosperity is depending on Internet presence.This affecting the three areas of Internet commerce: credit cardtransactions, virtual private networks and digital certification.To ensure information traffic it is necessary to find a solution,in a proper way, for three major problems: frontier problem,market problem and government problem. While the eventualemergence of security standards for Internet transactions isexpected, it will not automatically result in secure Internettransactions. In future, there is a wealth of security issues thatwill continue to require attention: internal security, continuedhacking, social engineering, malicious code, reliability andperformance, skills shortages and denial of se1vice attacks.

  2. Security for Multimedia Space Data Distribution over the Internet

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  3. Security Issues in Networks with Internet Access

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  4. Teaching Internet Security, Safety in Our Classrooms

    DeFranco, Joanna F.

    2011-01-01

    Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…

  5. Internet Governance and National Security

    2012-01-01

    by the International Orga­ nization of Standards for the Open Systems Interconnection ( OSI ) model as the basis of Internet networking. A brief...or “ride on top” of the Internet. A corporate LAN , such as “.company–name” for internal company use, is an example of the first. When a group wishes

  6. Live video monitoring robot controlled by web over internet

    Lokanath, M.; Akhil Sai, Guruju

    2017-11-01

    Future is all about robots, robot can perform tasks where humans cannot, Robots have huge applications in military and industrial area for lifting heavy weights, for accurate placements, for repeating the same task number of times, where human are not efficient. Generally robot is a mix of electronic, electrical and mechanical engineering and can do the tasks automatically on its own or under the supervision of humans. The camera is the eye for robot, call as robovision helps in monitoring security system and also can reach into the places where the human eye cannot reach. This paper presents about developing a live video streaming robot controlled from the website. We designed the web, controlling for the robot to move left, right, front and back while streaming video. As we move to the smart environment or IoT (Internet of Things) by smart devices the system we developed here connects over the internet and can be operated with smart mobile phone using a web browser. The Raspberry Pi model B chip acts as heart for this system robot, the sufficient motors, surveillance camera R pi 2 are connected to Raspberry pi.

  7. The Internet of Things Security

    Đekić Milica D.

    2017-01-01

    The Internet of Things (IoT) is a quite new concept covering on digital systems being correlated with each other. The first role of the Internet was to connect people, while this new paradigm serves in terms of connecting devices. Those solutions could get connected to each other using a standard web signal or applying another sort of communication channels. It's estimated that the IoT has included around 4.9 billion devices by the end of 2015, while it's expected that there would be 25 billi...

  8. Security and Network Operations [video

    Myrick, Matthew

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  9. Securing the Internet Control Plane

    Benton, Kevin

    2017-01-01

    The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway…

  10. Emotion-induced engagement in internet video ads

    Texeira, T.; Wedel, M.; Pieters, R.

    2012-01-01

    This study shows how advertisers can leverage emotion and attention to engage consumers in watching Internet video advertisements. In a controlled experiment, the authors assessed joy and surprise through automated facial expression detection for a sample of advertisements. They assessed

  11. Video motion detection for physical security applications

    Matter, J.C.

    1990-01-01

    Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost-effectiveness. In recent years, significant advances in image-processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of video motion detection systems to a variety of physical security applications. Early video motion detectors (VMDs) were useful for interior applications of volumetric sensing. Success depended on having a relatively well-controlled environment. Attempts to use these systems outdoors frequently resulted in an unacceptable number of nuisance alarms. Currently, Sandia National Laboratories (SNL) is developing several advanced systems that employ image-processing techniques for a broader set of safeguards and security applications. The Target Cueing and Tracking System (TCATS), the Video Imaging System for Detection, Tracking, and Assessment (VISDTA), the Linear Infrared Scanning Array (LISA); the Mobile Intrusion Detection and Assessment System (MIDAS), and the Visual Artificially Intelligent Surveillance (VAIS) systems are described briefly

  12. Internet and video technology in psychotherapy supervision and training.

    Wolf, Abraham W

    2011-06-01

    The seven articles in this special section on the use of Internet and video technology represent the latest growth on one branch of the increasingly prolific and differentiated work in the technology of psychotherapy. In addition to the work presented here on video and the Internet applications to supervision and training, information technology is changing the field of psychotherapy through computer assisted therapies and virtual reality interventions.

  13. Brain activity and desire for Internet video game play.

    Han, Doug Hyun; Bolo, Nicolas; Daniels, Melissa A; Arenella, Lynn; Lyoo, In Kyoon; Renshaw, Perry F

    2011-01-01

    Recent studies have suggested that the brain circuitry mediating cue-induced desire for video games is similar to that elicited by cues related to drugs and alcohol. We hypothesized that desire for Internet video games during cue presentation would activate similar brain regions to those that have been linked with craving for drugs or pathologic gambling. This study involved the acquisition of diagnostic magnetic resonance imaging and functional magnetic resonance imaging data from 19 healthy male adults (age, 18-23 years) following training and a standardized 10-day period of game play with a specified novel Internet video game, "War Rock" (K2 Network, Irvine, CA). Using segments of videotape consisting of 5 contiguous 90-second segments of alternating resting, matched control, and video game-related scenes, desire to play the game was assessed using a 7-point visual analogue scale before and after presentation of the videotape. In responding to Internet video game stimuli, compared with neutral control stimuli, significantly greater activity was identified in left inferior frontal gyrus, left parahippocampal gyrus, right and left parietal lobe, right and left thalamus, and right cerebellum (false discovery rate Internet video game showed significantly greater activity in right medial frontal lobe, right and left frontal precentral gyrus, right parietal postcentral gyrus, right parahippocampal gyrus, and left parietal precuneus gyrus. Controlling for total game time, reported desire for the Internet video game in the subjects who played more Internet video game was positively correlated with activation in right medial frontal lobe and right parahippocampal gyrus. The present findings suggest that cue-induced activation to Internet video game stimuli may be similar to that observed during cue presentation in persons with substance dependence or pathologic gambling. In particular, cues appear to commonly elicit activity in the dorsolateral prefrontal, orbitofrontal

  14. Video performance for high security applications

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  15. Engineering secure Internet of Things systems

    Aziz, Benjamin; Crispo, Bruno

    2016-01-01

    This book examines important security considerations for the Internet of Things (IoT). IoT is collecting a growing amount of private and sensitive data about our lives, and requires increasing degrees of reliability and trustworthiness in terms of the levels of assurance provided with respect to confidentiality, integrity and availability.

  16. Analytical Characterization of Internet Security Attacks

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  17. Trust Management and Accountability for Internet Security

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  18. Home security system using internet of things

    Anitha, A.

    2017-11-01

    IoT refers to the infrastructure of connected physical devices which is growing at a rapid rate as huge number of devices and objects are getting associated to the Internet. Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontroller known as Arduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.

  19. Vehicular Internet: Security & Privacy Challenges and Opportunities

    Kamran Zaidi

    2015-07-01

    Full Text Available The vehicular internet will drive the future of vehicular technology and intelligent transportation systems (ITS. Whether it is road safety, infotainment, or driver-less cars, the vehicular internet will lay the foundation for the future of road travel. Governments and companies are pursuing driver-less vehicles as they are considered to be more reliable than humans and, therefore, safer. The vehicles today are not just a means of transportation but are also equipped with a wide range of sensors that provide valuable data. If vehicles are enabled to share data that they collect with other vehicles or authorities for decision-making and safer driving, they thereby form a vehicular network. However, there is a lot at stake in vehicular networks if they are compromised. With the stakes so high, it is imperative that the vehicular networks are secured and made resilient to any attack or attempt that may have serious consequences. The vehicular internet can also be the target of a cyber attack, which can be devastating. In this paper, the opportunities that the vehicular internet offers are presented and then various security and privacy aspects are discussed and some solutions are presented.

  20. Brain activity and desire for internet video game play

    Han, Doug Hyun; Bolo, Nicolas; Daniels, Melissa A.; Arenella, Lynn; Lyoo, In Kyoon; Renshaw, Perry F.

    2010-01-01

    Objective Recent studies have suggested that the brain circuitry mediating cue induced desire for video games is similar to that elicited by cues related to drugs and alcohol. We hypothesized that desire for internet video games during cue presentation would activate similar brain regions to those which have been linked with craving for drugs or pathological gambling. Methods This study involved the acquisition of diagnostic MRI and fMRI data from 19 healthy male adults (ages 18–23 years) following training and a standardized 10-day period of game play with a specified novel internet video game, “War Rock” (K-network®). Using segments of videotape consisting of five contiguous 90-second segments of alternating resting, matched control and video game-related scenes, desire to play the game was assessed using a seven point visual analogue scale before and after presentation of the videotape. Results In responding to internet video game stimuli, compared to neutral control stimuli, significantly greater activity was identified in left inferior frontal gyrus, left parahippocampal gyrus, right and left parietal lobe, right and left thalamus, and right cerebellum (FDR video game (MIGP) cohort showed significantly greater activity in right medial frontal lobe, right and left frontal pre-central gyrus, right parietal post-central gyrus, right parahippocampal gyrus, and left parietal precuneus gyrus. Controlling for total game time, reported desire for the internet video game in the MIGP cohort was positively correlated with activation in right medial frontal lobe and right parahippocampal gyrus. Discussion The present findings suggest that cue-induced activation to internet video game stimuli may be similar to that observed during cue presentation in persons with substance dependence or pathological gambling. In particular, cues appear to commonly elicit activity in the dorsolateral prefrontal, orbitofrontal cortex, parahippocampal gyrus, and thalamus. PMID:21220070

  1. A Lightweight Protocol for Secure Video Streaming.

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  2. Internet and Video Game Addictions: Diagnosis, Epidemiology, and Neurobiology.

    Sussman, Clifford J; Harper, James M; Stahl, Jessica L; Weigle, Paul

    2018-04-01

    In the past 2 decades, there has been substantial increase in availability and use of digital technologies, including the Internet, computer games, smart phones, and social media. Behavioral addiction to use of technologies spawned a body of related research. The recent inclusion of Internet gaming disorder as a condition for further study in the DSM-V invigorated a new wave of researchers, thereby expanding our understanding of these conditions. This article reviews current research, theory, and practice regarding the diagnosis, epidemiology, and neurobiology of Internet and video game addictions. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Internet and video game addictions: a cognitive behavioral approach

    Igor Lins Lemos

    2014-07-01

    Full Text Available Background While several benefits are attributed to the Internet and video games, an important proportion of the population presents symptoms related to possible new technological addictions and there has been little discussion of treatment of problematic technology use. Although demand for knowledge is growing, only a small number of treatments have been described. Objective To conduct a systematic review of the literature, to establish Cognitive Behavioral Therapy (CBT as a possible strategy for treating Internet and video game addictions. Method The review was conducted in the following databases: Science Direct on Line, PubMed, PsycINFO, Cochrane Clinical Trials Library, BVS and SciELO. The keywords used were: Cognitive Behavioral Therapy; therapy; treatment; with association to the terms Internet addiction and video game addiction. Given the scarcity of studies in the field, no restrictions to the minimum period of publication were made, so that articles found until October 2013 were accounted. Results Out of 72 articles found, 23 described CBT as a psychotherapy for Internet and video game addiction. The manuscripts showed the existence of case studies and protocols with satisfactory efficacy. Discussion Despite the novelty of technological dependencies, CBT seems to be applicable and allows an effective treatment for this population.

  4. Reconfigurable Secure Video Codec Based on DWT and AES Processor

    Rached Tourki; M. Machhout; B. Bouallegue; M. Atri; M. Zeghid; D. Dia

    2010-01-01

    In this paper, we proposed a secure video codec based on the discrete wavelet transformation (DWT) and the Advanced Encryption Standard (AES) processor. Either, use of video coding with DWT or encryption using AES is well known. However, linking these two designs to achieve secure video coding is leading. The contributions of our work are as follows. First, a new method for image and video compression is proposed. This codec is a synthesis of JPEG and JPEG2000,which is implemented using Huffm...

  5. Physician office readiness for managing Internet security threats.

    Keshavjee, K; Pairaudeau, N; Bhanji, A

    2006-01-01

    Internet security threats are evolving toward more targeted and focused attacks.Increasingly, organized crime is involved and they are interested in identity theft. Physicians who use Internet in their practice are at risk for being invaded. We studied 16 physician practices in Southern Ontario for their readiness to manage internet security threats. Overall, physicians have an over-inflated sense of preparedness. Security practices such as maintaining a firewall and conducting regular virus checks were not consistently done.

  6. Fingerprint multicast in secure video streaming.

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  7. The use of crypto-analysis techniques for securing internet ...

    ... recommended to be combined with other techniques, such as client-side software, data transaction protocols, web server software, and the network server operating system involved in handling e-commerce, for securing internet transaction. This recommendation will invariable ensure that internet transaction is secured.

  8. Information security as a countermeasure against cheating in video games

    Mikkelsen, Kevin Kjelgren

    2017-01-01

    Most cheating in video games is possible due to information being accessible outside the intended frames of the game developer. The issue of protecting sensitive information have been handled in many areas outside of video games for a long time now. The goal of this paper is to review these information security solutions that are in use in more security concerned areas today and to potentially find transferable approaches that can help protect important and sensitive information in video game...

  9. Security, privacy, and confidentiality issues on the Internet

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  10. It Security Issues Within the Video Game Industry

    STEPHEN MOHR; SYED (SHAWON) RAHMAN,

    2011-01-01

    IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small. While each of these organizations will never be exactly the same as the next, there are common security issues that can and do affect each and every video game company. In or...

  11. Security incidents on the Internet, 1989--1995

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  12. Survey of Security and Privacy Issues of Internet of Things

    Borgohain, Tuhin; Kumar, Uday; Sanyal, Sugata

    2015-01-01

    This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.

  13. Development of an Internet Security Policy for health care establishments.

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  14. Security and Privacy in Video Surveillance: Requirements and Challenges

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2014-01-01

    observed by the system. Several techniques to protect the privacy of individuals have therefore been proposed, but very little research work has focused on the specific security requirements of video surveillance data (in transit or in storage) and on authorizing access to this data. In this paper, we...... present a general model of video surveillance systems that will help identify the major security and privacy requirements for a video surveillance system and we use this model to identify practical challenges in ensuring the security of video surveillance data in all stages (in transit and at rest). Our...... study shows a gap between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain....

  15. Survey of methods for secure connection to the internet

    Matsui, Shouichi

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.

  16. Security Techniques for Sensor Systems and the Internet of Things

    Midi, Daniele

    2016-01-01

    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We…

  17. Secured web-based video repository for multicenter studies.

    Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S

    2015-04-01

    We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. We believe our system can be a model for similar projects that require access to common video resources. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    An Braeken

    2016-01-01

    Full Text Available Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side.

  19. Detection of illegal transfer of videos over the Internet

    Chaisorn, Lekha; Sainui, Janya; Manders, Corey

    2010-07-01

    In this paper, a method for detecting infringements or modifications of a video in real-time is proposed. The method first segments a video stream into shots, after which it extracts some reference frames as keyframes. This process is performed employing a Singular Value Decomposition (SVD) technique developed in this work. Next, for each input video (represented by its keyframes), ordinal-based signature and SIFT (Scale Invariant Feature Transform) descriptors are generated. The ordinal-based method employs a two-level bitmap indexing scheme to construct the index for each video signature. The first level clusters all input keyframes into k clusters while the second level converts the ordinal-based signatures into bitmap vectors. On the other hand, the SIFT-based method directly uses the descriptors as the index. Given a suspect video (being streamed or transferred on the Internet), we generate the signature (ordinal and SIFT descriptors) then we compute similarity between its signature and those signatures in the database based on ordinal signature and SIFT descriptors separately. For similarity measure, besides the Euclidean distance, Boolean operators are also utilized during the matching process. We have tested our system by performing several experiments on 50 videos (each about 1/2 hour in duration) obtained from the TRECVID 2006 data set. For experiments set up, we refer to the conditions provided by TRECVID 2009 on "Content-based copy detection" task. In addition, we also refer to the requirements issued in the call for proposals by MPEG standard on the similar task. Initial result shows that our framework is effective and robust. As compared to our previous work, on top of the achievement we obtained by reducing the storage space and time taken in the ordinal based method, by introducing the SIFT features, we could achieve an overall accuracy in F1 measure of about 96% (improved about 8%).

  20. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  1. Prevalence and Correlates of Video and Internet Gaming Addiction among Hong Kong Adolescents: A Pilot Study

    Wang, Chong-Wen; Chan, Cecilia L. W.; Mak, Kwok-Kei; Ho, Sai-Yin; Wong, Paul W. C.; Ho, Rainbow T. H.

    2014-01-01

    This pilot study investigated the patterns of video and internet gaming habits and the prevalence and correlates of gaming addiction in Hong Kong adolescents. A total of 503 students were recruited from two secondary schools. Addictive behaviors of video and internet gaming were assessed using the Game Addiction Scale. Risk factors for gaming addiction were examined using logistical regression. An overwhelming majority of the subjects (94%) reported using video or internet games, with one in ...

  2. Model-based security engineering for the internet of things

    NEISSE RICARDO; STERI GARY; NAI FOVINO Igor; BALDINI Gianmarco; VAN HOESEL Lodewijk

    2015-01-01

    We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the control and protection of user data in the deployment of the Internet of Things (IoT). This toolkit takes a more general approach for security engineering including risk analysis, establishment of aspect-specific trust relationships, and enforceable security policies. We describe the integrated metamodels used in the toolkit and the accompanying security engineering methodology for IoT systems...

  3. Survey o methods for secure connection to the internet; Internet tono anzenna setsuzoku hoshiki no genjo

    Matsui, S

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network Security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet. 35 refs., 3 figs.

  4. Crisis-management and the Security in the Internet

    Harada, Izumi

    This paper discusses about the crisis-management and the security in the Internet. The crime that not is so far occurs during widespread to the society of the Internet, and a big social trouble. Moreover, the problem of a new security such as a cyber war and cyber terrorism appeared, too. It is necessary to recognize such a situation, and to do both correspondences corresponding to the environmental transformation by government and the people.

  5. Treatment Considerations in Internet and Video Game Addiction: A Qualitative Discussion.

    Greenfield, David N

    2018-04-01

    Internet and video game addiction has been a steadily developing consequence of modern living. Behavioral and process addictions and particularly Internet and video game addiction require specialized treatment protocols and techniques. Recent advances in addiction medicine have improved our understanding of the neurobiology of substance and behavioral addictions. Novel research has expanded the ways we understand and apply well-established addiction treatments as well as newer therapies specific to Internet and video game addiction. This article reviews the etiology, psychology, and neurobiology of Internet and video game addiction and presents treatment strategies and protocols for addressing this growing problem. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Gender (In)equality in Internet Pornography: A Content Analysis of Popular Pornographic Internet Videos.

    Klaassen, Marleen J E; Peter, Jochen

    2015-01-01

    Although Internet pornography is widely consumed and researchers have started to investigate its effects, we still know little about its content. This has resulted in contrasting claims about whether Internet pornography depicts gender (in)equality and whether this depiction differs between amateur and professional pornography. We conducted a content analysis of three main dimensions of gender (in)equality (i.e., objectification, power, and violence) in 400 popular pornographic Internet videos from the most visited pornographic Web sites. Objectification was depicted more often for women through instrumentality, but men were more frequently objectified through dehumanization. Regarding power, men and women did not differ in social or professional status, but men were more often shown as dominant and women as submissive during sexual activities. Except for spanking and gagging, violence occurred rather infrequently. Nonconsensual sex was also relatively rare. Overall, amateur pornography contained more gender inequality at the expense of women than professional pornography did.

  7. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    Stanislav A. Shikov

    2017-01-01

    Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT), and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of T...

  8. Can Cyberloafing and Internet Addiction Affect Organizational Information Security?

    Hadlington, Lee; Parsons, Kathryn

    2017-09-01

    Researchers have noted potential links between Internet addiction, the use of work computers for nonwork purposes and an increased risk of threat to the organization from breaches in cybersecurity. However, much of this research appears conjectural in nature and lacks clear empirical evidence to support such claims. To fill this knowledge gap, a questionnaire-based study explored the link between cyberloafing, Internet addiction, and information security awareness (ISA). A total of 338 participants completed an online questionnaire, which comprised of the Online Cognition Scale, Cyberloafing Scale, and the Human Aspects of Information Security Questionnaire. Participants who reported higher Internet addiction and cyberloafing tendencies had lower ISA, and Internet addiction and cyberloafing predicted a significant 45 percent of the variance in ISA. Serious cyberloafing, such as the propensity to visit adult websites and online gambling, was shown to be the significant predictor for poorer ISA. Implications for organizations and recommendations to reduce or manage inappropriate Internet use are discussed.

  9. [Video game and internet addiction. The current state of research].

    Rehbein, F; Mößle, T; Arnaud, N; Rumpf, H-J

    2013-05-01

    The use of interactive screen media is widespread and for some users leads to pathological symptoms that are phenomenologically similar to signs of addictive disorders. Addictive use of computer games and other Internet applications, such as social media can be distinguished. In the past standard criteria to classify this new disorder were lacking. In DSM-5, nine criteria are proposed for diagnosing Internet gaming disorder. The focus is currently on video games as most studies have been done in this field. Prevalence estimations are difficult to interpret due to the lack of standard diagnostic measures and result in a range of the frequency of Internet addiction between 1 % and 4.2 % in the general German population. Rates are higher in younger individuals. For computer game addiction prevalence rates between 0.9 % and 1.7  % can be found in adolescents. Despite substantial comorbidity among those affected current research points to addictive media use as a stand-alone disorder.

  10. PROBLEMS OF INFORMAT ION SECURITY: INTERNET OF THINGS

    Stanislav A. Shikov

    2017-03-01

    Full Text Available Introduction: The article deals with the threats to information security in the internetworking of physical devices, also known as Internet of Things (IoT, and the security challenge in terms of home automation systems, ZigBee protocol, Tesla electric cars and Apple Pay mobile payment. Section provides the term definition and history of the Internet of Things. The IEEE 1888 IoT-related standard developed in 2011 as integrated solution based on energy-saving technologies for the Internet of Things. The author considers security challenges for the “smart home” system. Next section reviews the experiments of the author involved in testing of the Internet of Things devices. Materials and Methods: The subjects of study are the Apple Pay, the ZigBee wireless standard, Tesla Model S electric cars. The main methods for identification of security threats are analysis and comparison. Results: The companies of electronic devices simplify and reduce the price of manufacturing process. The customers and users are rarely interested in levels of electronic devices security policies. This is the weakest link of electronic products in terms of security and safety. The tests demonstrated that modern electronic-based technologies do not reach the 100-percentage security level. Apple Pay mobile payment system demonstrated the highest security rating. Discussion and Conclusions: Modern electronic devices for Internet of Things does not meet all safety requirements, from the point of view of the author. The article recommends analyzing the potential threats and developing new security standards. In addition, the logistics of electronic devices for Internet of Things need to be under control from the manufacturer to equipment installation time.

  11. Security threat assessment of an Internet security system using attack tree and vague sets.

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  12. Competitive Cyber-Insurance and Internet Security

    Shetty, Nikhil; Schwartz, Galina; Felegyhazi, Mark; Walrand, Jean

    This paper investigates how competitive cyber-insurers affect network security and welfare of the networked society. In our model, a user's probability to incur damage (from being attacked) depends on both his security and the network security, with the latter taken by individual users as given. First, we consider cyberinsurers who cannot observe (and thus, affect) individual user security. This asymmetric information causes moral hazard. Then, for most parameters, no equilibrium exists: the insurance market is missing. Even if an equilibrium exists, the insurance contract covers only a minor fraction of the damage; network security worsens relative to the no-insurance equilibrium. Second, we consider insurers with perfect information about their users' security. Here, user security is perfectly enforceable (zero cost); each insurance contract stipulates the required user security. The unique equilibrium contract covers the entire user damage. Still, for most parameters, network security worsens relative to the no-insurance equilibrium. Although cyber-insurance improves user welfare, in general, competitive cyber-insurers fail to improve network security.

  13. Securing internet by eliminating DDOS attacks

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  14. On Secure Workflow Decentralisation on the Internet

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  15. Bla-bla-bla: video chat service on the Internet - a market feasibility study

    Lindgreen, Adam; Antioco, Michael; Wetzels, Martin

    2004-01-01

    The Internet is changing the way that companies carry out their business and, in fact, constitutes an entirely new application domain, which makes product innovation possible. Moreover, it is a new medium for reaching consumers, which is a central preoccupation to organisations in the current business market. Here interest lies in video chatting on the Internet. This is a type of service that adds video support to chatting using a Web cam and is gradually attracting more Internet users. The p...

  16. Towards secure name resolution on the internet

    Grothoff, C.; Wachs, M.; Ermert, M.; Appelbaum, J.

    2018-01-01

    The Domain Name System (DNS) provides crucial name resolution functions for most Internet services. As a result, DNS traffic provides an important attack vector for spy agencies, as demonstrated by the QUANTUMDNS and MORECOWBELL programs of the NSA. This article reviews how DNS works, and explains

  17. Internet of Cloud: Security and Privacy issues

    Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge

    2017-01-01

    The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...

  18. A roadmap for security challenges in the Internet of Things

    Arbia Riahi Sfar

    2018-04-01

    Full Text Available Unquestionably, communicating entities (object, or things in the Internet of Things (IoT context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the IoT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the IoT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current standardization activities are surveyed and discussed to the ensure the security of IoT components and applications. Keywords: Internet of Things, Systemic and cognitive approach, Security, Privacy, Trust, Identification, Access control

  19. Security issues in Internet of Things

    Solà Campillo, Oriol

    2017-01-01

    The main idea behind the concept of the Internet of Things (IoT) is to connect all kinds of everyday objects, thus enabling them to communicate to each other and enabling people to communicate to them. IoT is an extensive concept that encompasses a wide range of technologies and applications. This document gives an introduction to what the IoT is, its fundamental characteristics and the enabling technologies that are currently being used. However, the technologies for the IoT are still evolvi...

  20. Security Framework and Jamming Detection for Internet of Things

    Babar, Sachin D.

    The Internet of Things (IoT) consists of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security, trust and privacy perspective. Hence...

  1. A survey of secure middleware for the Internet of Things

    Paul Fremantle

    2017-05-01

    Full Text Available The rapid growth of small Internet connected devices, known as the Internet of Things (IoT, is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.

  2. DV or Not DV: That is the Question When Producing Video for the Internet

    Gregory Gutenko

    2002-06-01

    Full Text Available Pervasive advertising and marketing efforts promote consumer market digital video (DV format camcorders as the ideal acquisition technology for Internet video production. A shared digital nature and simple interconnections between cameras and computers using IEEE1394/FireWire/i.Link® format digital cabling do suggest a natural affinity between DV and Internet production. However, experience with Web delivery reveals numerous obstacles associated with consumer-friendly camcorder design and feature sets that can severely compromise Internet streaming video quality. This paper describes the various features in consumer and industrial grade DV camcorder designs that lead to unnecessary image quality loss, and what must be done to avoid such loss. Conventional video production techniques that can lead to quality loss regardless of the camera technology used are also identified. A number of recommendations are offered that will help the videographer in an educational or production environment adapt to Internet limitations.

  3. Reconfigurable Secure Video Codec Based on DWT and AES Processor

    Rached Tourki

    2010-01-01

    Full Text Available In this paper, we proposed a secure video codec based on the discrete wavelet transformation (DWT and the Advanced Encryption Standard (AES processor. Either, use of video coding with DWT or encryption using AES is well known. However, linking these two designs to achieve secure video coding is leading. The contributions of our work are as follows. First, a new method for image and video compression is proposed. This codec is a synthesis of JPEG and JPEG2000,which is implemented using Huffman coding to the JPEG and DWT to the JPEG2000. Furthermore, an improved motion estimation algorithm is proposed. Second, the encryptiondecryption effects are achieved by the AES processor. AES is aim to encrypt group of LL bands. The prominent feature of this method is an encryption of LL bands by AES-128 (128-bit keys, or AES-192 (192-bit keys, or AES-256 (256-bit keys.Third, we focus on a method that implements partial encryption of LL bands. Our approach provides considerable levels of security (key size, partial encryption, mode encryption, and has very limited adverse impact on the compression efficiency. The proposed codec can provide up to 9 cipher schemes within a reasonable software cost. Latency, correlation, PSNR and compression rate results are analyzed and shown.

  4. Implementation of the Internet of Things on Public Security

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  5. Security, privacy, and confidentiality issues on the Internet

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  6. Security, privacy, and confidentiality issues on the Internet.

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  7. Low Delay Video Streaming on the Internet of Things Using Raspberry Pi

    Ulf Jennehag

    2016-09-01

    Full Text Available The Internet of Things is predicted to consist of over 50 billion devices aiming to solve problems in most areas of our digital society. A large part of the data communicated is expected to consist of various multimedia contents, such as live audio and video. This article presents a solution for the communication of high definition video in low-delay scenarios (<200 ms under the constraints of devices with limited hardware resources, such as the Raspberry Pi. We verify that it is possible to enable low delay video streaming between Raspberry Pi devices using a distributed Internet of Things system called the SensibleThings platform. Specifically, our implementation transfers a 6 Mbps H.264 video stream of 1280 × 720 pixels at 25 frames per second between devices with a total delay of 181 ms on the public Internet, of which the overhead of the distributed Internet of Things communication platform only accounts for 18 ms of this delay. We have found that the most significant bottleneck of video transfer on limited Internet of Things devices is the video coding and not the distributed communication platform, since the video coding accounts for 90% of the total delay.

  8. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these

  9. Using Internet-Based Videos as Pedagogical Tools in the Social Work Policy Classroom

    Sarabeth Leukefeld

    2011-11-01

    Full Text Available Students often feel disconnected from their introductory social welfare policy courses. Therefore, it is important that instructors employ engaging pedagogical methods in the classroom. A review of the literature reveals that a host of methods have been utilized to attempt to interest students in policy courses, but there is no mention of using internet-based videos in the social welfare policy classroom. This article describes how to select and use appropriate internet-based videos from websites such as YouTube and SnagFilms, to effectively engage students in social welfare policy courses. Four rules are offered for choosing videos based on emotional impact, brevity, and relevance to course topics. The selected videos should elicit students’ passions and stimulate critical thinking when used in concert with instructor-generated discussion questions, writing assignments, and small group dialogue. Examples of the process of choosing videos, discussion questions, and student reactions to the use of videos are provided.

  10. A Comparison of Internet Protocol (IPv6 Security Guidelines

    Steffen Hermann

    2014-01-01

    Full Text Available The next generation of the Internet Protocol (IPv6 is currently about to be introduced in many organizations. However, its security features are still a very novel area of expertise for many practitioners. This study evaluates guidelines for secure deployment of IPv6, published by the U.S. NIST and the German federal agency BSI, for topicality, completeness and depth. The later two are scores defined in this paper and are based on the Requests for Comments relevant for IPv6 that were categorized, weighted and ranked for importance using an expert survey. Both guides turn out to be of practical value, but have a specific focus and are directed towards different audiences. Moreover, recommendations for possible improvements are presented. Our results could also support strategic management decisions on security priorities as well as for the choice of security guidelines for IPv6 roll-outs.

  11. The security concern on internet banking adoption among Malaysian banking customers.

    Sudha, Raju; Thiagarajan, A S; Seetharaman, A

    2007-01-01

    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.

  12. Precision Security: Integrating Video Surveillance with Surrounding Environment Changes

    Wenfeng Wang

    2018-01-01

    Full Text Available Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes (EC with a processes-based cognition model by introducing a ratio value λ of EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency (quantified as time cost of implication-ratio variations from λk to λk+1, k=1,2,… are further established. Imbedding proposed models into the online algorithms is suggested as a future research priority towards precision security for critical applications and, furthermore, schemes for a practical implementation of such integration are also preliminarily discussed.

  13. A Survey of Security Challenges in Internet of Things

    Anass Sedrati

    2018-01-01

    Full Text Available Internet of things (IoT is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges to ensure its function and operability in a near future. This paper defines first some technical challenges of IoT today, before focusing on security-related ones via a layered architecture of IoT that we suggest. Finally, a number of actions and required future work is presented to enhance IoT security (Privacy, Lightweight crypto, etc..

  14. Sweet Dreams and Nightmares: Security in the Internet of Things

    Kasper , Timo; Oswald , David; Paar , Christof

    2014-01-01

    Part 1: Invited Paper; International audience; Wireless embedded devices are predominant in the Internet of Things: Objects tagged with Radio Frequency IDentification and Near Field Communication technology, smartphones, and other embedded tokens interact from device to device and thereby often process information that is security or privacy relevant for humans. For protecting sensitive data and preventing attacks, many embedded devices employ cryptographic algorithms and authentication schem...

  15. Twenty security considerations for cloud-supported Internet of Things

    Singh, Jatinder; Pasquier, Thomas; Bacon, Jean Margaret; Ko, Hajoon; Eyers, David

    2015-01-01

    To realise the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends towards the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy and p...

  16. Security and Privacy Analyses of Internet of Things Toys

    Chu, Gordon; Apthorpe, Noah; Feamster, Nick

    2018-01-01

    This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that violate the Children's Online Privacy Protection Rule (COPPA) as well as the toys' individual pr...

  17. Security training with interactive laser-video-disk technology

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  18. Security encryption for video-on-radio devices

    Perrone, Antonio L.; Basti, Gianfranco

    2002-03-01

    In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the video image archive and real-time database of the broadcaster, and by asymmetric key the video broadcasting to final users. The module includes our proprietary Techniteia Encryption Library (TEL), that is already successfully running and securing several e-commerce portals in Europe. TEL is written in C-ANSI language for its easy exportation onto all main platforms and it is optimized for real-time applications. It is based on the blowfish encryption algorithm and it is characterized by a physically separated sub-module for the automatic generation/recovering of the variable sub-keys of the blowfish algorithm. In this way, different parts of the database are encrypted by different keys, both in space and in time, for granting an optimal security.

  19. Security Considerations around End-to-End Security in the IP-based Internet of Things

    Brachmann, M.; Garcia-Mochon, O.; Keoh, S.L.; Kumar, S.S.

    2012-01-01

    The IP-based Internet of Things refers to the interconnection of smart objects in a Low-power and Lossy Network (LLN) with the Internetby means of protocols such as 6LoWPAN or CoAP. The provisioning of an end-to-end security connection is the key to ensure basic functionalities such as software

  20. A Secure and Robust Object-Based Video Authentication System

    He Dajun

    2004-01-01

    Full Text Available An object-based video authentication system, which combines watermarking, error correction coding (ECC, and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI.

  1. Lightweight S-Box Architecture for Secure Internet of Things

    A. Prathiba

    2018-01-01

    Full Text Available Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-box suited to Internet of Things (IoT applications is proposed in this work. The structure of the 4 × 4 S-box is devised in the finite fields GF (24 and GF ((222. The finite field S-box is realized by multiplicative inversion followed by an affine transformation. The multiplicative inverse architecture employs Euclidean algorithm for inversion in the composite field GF ((222. The affine transformation is carried out in the field GF (24. The isomorphic mapping between the fields GF (24 and GF ((222 is based on the primitive element in the higher order field GF (24. The recommended finite field S-box architecture is combinational and enables sub-pipelining. The linear and differential cryptanalysis validates that the proposed S-box is within the maximal security bound. It is observed that there is 86.5% lesser gate count for the realization of sub field operations in the composite field GF ((222 compared to the GF (24 field. In the PRESENT lightweight cipher structure with the basic loop architecture, the proposed S-box demonstrates 5% reduction in the gate equivalent area over the look-up-table-based S-box with TSMC 180 nm technology.

  2. [Security specifications for electronic medical records on the Internet].

    Mocanu, Mihai; Mocanu, Carmen

    2007-01-01

    The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.

  3. Security and Privacy Grand Challenges for the Internet of Things

    Fink, Glenn A.; Zarzhitsky, Dimitri V.; Carroll, Thomas E.; Farquhar, Ethan D.

    2015-08-20

    Abstract— The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for illicit surveillance through lifestyle analysis, unauthorized access to information, and new attack vectors will continue to increase by 2020, when up-to 50 billion devices may be connected. This paper discusses various kinds of vulnerabilities that can be expected to arise, and presents a research agenda for mitigating the worst of the impacts. We hope to draw research attention to the potential dangers of IoT so that many of these problems can be avoided.

  4. INTERNET SECURITY – TECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  5. Secure Video Surveillance System (SVSS) for unannounced safeguards inspections

    Galdoz, Erwin G.; Pinkalla, Mark

    2010-01-01

    The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed. ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains

  6. Prevalence and Correlates of Video and Internet Gaming Addiction among Hong Kong Adolescents: A Pilot Study

    Chong-Wen Wang

    2014-01-01

    Full Text Available This pilot study investigated the patterns of video and internet gaming habits and the prevalence and correlates of gaming addiction in Hong Kong adolescents. A total of 503 students were recruited from two secondary schools. Addictive behaviors of video and internet gaming were assessed using the Game Addiction Scale. Risk factors for gaming addiction were examined using logistical regression. An overwhelming majority of the subjects (94% reported using video or internet games, with one in six (15.6% identified as having a gaming addiction. The risk for gaming addiction was significantly higher among boys, those with poor academic performance, and those who preferred multiplayer online games. Gaming addiction was significantly associated with the average time spent gaming per week, frequency of spending money on gaming, period of spending money on gaming, perceived family disharmony, and having more close friends. These results suggest that effective educational and preventative programs or strategies are needed.

  7. Prevalence and correlates of video and internet gaming addiction among Hong Kong adolescents: a pilot study.

    Wang, Chong-Wen; Chan, Cecilia L W; Mak, Kwok-Kei; Ho, Sai-Yin; Wong, Paul W C; Ho, Rainbow T H

    2014-01-01

    This pilot study investigated the patterns of video and internet gaming habits and the prevalence and correlates of gaming addiction in Hong Kong adolescents. A total of 503 students were recruited from two secondary schools. Addictive behaviors of video and internet gaming were assessed using the Game Addiction Scale. Risk factors for gaming addiction were examined using logistical regression. An overwhelming majority of the subjects (94%) reported using video or internet games, with one in six (15.6%) identified as having a gaming addiction. The risk for gaming addiction was significantly higher among boys, those with poor academic performance, and those who preferred multiplayer online games. Gaming addiction was significantly associated with the average time spent gaming per week, frequency of spending money on gaming, period of spending money on gaming, perceived family disharmony, and having more close friends. These results suggest that effective educational and preventative programs or strategies are needed.

  8. Healthy Habits for TV, Video Games, and the Internet

    ... situations and express your feelings about difficult topics (sex, love, drugs, alcohol, smoking, work, behavior, family life). Teach your kids to question and learn from what they see on screens. Video and Interactive Computer Games Look at the ratings. ...

  9. Patterns of choices on video game genres and Internet addiction.

    Floros, Georgios; Siomos, Konstantinos

    2012-08-01

    In this study, we attempt to identify motives pivotal in choices made regarding online and offline game genres and assess whether they are meaningful predictors of Internet addiction. A separate goal was to determine how an assessment of Internet-related cognitions compares to criteria-based research instruments on Internet addiction, and demonstrate its clinical usefulness. We are using data from a cross-sectional study of the entire adolescent student population aged 12-18 of the island of Kos. Results indicate that specific game genres and motives for choosing a game are important predictors of Internet addiction, even after accounting for sociodemographic and Internet-use-related variables. Gender differences are not statistically important when we account for genre choices and motives for choosing them. Boys' thought content tends to revolve more around their Internet use compared to girls. Several patterns of motives to play specific genres were identified with the help of a canonical correlation analysis, demonstrating the fact that the simple observation of overt behavior is not enough to deduce the meaning of these actions for the individual. Using multiple measures of online addiction, examining genre preferences and underlying motives for choosing a game can be helpful in reaching a better understanding of the individual game player.

  10. [Aiming for the adolescent market: internet and video games, the new strategies of the tobacco industry].

    Barrientos-Gutiérrez, Tonatiuh; Barrientos-Gutiérrez, Inti; Reynales-Shigematsu, Luz Myriam; Thrasher, James F; Lazcano-Ponce, Eduardo

    2012-06-01

    Exposure to tobacco advertisement is associated with smoking initiation among the youth, its elimination is a key objective to effectively curb the tobacco epidemic. Historically, the tobacco industry has pioneered the use of new communication technologies to keep and expand their market. Nowadays, Internet and video games have transcended the entertainment sphere, becoming significant media for massive communication and providing new opportunities for advertisement. The present essay reviews the existing literature on tobacco presence in the Internet and video games to define research and policy tasks required to develop effective means for tobacco advertisement regulation and control.

  11. Internet Protocol Display Sharing Solution for Mission Control Center Video System

    Brown, Michael A.

    2009-01-01

    With the advent of broadcast television as a constant source of information throughout the NASA manned space flight Mission Control Center (MCC) at the Johnson Space Center (JSC), the current Video Transport System (VTS) characteristics provides the ability to visually enhance real-time applications as a broadcast channel that decision making flight controllers come to rely on, but can be difficult to maintain and costly. The Operations Technology Facility (OTF) of the Mission Operations Facility Division (MOFD) has been tasked to provide insight to new innovative technological solutions for the MCC environment focusing on alternative architectures for a VTS. New technology will be provided to enable sharing of all imagery from one specific computer display, better known as Display Sharing (DS), to other computer displays and display systems such as; large projector systems, flight control rooms, and back supporting rooms throughout the facilities and other offsite centers using IP networks. It has been stated that Internet Protocol (IP) applications are easily readied to substitute for the current visual architecture, but quality and speed may need to be forfeited for reducing cost and maintainability. Although the IP infrastructure can support many technologies, the simple task of sharing ones computer display can be rather clumsy and difficult to configure and manage to the many operators and products. The DS process shall invest in collectively automating the sharing of images while focusing on such characteristics as; managing bandwidth, encrypting security measures, synchronizing disconnections from loss of signal / loss of acquisitions, performance latency, and provide functions like, scalability, multi-sharing, ease of initial integration / sustained configuration, integration with video adjustments packages, collaborative tools, host / recipient controllability, and the utmost paramount priority, an enterprise solution that provides ownership to the whole

  12. Information Security Problem on Internet%因特网上的信息安全问题

    郭晓苗

    2000-01-01

    With the wide use of Internet,the information security problem on Internet becomes more and more serious.The article gives an overall description of the information security problem on Internet,the cause of the problem and some threats to the information security on Internet.

  13. The future of 3D and video coding in mobile and the internet

    Bivolarski, Lazar

    2013-09-01

    The current Internet success has already changed our social and economic world and is still continuing to revolutionize the information exchange. The exponential increase of amount and types of data that is currently exchanged on the Internet represents significant challenge for the design of future architectures and solutions. This paper reviews the current status and trends in the design of solutions and research activities in the future Internet from point of view of managing the growth of bandwidth requirements and complexity of the multimedia that is being created and shared. Outlines the challenges that are present before the video coding and approaches to the design of standardized media formats and protocols while considering the expected convergence of multimedia formats and exchange interfaces. The rapid growth of connected mobile devices adds to the current and the future challenges in combination with the expected, in near future, arrival of multitude of connected devices. The new Internet technologies connecting the Internet of Things with wireless visual sensor networks and 3D virtual worlds requires conceptually new approaches of media content handling from acquisition to presentation in the 3D Media Internet. Accounting for the entire transmission system properties and enabling adaptation in real-time to context and content throughout the media proceeding path will be paramount in enabling the new media architectures as well as the new applications and services. The common video coding formats will need to be conceptually redesigned to allow for the implementation of the necessary 3D Media Internet features.

  14. Implementing Network Video for Traditional Security and Innovative Applications: Best Practices and Uses for Network Video in K-12 Schools

    Wren, Andrew

    2008-01-01

    Administrators are constantly seeking ways to cost-effectively and adequately increase security and improve efficiency in K-12 schools. While video is not a new tool to schools, the shift from analog to network technology has increased the accessibility and usability in a variety of applications. Properly installed and used, video is a powerful…

  15. More Than a Just a Game: Video Game and Internet Use during Emerging Adulthood

    Padilla-Walker, Laura M.; Nelson, Larry J.; Carroll, Jason S.; Jensen, Alexander C.

    2010-01-01

    The purpose of this study was to gain a clearer understanding of the pattern of video game and internet use among college students and to examine how electronic leisure was related to risk behaviors (i.e., drinking, drug use, sex), perceptions of the self (i.e., self worth and social acceptance), and relationships with others (i.e., relationship…

  16. A bibliometric analysis of the scientific literature on Internet, video games, and cell phone addiction.

    Carbonell, Xavier; Guardiola, Elena; Beranuy, Marta; Bellés, Ana

    2009-04-01

    The aim of this study was to locate the scientific literature dealing with addiction to the Internet, video games, and cell phones and to characterize the pattern of publications in these areas. One hundred seventy-nine valid articles were retrieved from PubMed and PsycINFO between 1996 and 2005 related to pathological Internet, cell phone, or video game use. The years with the highest numbers of articles published were 2004 (n = 42) and 2005 (n = 40). The most productive countries, in terms of number of articles published, were the United States (n = 52), China (n = 23), the United Kingdom (n = 17), Taiwan (n = 13), and South Korea (n = 9). The most commonly used language was English (65.4%), followed by Chinese (12.8%) and Spanish (4.5%). Articles were published in 96 different journals, of which 22 published 2 or more articles. The journal that published the most articles was Cyberpsychology & Behavior (n = 41). Addiction to the Internet was the most intensely studied (85.3%), followed by addiction to video games (13.6%) and cell phones (2.1%). The number of publications in this area is growing, but it is difficult to conduct precise searches due to a lack of clear terminology. To facilitate retrieval, bibliographic databases should include descriptor terms referring specifically to Internet, video games, and cell phone addiction as well as to more general addictions involving communications and information technologies and other behavioral addictions.

  17. The influence of television, video games, and the internet on children's creativity

    Calvert, S.L.; Valkenburg, P.M.; Taylor, M.

    2013-01-01

    For many children, substantial amounts of time are devoted almost every day to screen media, including television viewing, video game play, and online Internet activities. This chapter discusses exposure to these types of media activities and some of the ways they influence creativity. In

  18. Global Internet Video Classroom: A Technology Supported Learner-Centered Classroom

    Lawrence, Oliver

    2010-01-01

    The Global Internet Video Classroom (GIVC) Project connected Chicago Civil Rights activists of the 1960s with Cape Town Anti-Apartheid activists of the 1960s in a classroom setting where learners from Cape Town and Chicago engaged activists in conversations about their motivation, principles, and strategies. The project was launched in order to…

  19. Innovative Second Language Speaking Practice with Interactive Videos in a Rich Internet Application Environment

    Pereira, Juan A.; Sanz-Santamaría, Silvia; Montero, Raúl; Gutiérrez, Julián

    2012-01-01

    Attaining a satisfactory level of oral communication in a second language is a laborious process. In this action research paper we describe a new method applied through the use of interactive videos and the Babelium Project Rich Internet Application (RIA), which allows students to practice speaking skills through a variety of exercises. We present…

  20. Delay discounting, risk-taking, and rejection sensitivity among individuals with Internet and Video Gaming Disorders.

    Weinstein, Aviv; Abu, Hodaya Ben; Timor, Ayelet; Mama, Yaniv

    2016-12-01

    Background and aims There is a previous evidence for impulsivity in individuals with Internet and Video Gaming Disorders. The aim of this study was to examine whether Internet and video game addictions are associated with experiential delay discounting, risk-taking, and sensitivity to social rejection using computerized tasks and questionnaires. Methods Twenty participants (mean age 24, SD = 1.55) with high score on the Problematic Online Gaming Questionnaire (POGQ) were compared with 20 participants (mean age 24.8, SD = 1.34) with low score on the POGQ. They performed on computerized Balloon Analog Risk Task and Experiential Delay discounting Task (EDT), and filled in the sensitivity to social rejection questionnaire. Results Participants with high POGQ scores had lower measures of delay discounting, higher measures of risk-taking, and higher measures of sensitivity to social rejection compared with participants with low POGQ scores. Discussion The results of this study support the previous evidence of risk-taking and provide new evidence for difficulties in delay discounting and sensitivity to social rejection among those who score high on Internet and video games. Conclusions The results suggest that Internet- and video game-addicted individuals seek immediate gratification and cannot wait for later reward. Furthermore, these individuals spend time in the virtual world, where they feel safe, and avoid social interactions presumably due to fears of social rejection.

  1. A Conceptual Review of Research on the Pathological Use of Computers, Video Games, and the Internet

    Sim, Timothy; Gentile, Douglas A.; Bricolo, Francesco; Serpelloni, Giovanni; Gulamoydeen, Farah

    2012-01-01

    Preliminary research studies suggest that some people who use computer, video games, and the Internet heavily develop dysfunctional symptoms, often referred to in the popular press as an "addiction." Although several studies have measured various facets of this issue, there has been no common framework within which to view these studies. This…

  2. Internet Use and Video Gaming Predict Problem Behavior in Early Adolescence

    Holtz, Peter; Appel, Markus

    2011-01-01

    In early adolescence, the time spent using the Internet and video games is higher than in any other present-day age group. Due to age-inappropriate web and gaming content, the impact of new media use on teenagers is a matter of public and scientific concern. Based on current theories on inappropriate media use, a study was conducted that comprised…

  3. Research on Lightweight Information Security System of the Internet of Things

    Ying Li; Li Ping Du; JianWei Guo; Xin Zhao

    2013-01-01

    In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used to verify the legality of access device and to protect the confidentiality and integrity of transform...

  4. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  5. Gender (in)equality in internet pornography: a content analysis of popular pornographic internet videos

    Klaassen, M.J.E.; Peter, J.

    2015-01-01

    Although Internet pornography is widely consumed and researchers have started to investigate its effects, we still know little about its content. This has resulted in contrasting claims about whether Internet pornography depicts gender (in)equality and whether this depiction differs between amateur

  6. High-speed holographic correlation system for video identification on the internet

    Watanabe, Eriko; Ikeda, Kanami; Kodate, Kashiko

    2013-12-01

    Automatic video identification is important for indexing, search purposes, and removing illegal material on the Internet. By combining a high-speed correlation engine and web-scanning technology, we developed the Fast Recognition Correlation system (FReCs), a video identification system for the Internet. FReCs is an application thatsearches through a number of websites with user-generated content (UGC) and detects video content that violates copyright law. In this paper, we describe the FReCs configuration and an approach to investigating UGC websites using FReCs. The paper also illustrates the combination of FReCs with an optical correlation system, which is capable of easily replacing a digital authorization sever in FReCs with optical correlation.

  7. EBLAST: an efficient high-compression image transformation 3. application to Internet image and video transmission

    Schmalz, Mark S.; Ritter, Gerhard X.; Caimi, Frank M.

    2001-12-01

    A wide variety of digital image compression transforms developed for still imaging and broadcast video transmission are unsuitable for Internet video applications due to insufficient compression ratio, poor reconstruction fidelity, or excessive computational requirements. Examples include hierarchical transforms that require all, or large portion of, a source image to reside in memory at one time, transforms that induce significant locking effect at operationally salient compression ratios, and algorithms that require large amounts of floating-point computation. The latter constraint holds especially for video compression by small mobile imaging devices for transmission to, and compression on, platforms such as palmtop computers or personal digital assistants (PDAs). As Internet video requirements for frame rate and resolution increase to produce more detailed, less discontinuous motion sequences, a new class of compression transforms will be needed, especially for small memory models and displays such as those found on PDAs. In this, the third series of papers, we discuss the EBLAST compression transform and its application to Internet communication. Leading transforms for compression of Internet video and still imagery are reviewed and analyzed, including GIF, JPEG, AWIC (wavelet-based), wavelet packets, and SPIHT, whose performance is compared with EBLAST. Performance analysis criteria include time and space complexity and quality of the decompressed image. The latter is determined by rate-distortion data obtained from a database of realistic test images. Discussion also includes issues such as robustness of the compressed format to channel noise. EBLAST has been shown to perform superiorly to JPEG and, unlike current wavelet compression transforms, supports fast implementation on embedded processors with small memory models.

  8. Kaleidoscope on the Internet of Toys: Safety, security, privacy and societal insights

    CHAUDRON STEPHANE; DI GIOIA Rosanna; GEMO Monica; HOLLOWAY Donell; MARSH Jackie; MASCHERONI Giovanna; PETER Jochen; YAMADA-RICE Dylan

    2016-01-01

    This paper gives an insight on safety, security, privacy and scocietal questions emerging from the rise of the Internet of Toys, meaning Internet Connected Toys that participate along with the wave of other domestic connected objects, the Internet of Things in increasing the ubiquity of the ICT within our everyday, closer to ourselves and our children more than ever. What changes and challenges 24/7 Internet connected devices, and Connected Toys particularly, will bring in our Society? What p...

  9. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  10. VIDEO-TERMINAL DISSOCIATIVE TRANCE:TOWARD A PSYCHODYNAMIC UNDERSTANDING OF PROBLEMATIC INTERNET USE

    Adriano Schimmenti

    2017-02-01

    Full Text Available Objective: In this article, we propose the clinical construct of Video-terminal Dissociative Trance (VDT and discuss its potential usefulness for the assessment and treatment of people who display problematic Internet use. VDT is defined as a clinical syndrome characterized by clusters of symptoms in the psychological domains of addiction, regression, and dissociation in the individual’s interactions with the computer and its applications. Method: Study 1 examines the relationships between Internet addiction symptoms, dissociative experiences, and attachment styles in a sample of university students. Study 2 explores the associations between Internet addiction symptoms, cyberpornography use, and dissociative experiences in another sample of university students. Two clinical vignettes are presented to provide anecdotal evidence for VDT cases. Results: Preoccupied attachment style and dissociation predicted Internet addiction symptoms in Study 1. Dissociation scores predicted Internet addiction symptoms in Study 2, while cyberpornography use did not add to the prediction. Clinical vignettes suggest that a VDT framework can help to interpret both of these findings and improve the understanding of the specific motives behind an individual’s misuse of the Internet. Conclusions: VDT may involve significant disturbances in the state of consciousness, identity, and memory, the dilution of self-awareness and self-integrity, and the replacement of the customary sense of personal identity by a new virtual identity. People who display problematic Internet use may greatly benefit from clinical interventions aimed at addressing these symptoms and understanding their origins.

  11. Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things

    Jung, Seung Wook; Jung, Souhwan

    2015-01-01

    In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. Without the guarantee of establishment of key and trust relationship, the traffic over the Internet of Things network cannot be presumed secure. Also, when the home gateway, which knows the shared secret key, is out of order and the new gateway should be installed, the secure key establishment a...

  12. Applications of Scalable Multipoint Video and Audio Using the Public Internet

    Robert D. Gaglianello

    2000-01-01

    Full Text Available This paper describes a scalable multipoint video system, designed for efficient generation and display of high quality, multiple resolution, multiple compressed video streams over IP-based networks. We present our experiences using the system over the public Internet for several “real-world” applications, including distance learning, virtual theater, and virtual collaboration. The trials were a combined effort of Bell Laboratories and the Gertrude Stein Repertory Theatre (TGSRT. We also present current advances in the conferencing system since the trials, new areas for application and future applications.

  13. Mechanics of Student-Directed Multi-University Internet Video-Conferencing Course

    Durant, A. J.; Mann, C. P.; Rose, W. I.; Stix, J.

    2007-12-01

    Connecting graduate students with experts in a given discipline is vital to their success but has often been challenging because of logistics, costs, and scheduling. Advances in Internet video-conferencing now allow multiple parties to meet simultaneously in a virtual classroom environment. Here we describe the mechanics of a recent student-directed graduate-level course that enabled students to directly engage in scientific discussion with experts. Conducted under the auspices of the Earth Hazards (EHaz) Consortium, the spring 2007 Volcano Instability course connected nine previously disparate groups over North America in a combined learning and cultural experience. Each week course participants (including the guest speaker, students and university professors) reviewed current journal articles and a speaker presentation, and used Marratech Internet video- conferencing software to meet online and discuss the material with an expert on the subject. Internet video-conferencing provides an inexpensive and innovative approach to teaching across international boundaries. The EHaz 2007 Volcano Instability course connected 14 experts with 64 students and professors. Many universities can participate through this approach, allowing an advanced graduate class that normally contains 4 - 8 students on one campus to become a class of 50 or more dispersed over many campuses. As evidenced by overwhelmingly positive course evaluations, the approach was stimulating and conducive to learning, and has great potential for application over many other disciplines. This dynamic interaction between students and experts will ultimately raise the standard of instruction and motivate students to self-guide their learning experience to levels of greater understanding.

  14. More than a just a game: video game and internet use during emerging adulthood.

    Padilla-Walker, Laura M; Nelson, Larry J; Carroll, Jason S; Jensen, Alexander C

    2010-02-01

    The purpose of this study was to gain a clearer understanding of the pattern of video game and internet use among college students and to examine how electronic leisure was related to risk behaviors (i.e., drinking, drug use, sex), perceptions of the self (i.e., self worth and social acceptance), and relationships with others (i.e., relationship quality with parents and friends). Participants included 813 undergraduate students (500 young women, 313 young men, M age = 20, SD = 1.87) who were mainly European American (79%), unmarried (100%) and living outside their parents' home (90%). Results suggested that (a) video game use was linked to negative outcomes for men and women, (b) different patterns of video game and internet use existed for men and women and (c) there were different relations to risk behaviors, feelings about the self, and relationship quality based on the type of internet use, and based on gender. The discussion focuses on the implications of electronic leisure on the overall health and development of young people as they transition to adulthood.

  15. The effect of methylphenidate on Internet video game play in children with attention-deficit/hyperactivity disorder.

    Han, Doug Hyun; Lee, Young Sik; Na, Churl; Ahn, Jee Young; Chung, Un Sun; Daniels, Melissa A; Haws, Charlotte A; Renshaw, Perry F

    2009-01-01

    A number of studies about attention-deficit/hyperactivity disorder (ADHD) and Internet video game play have examined the prefrontal cortex and dopaminergic system. Stimulants such as methylphenidate (MPH), given to treat ADHD, and video game play have been found to increase synaptic dopamine. We hypothesized that MPH treatment would reduce Internet use in subjects with co-occurring ADHD and Internet video game addictions. Sixty-two children (52 males and 10 females), drug-naive, diagnosed with ADHD, and Internet video game players, participated in this study. At the beginning of the study and after 8 weeks of treatment with Concerta (OROS methylphenidate HCl, Seoul, Korea), participants were assessed with Young's Internet Addiction Scale, Korean version (YIAS-K), Korean DuPaul's ADHD Rating Scale, and the Visual Continuous Performance Test. Their Internet usage time was also recorded. After 8 weeks of treatment, the YIAS-K scores and Internet usage times were significantly reduced. The changes in the YIAS-K scores between the baseline and 8-week assessments were positively correlated with the changes in total and inattention scores from the Korean DuPaul's ADHD Rating Scale, as well as omission errors from the Visual Continuous Performance Test. There was also a significant difference in the number of omission errors among non-Internet-addicted, mildly Internet addicted, and severely Internet addicted participants. We suggest that Internet video game playing might be a means of self-medication for children with ADHD. In addition, we cautiously suggest that MPH might be evaluated as a potential treatment of Internet addiction.

  16. Ultrabroadband photonic Internet: data mining approach to security aspects

    Kalicki, Arkadiusz

    2009-06-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. In order to secure web applications intrusion detection (IDS) and intrusion prevention systems (IPS) are being used. Intrusion detection systems are divided in two groups: misuse detection (traditional IDS) and anomaly detection. Misuse detection systems are signature based, have high accuracy in detecting many kinds of known attacks but cannot detect unknown and emerging attacks. This can be complemented with anomaly based intrusion detection and prevention systems. This paper presents anomaly driven proxy as an IPS and data mining based algorithm which was used to detecting anomalies. The principle of this method is the comparison of the incoming HTTP traffic with a previously built profile that contains a representation of the "normal" or expected web application usage sequence patterns. The frequent sequence patterns are found with GSP algorithm. Some basic tests show that the software catches malicious requests.

  17. Mobile, portable lightweight wireless video recording solutions for homeland security, defense, and law enforcement applications

    Sandy, Matt; Goldburt, Tim; Carapezza, Edward M.

    2015-05-01

    It is desirable for executive officers of law enforcement agencies and other executive officers in homeland security and defense, as well as first responders, to have some basic information about the latest trend on mobile, portable lightweight wireless video recording solutions available on the market. This paper reviews and discusses a number of studies on the use and effectiveness of wireless video recording solutions. It provides insights into the features of wearable video recording devices that offer excellent applications for the category of security agencies listed in this paper. It also provides answers to key questions such as: how to determine the type of video recording solutions most suitable for the needs of your agency, the essential features to look for when selecting a device for your video needs, and the privacy issues involved with wearable video recording devices.

  18. A review of video security training and assessment-systems and their applications

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  19. Internet of people, things and services - the convergence of security, trust and privacy

    Eloff, JHP

    2009-12-01

    Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...

  20. What we talk about when we talk about cybersecurity: security in internet governance debates

    Josephine Wolff

    2016-09-01

    Full Text Available At meetings of internet governance organisations, participants generally agree that improving security is an important goal, but these conversations rarely yield consensus around how to achieve this outcome. One reason security plays this paradoxical role—as both a universal point of agreement and a continued source of contention—in these debates is that it has significantly different meanings to different stakeholders involved in these governance forums. In this paper, we discuss how different stakeholders define and frame internet security issues in the context of governance debates and analyse how these conflicting notions of security continue to shape emerging controversies.

  1. Video Games, Internet and Social Networks: A Study among French School students

    Dany, Lionel; Moreau, Laure; Guillet, Clémentine; Franchina, Carmelo

    2016-11-25

    Aim : Screen-based media use is gradually becoming a public health issue, especially among young people.Method : A local descriptive observational study was conducted in 11 colleges of the Bouches-du-Rhône department. All middle high school students were asked to fill in a questionnaire comprising questions about their demographic characteristics, their screen-based media use (Internet, video games, social networks), any problematic use (video games and social networks), self-esteem and quality of life.Results : A total of 950 college students (mean age : 12.96 years) participated in the research. The results show a high level and a very diverse screen-based media use. Boys more frequently played video games and girls go more frequently used social networks. The levels of problematic use were relatively low for all middle high school students. The level of problematic video game use was significantly higher in boys, and the level of problematic social network use was higher in girls.Conclusion : Differences in the use of video games or social networks raise the general issue of gender differences in society. This study indicates the need for more specific preventive interventions for screen-based media use. The addictive “nature” of certain practices needs to be studied in more detail.

  2. The Internet of Things: Perspectives on Security from RFID and WSN

    Shah, Ayush; Pal, Ambar; Acharya, H. B.

    2016-01-01

    A massive current research effort focuses on combining pre-existing 'Intranets' of Things into one Internet of Things. However, this unification is not a panacea; it will expose new attack surfaces and vectors, just as it enables new applications. We therefore urgently need a model of security in the Internet of Things. In this regard, we note that IoT descends directly from pre-existing research (in embedded Internet and pervasive intelligence), so there exist several bodies of related work:...

  3. Computer Security: Virus Highlights Need for Improved Internet Management

    1989-06-01

    Kingdom. Page 47 GAO/IMTEC-89-57 Internet Computer Virus Appendix III Major Contributors to This Report Information Management and Technology ...resources; disrupts the intended use of the Internet ; or wastes resources, destroys the integrity of computer -based information , or compromises users...and information from the other party in order to assist in preparation for trial. Page 32 GAO/IMTEC-89-57 Internet Computer Virus Chapter 3 Factors

  4. A socio-organizational approach to information systems security management in the context of internet banking

    Koskosas, loannis Vasileios

    2004-01-01

    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University. This thesis takes a social and organizational point of view for studying information systems security in the context of internet banking. While the internet provides opportunities for businesses to extend their public network infrastructure, reduce transaction costs, and sell a wide range of products and services worldwide, security threats impede the business. Although, a number ...

  5. The Internet and Video Games: Causes of Increased Aggressiveness Among Young People

    Nataša Ružić

    2011-12-01

    Full Text Available The increase in youth violence is among the most serious problems facing modern society. Many experts adhere to the opinion that responsibility for this phenomenon is borne by families, schools, and the media. The so-called digital generation spends much of its free time on the Internet and accepts the values imposed by the media. The modern criterion of success is to reach glory by any means necessary. As such, it is understandable that young people, eager for publicity, look for creative ways to attract attention. One of the most expedient ways to achieve fame and prove their ‘originality’ is by posting videos of violent behavior on websites like YouTube. The Internet has brought limitless freedom in the exposure of inappropriate content and has thus contributed to an increase in violence among the young, primarily through the video games industry. Based on all the above, we argue that the Internet has spurred and intensified the development of cyberbullying.

  6. An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard

    Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi

    H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.

  7. Social Security Number Replacement Card Applications filed via the Internet

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  8. Teleradiology mobile internet system with a new information security solution

    Satoh, Hitoshi; Niki, Noboru; Eguchi, Kenji; Ohmatsu, Hironobu; Kusumoto, Masahiko; Kaneko, Masahiro; Moriyama, Noriyuki

    2014-03-01

    We have developed an external storage system by using secret sharing scheme and tokenization for regional medical cooperation, PHR service and information preservation. The use of mobile devices such as smart phones and tablets will be accelerated for a PHR service, and the confidential medical information is exposed to the risk of damage and intercept. We verified the transfer rate of the sending and receiving of data to and from the external storage system that connected it with PACS by the Internet this time. External storage systems are the data centers that exist in Okinawa, in Osaka, in Sapporo and in Tokyo by using secret sharing scheme. PACS continuously transmitted 382 CT images to the external data centers. Total capacity of the CT images is about 200MB. The total time that had been required to transmit was about 250 seconds. Because the preservation method to use secret sharing scheme is applied, security is strong. But, it also takes the information transfer time of this system too much. Therefore, DICOM data is masked to the header information part because it is made to anonymity in our method. The DICOM data made anonymous is preserved in the data base in the hospital. Header information including individual information is divided into two or more tallies by secret sharing scheme, and preserved at two or more external data centers. The token to relate the DICOM data anonymity made to header information preserved outside is strictly preserved in the token server. The capacity of header information that contains patient's individual information is only about 2% of the entire DICOM data. This total time that had been required to transmit was about 5 seconds. Other, common solutions that can protect computer communication networks from attacks are classified as cryptographic techniques or authentication techniques. Individual number IC card is connected with electronic certification authority of web medical image conference system. Individual number IC

  9. Smart Security System For Home Appliances Control Based On Internet Of Things

    Su Zin Zin Win

    2015-08-01

    Full Text Available Technology is always evolves. Home security is essential for occupants convenience and protection. Security systems are being preferred over manual system. With the rapid increase in the number of users of internet over the past decade has made Internet a part and parcel of life and IoTs is the latest and emerging internet technology. Home Appliances Control of Smart Security System using IoTs uses computers or mobile devices to control basic home functions and features through internet from anywhere around the world. This security system differs from other system by allowing the user to operate the system from anywhere around the world through internet connection. With the implementation of Arduino Mega microcontroller as an Embedded device security system design was constructed with many sensors and web server database. The Arduino Ethernet shield is used to eliminate the use of a personal computer PC. The motion sensing circuit temperature and humidity sensing circuit smoke or gas sensing circuit door lock sensing circuit light onoff circuit were designed to be connected with Arduino Mega microcontroller and Ethernet shield. This system can monitor the temperature and humidity values and the state of some sensors for intruder detection. It can also control the electric appliances like lights and door at home. Real time result was displayed on web server page via the internet.

  10. Science and Technology Resources on the Internet: Computer Security.

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  11. Zephyr: A secure Internet process to streamline engineering

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  12. Security in the Cache and Forward Architecture for the Next Generation Internet

    Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.

    The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.

  13. Secure and Lightweight Cloud-Assisted Video Reporting Protocol over 5G-Enabled Vehicular Networks.

    Nkenyereye, Lewis; Kwon, Joonho; Choi, Yoon-Ho

    2017-09-23

    In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a such congested environment. To overcome those drawbacks, the fifth-generation (5G)-enabled vehicular network is considered as a promising technology for empowering the real-time video reporting service. In this paper, we note that security and privacy related issues should also be carefully addressed to boost the early adoption of 5G-enabled vehicular networks. There exist a few research works for secure video reporting service in 5G-enabled vehicular networks. However, their usage is limited because of public key certificates and expensive pairing operations. Thus, we propose a secure and lightweight protocol for cloud-assisted video reporting service in 5G-enabled vehicular networks. Compared to the conventional public key certificates, the proposed protocol achieves entities' authorization through anonymous credential. Also, by using lightweight security primitives instead of expensive bilinear pairing operations, the proposed protocol minimizes the computational overhead. From the evaluation results, we show that the proposed protocol takes the smaller computation and communication time for the cryptographic primitives than that of the well-known Eiza-Ni-Shi protocol.

  14. Death by hanging while watching violent pornographic videos on the Internet - suicide or accidental autoerotic death?

    Vennemann, B; Pollak, S

    2006-03-01

    In deaths by hanging, it may sometimes be difficult to differentiate between autoerotic accident and suicide. Our report deals with a 30-year-old man who was found hanged in the living room of his flat. The deceased was wearing headphones connected to a PC. Within the deceased's view was a computer screen showing the last picture of a video file downloaded from the Internet with the head of an unclothed, allegedly hanged female. The deceased's left hand was inside his trousers in the genital region. The autopsy did not only show findings typical for hanging, but also advanced sarcoidosis, which was known to the victim. Although this basic illness could have been a possible motive for suicide, the circumstances in the presented case pointed more in the direction of an accidental autoerotic death. As far as we know, this is the first description of a death during autoerotic activity in which sexual stimulation was achieved by watching a video file downloaded from the Internet.

  15. Bupropion sustained release treatment decreases craving for video games and cue-induced brain activity in patients with Internet video game addiction.

    Han, Doug Hyun; Hwang, Jun Won; Renshaw, Perry F

    2010-08-01

    Bupropion has been used in the treatment of patients with substance dependence based on its weak inhibition of dopamine and norepinephrine reuptake. We hypothesized that 6 weeks of bupropion sustained release (SR) treatment would decrease craving for Internet game play as well as video game cue-induced brain activity in patients with Internet video game addiction (IAG). Eleven subjects who met criteria for IAG, playing StarCraft (>30 hr/week), and eight healthy comparison subjects (HC) who had experience playing StarCraft (game, and the severity of Internet addiction were evaluated by Beck Depression Inventory, self-report of craving on a 7-point visual analogue scale, and Young's Internet Addiction Scale, respectively. In response to game cues, IAG showed higher brain activation in left occipital lobe cuneus, left dorsolateral prefrontal cortex, and left parahippocampal gyrus than HC. After a 6 week period of bupropion SR, craving for Internet video game play, total game play time, and cue-induced brain activity in dorsolateral prefrontal cortex were decreased in the IAG. We suggest that bupropion SR may change craving and brain activity in ways that are similar to those observed in individuals with substance abuse or dependence. PsycINFO Database Record 2010 APA, all rights reserved.

  16. [Internet and video games among students of Reunion Island in 2010: uses, misuses, perceptions and associated factors].

    Ricquebourg, M; Bernède-Bauduin, C; Mété, D; Dafreville, C; Stojcic, I; Vauthier, M; Galland, M-C

    2013-12-01

    Describe the uses of Internet and video games and quantify associated problematic uses. Information on student practices concerning the use of the Internet and video games was collected with a self-administered questionnaire. Problematic uses were identified with specific tools (Young criteria and Tejeiro criteria) and with self-evaluative questions. Information on life events with traumatic potential and use of psychoactive substances was also collected. Logistic regression models were applied to identify possible associated factors. Based on a sample of 1119 subjects, this study showed that students in Reunion Island are very concerned by the uses of the Internet and video games (98% and 46% of respondents). The prevalence of problematic use of the Internet accounted for 6% of respondents. Problematic uses of video games involved 8% of students (18% of gamers). Young people seemed unaware of their problematic practices and were seeking informations. The public respondent was also characterized by vulnerable situations (traumatic events induring their lives, consumption of psychoactive substances). Significant associations (with no identified causality) were examined, in particular between problematic uses of Internet and video games, and life events with traumatic potential. These first estimates of the prevalence of problematic use of Internet and video games on Reunion Island are important to promote locally collective awareness about these modern addictions. These results will be used to guide local actions of prevention and care, especially among younger generations. But it is necessary to conduct further work to better identify the factors associated with these problematic uses (determinants, comorbidities addictive…). Copyright © 2013. Published by Elsevier Masson SAS.

  17. Evaluation of an internet-based animated preparatory video for children undergoing non-sedated MRI.

    McGlashan, Hannah L; Dineen, Rob A; Szeszak, Sofia; Whitehouse, William P; Chow, Gabriel; Love, Andrew; Langmack, Gill; Wharrad, Heather

    2018-05-10

    We evaluate the value of an internet-based educational animated video designed to prepare children for MRI scans, and whether this video reduces scan-related anxiety in children with a neurological disorder, and healthy controls. Participants completed a pre- and post-scan questionnaire evaluating participant online viewing behaviour, understanding of the MRI procedure, anxiety regarding the MRI, impact of animation in preparing the child and whether the child's expectation of the MRI scan matched their experience. 21 children were recruited (12 healthy controls) ranging in age from 6.5 to 11.5 years. The animation was successfully accessed by participants on a range of digital devices and had high levels of approval. Children who viewed the animation had a good understanding of the MRI procedure and low anxiety levels prior to the scan, and reported that their expectations broadly matched the real-life MRI experience. Children reported that the animation positively impacted on their preparation with similar ratings before and after the scan, and the impact on preparation was rated greater by younger children. There were no group differences between healthy children and those with the neurological disorder for ratings of anxiety, impact on preparation and expectation of the experience. This evaluation demonstrates accessibility, acceptability and relevance of internet-based educational animation for typically developing children, and children with a neurodisability aged 6 to 11 years, with positive impact on preparation for MRI. Advances in knowledge: The internet-based educational animation provides a widely accessible tool to support preparation of children for non-sedated MRI.

  18. Internet video - teknik og pædagogik mødes på nettet

    Dorte Sidelmann Jørgensen

    2004-05-01

    Full Text Available

    Første gang publiceret i UNEV nr. 3: Internet Video: Teknik og pædagogik mødes på nettet, april - juni 2004, red. Jens Dørup. ISSN 1603-5518.

    I nærværende UNEV tema som omhandler universiteternes brug af digital video tegnes en status over dette nye medies anvendelse rundt om i landet. En række af de flittigste brugere, som også har været iblandt de første på området, fortæller om deres praktiske erfaringer, som naturligt nok har været af både teknologisk og pædagogisk art. Som universitetsundervisere og forskere er vi vandt til et relativt lavt budget, og vi har måttet klare mange teknologiske opgaver uden professionel hjælp. Til gengæld stimulerer denne situation underviseren til at inddrage pædagogiske og teknologiske aspekter samtidigt, når videomediet og det nye potentialer skal afprøves og implementeres. Som læringsmedie adskiller Internet video sig på mange måder fra TV og analoge videobånd. De indlysende forskelle – om mulighederne for uafhængighed af tid og sted – kan snart erkendes og beskrives, men erfaringerne tyder på at disse forskelle, når det gælder om at stimulere læringen, måske er mindre betydningsfulde end mulighederne for at indarbejde, forankre og samvirke netbaseret video med øvrige læringsaktiviteter. Det aktuelle tema viser at de tekniske muligheder er tilgængelige og at vi mange steder er kommet godt i gang, men også at der er langt igen før danske universiteter til fulde har lært at udnytte potentialerne i digital video.

  19. Medical teleconferencing with high-definition video presentation on the 'usual' Internet.

    Obuchi, Toshiro; Shima, Hiroji; Iwasaki, Akinori

    2013-06-01

    Although medical teleconferences on advanced academic networks have been common (Telemed J E Health 15:112-117, 1; Asian J Endosc Surg 3:185-188, 2; Surg Today 41:1579-1581, 3; Telemedicine development center of Asia. http://www.aqua.med.kyushu-u.ac.jp/eg/index.html . Accessed 6 March 2013, 4), reports regarding 'usual' Internet teleconferences or tele-lectures employing a telecommunication system for business use are very rare. Medical teleconferences and tele-lectures on the Internet were held three times between our institutions and other institutions, using the 'HD Com' made by Panasonic (HD Com. http://panasonic.biz/com/visual/ . Accessed 6 March 2013, 5), which is a high-definition telecommunication system for business tele-meeting. All of our medical telecommunications were successfully completed without any troubles. This system allows for all kinds of presentations using personal computers to be made from each station, so that discussions with high-definition surgical video presentation, which has recently been developed, could be effortlessly established despite the distance between institutions. Unlike telecommunication using advanced academic networks, this system can run without any need for specific engineering support, on the usual Internet. Medical telecommunication employing this system is likely to become common among ordinary hospitals in the near future.

  20. Are Internet use and video-game-playing addictive behaviors? Biological, clinical and public health implications for youths and adults

    Yau, Yvonne H. C.; Crowley, Michael J.; Mayes, Linda C.; Potenza, Marc N.

    2013-01-01

    Internet use and video-game playing are experiencing rapid growth among both youth and adult populations. Research suggests that a minority of users experience symptoms traditionally associated with substance-related addictions. Mental health professionals, policy makers and the general public continue to debate the issue of Internet addiction (IA) and problematic video-game playing (PVG). This review identifies existing studies into the clinical and biological characteristics of these disorders that may help guide decisions as to whether or not IA and PVG should be grouped together with substance use disorders (SUDs). PMID:24288435

  1. Racial/ethnic differences in video game and Internet use among US adolescents with mental health and educational difficulties

    Carson, Nicholas; Lê Cook, Benjamin; Chen, Chih-Nan; Alegria, Margarita

    2013-01-01

    Video game and Internet use can be associated with poor mental health and educational outcomes among adolescents. Racial/ethnic minority youth use these media more than White youth. Video game and Internet use among adolescents with mental health and educational difficulties may therefore differ by race/ethnicity in clinically meaningful ways. We analyzed a representative sample of 8th grade students in the United States from the Early Childhood Longitudinal Survey-Kindergarten (N=6,700). Stratifying by gender, we assessed racial/ethnic differences in the associations between video game and Internet use, mental health, and reading and math achievement. Significant minority-White differences were identified in associations between media use and mental health and educational achievement. Video game use was relatively high among black females with prior mental health diagnoses and Asian-American males with high internalizing symptoms. Understanding video game and Internet use among racial/ethnic minority youth with mental health and educational difficulties may improve clinical practice. PMID:29167696

  2. Racial/ethnic differences in video game and Internet use among US adolescents with mental health and educational difficulties.

    Carson, Nicholas; Lê Cook, Benjamin; Chen, Chih-Nan; Alegria, Margarita

    2012-01-01

    Video game and Internet use can be associated with poor mental health and educational outcomes among adolescents. Racial/ethnic minority youth use these media more than White youth. Video game and Internet use among adolescents with mental health and educational difficulties may therefore differ by race/ethnicity in clinically meaningful ways. We analyzed a representative sample of 8 th grade students in the United States from the Early Childhood Longitudinal Survey-Kindergarten (N=6,700). Stratifying by gender, we assessed racial/ethnic differences in the associations between video game and Internet use, mental health, and reading and math achievement. Significant minority-White differences were identified in associations between media use and mental health and educational achievement. Video game use was relatively high among black females with prior mental health diagnoses and Asian-American males with high internalizing symptoms. Understanding video game and Internet use among racial/ethnic minority youth with mental health and educational difficulties may improve clinical practice.

  3. Trends in Scientific Literature on Addiction to the Internet, Video Games, and Cell Phones from 2006 to 2010

    Carbonell, Xavier; Guardiola, Elena; Fuster, Héctor; Gil, Frederic; Panova, Tayana

    2016-01-01

    Background: The goals of the present work were to retrieve the scientific articles published on addiction to the Internet, video games, and cell phones and to analyze the pattern of publications in this area (who is doing the research, when and where it is taking place, and in which journals it is being published), to determine the research being conducted as well as to document geographical trends in publication over time in three types of technological addictions: Internet, cell phones, and...

  4. An Analysis of Security Incidents on the Internet 1989-1995

    1997-04-07

    intervene. 14.4.2. Government Information Policies and the Computer Security Market - During the history of the Internet , the government has maintained a...the government is already taking to improve the operation of the Internet market by supplying information . The following analysis determined whether the... Information Assurance Technology Analysis Center (IATAC) 3190 Fairview Park Drive Falls Church VA 22042 Performing Organization Number(s) Sponsoring

  5. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  6. A Video Game for Cyber Security Training and Awareness

    Cone, Benjamin D; Irvine, Cynthia E; Thompson, Michael F; Nguyen, Thuy D

    2006-01-01

    Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization...

  7. A Video Based System and Method for Improving Aircraft Security

    Meitzler, Tom; Ebenstein, Sam; Smith, Greg; Rodin, Yelena; Zorka, Nick

    2004-01-01

    In late September of 2001 the Commercial Airline Pilots Association (CAPA) endorsed president Bush's plan for improved airline security but expressed concern that it did not address many critical issues...

  8. Internet of Things Security: Layered classification of attacks and possible Countermeasures

    Otmane El Mouaatamid

    2016-12-01

    Full Text Available Nowadays, the internet of things (IoT presents a strong focus of research with various initiatives working on the application, and usage of Internet standards in the IoT. But the big challenge of the internet of things is security. In this paper a layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed

  9. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Freyberger Michael; He Warren; Akhawe Devdatta; Mazurek Michelle L.; Mittal Prateek

    2018-01-01

    An important line of privacy research is investigating the design of systems for secure input and output (I/O) within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper wi...

  10. Sadness, Suicide, and Their Association with Video Game and Internet Overuse among Teens: Results from the Youth Risk Behavior Survey 2007 and 2009

    Messias, Erick; Castro, Juan; Saini, Anil; Usman, Manzoor; Peeples, Dale

    2011-01-01

    We investigated the association between excessive video game/Internet use and teen suicidality. Data were obtained from the 2007 and 2009 Youth Risk Behavior Survey (YRBS), a high school-based, nationally representative survey (N = 14,041 and N = 16,410, respectively). Teens who reported 5 hours or more of video games/Internet daily use, in the…

  11. Internet of Things in Marketing: Opportunities and Security Issues

    Abashidze, Irakli; Dąbrowski, Marcin

    2016-12-01

    Internet of Things (IoT) affects different areas of human activities: everyday life of ordinary citizens, work style of marketing teams, factories and even entire cities. Large companies try to implement the technology in their marketing strategy that reshapes not only communication style and product promotion but consumers' expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devices but significantly influence humans' behavior, in this particular case - decision making style in different phases of purchase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.

  12. INTERNET OF THINGS IN MARKETING: OPPORTUNITIES AND SECURITY ISSUES

    Irakli ABASHIDZE

    2016-10-01

    Full Text Available Internet of Things (IoT affects different areas of human activities: everyday life of ordinary citizens, work style of mar-keting teams, factories and even entire cities. Large companies try to implement the technology in their marketing strat-egy that reshapes not only communication style and product promotion but consumers’ expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devic-es but significantly influence humans’ behavior, in this particular case – decision making style in different phases of pur-chase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.

  13. The Internet of Things: New Interoperability, Management and Security Challenges

    Elkhodr, Mahmoud; Shahrestani, Seyed; Cheung, Hon

    2016-01-01

    The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, securi...

  14. Video on the Internet: An introduction to the digital encoding, compression, and transmission of moving image data.

    Boudier, T; Shotton, D M

    1999-01-01

    In this paper, we seek to provide an introduction to the fast-moving field of digital video on the Internet, from the viewpoint of the biological microscopist who might wish to store or access videos, for instance in image databases such as the BioImage Database (http://www.bioimage.org). We describe and evaluate the principal methods used for encoding and compressing moving image data for digital storage and transmission over the Internet, which involve compromises between compression efficiency and retention of image fidelity, and describe the existing alternate software technologies for downloading or streaming compressed digitized videos using a Web browser. We report the results of experiments on video microscopy recordings and three-dimensional confocal animations of biological specimens to evaluate the compression efficiencies of the principal video compression-decompression algorithms (codecs) and to document the artefacts associated with each of them. Because MPEG-1 gives very high compression while yet retaining reasonable image quality, these studies lead us to recommend that video databases should store both a high-resolution original version of each video, ideally either uncompressed or losslessly compressed, and a separate edited and highly compressed MPEG-1 preview version that can be rapidly downloaded for interactive viewing by the database user. Copyright 1999 Academic Press.

  15. Patient's experience with blended video- and internet based cognitive behavioural therapy service in routine care

    Anne Etzelmueller

    2018-06-01

    Full Text Available Introduction: Internet-based guided self-help and face-to-face CBT have shown to be effective in the treatment of depression, but both approaches might not be an available treatment option for all patients. A treatment which blends internet-based guided self-help with video-based psychotherapy might reduce potential disadvantages of both approaches, while maintaining major advantages such as being location-independent. Additionally, it could provide a stronger focus on patient empowerment and lower resource use compared to traditional face-to-face treatment. Aim: The aim of this study is to evaluate patient's experiences with blended internet- and video-based CBT (blended iCBT treatment and to derive suggestions for the improvement of such services. Methods: Semi-structured interviews were conducted with 15 participants of the blended iCBT treatment as part of the European MasterMind trial. Participants included adults suffering from Major Depressive Disorder. The interview guide assessed patient's experiences regarding the four treatment components program, 1. face-to-face diagnostic interviews, 2. video-based synchronous therapy sessions (VTS, 3. online self-help treatment modules (OTM as well as 4. behaviour diaries and symptom monitoring. Interviews were analyzed using the framework method and outcomes regarding connections within and between participants and categories were generated by counting the statements within relevant themes. Results: Overall, patients indicated to have been satisfied with all components of the treatment, highlighting the option to independently work from home in their own pace. While the OTMs allowed for a deeper reflection of the content, the VTS with the therapist were mentioned to provide the personal character of the service. The working alliance with the therapist was experienced as fostering the individual fit of the treatment. Patients reported a high self-perceived treatment effectiveness. Negative effects

  16. Lightweight certificateless and provably-secure signcryptosystem for the internet of things

    Nguyen , Kim Thuat; Oualha , Nouha; Laurent , Maryline

    2015-01-01

    International audience; In this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability; non-repudiation and public verifiability, while be...

  17. Towards Formal Validation of Trust and Security of the Internet of Services

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  18. DICOM image secure communications with Internet protocols IPv6 and IPv4.

    Zhang, Jianguo; Yu, Fenghai; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen

    2007-01-01

    Image-data transmission from one site to another through public network is usually characterized in term of privacy, authenticity, and integrity. In this paper, we first describe a general scenario about how image is delivered from one site to another through a wide-area network (WAN) with security features of data privacy, integrity, and authenticity. Second, we give the common implementation method of the digital imaging and communication in medicine (DICOM) image communication software library with IPv6/IPv4 for high-speed broadband Internet by using open-source software. Third, we discuss two major security-transmission methods, the IP security (IPSec) and the secure-socket layer (SSL) or transport-layer security (TLS), being used currently in medical-image-data communication with privacy support. Fourth, we describe a test schema of multiple-modality DICOM-image communications through TCP/IPv4 and TCP/IPv6 with different security methods, different security algorithms, and operating systems, and evaluate the test results. We found that there are tradeoff factors between choosing the IPsec and the SSL/TLS-based security implementation of IPv6/IPv4 protocols. If the WAN networks only use IPv6 such as in high-speed broadband Internet, the choice is IPsec-based security. If the networks are IPv4 or the combination of IPv6 and IPv4, it is better to use SSL/TLS security. The Linux platform has more security algorithms implemented than the Windows (XP) platform, and can achieve better performance in most experiments of IPv6 and IPv4-based DICOM-image communications. In teleradiology or enterprise-PACS applications, the Linux operating system may be the better choice as peer security gateways for both the IPsec and the SSL/TLS-based secure DICOM communications cross public networks.

  19. Theory and practice of perceptual video processing in broadcast encoders for cable, IPTV, satellite, and internet distribution

    McCarthy, S.

    2014-02-01

    This paper describes the theory and application of a perceptually-inspired video processing technology that was recently incorporated into professional video encoders now being used by major cable, IPTV, satellite, and internet video service providers. We will present data that show that this perceptual video processing (PVP) technology can improve video compression efficiency by up to 50% for MPEG-2, H.264, and High Efficiency Video Coding (HEVC). The PVP technology described in this paper works by forming predicted eye-tracking attractor maps that indicate how likely it might be that a free viewing person would look at particular area of an image or video. We will introduce in this paper the novel model and supporting theory used to calculate the eye-tracking attractor maps. We will show how the underlying perceptual model was inspired by electrophysiological studies of the vertebrate retina, and will explain how the model incorporates statistical expectations about natural scenes as well as a novel method for predicting error in signal estimation tasks. Finally, we will describe how the eye-tracking attractor maps are created in real time and used to modify video prior to encoding so that it is more compressible but not noticeably different than the original unmodified video.

  20. Comparative study of Internet of Things infrastructure and security

    Singh, Bhupjit; Kaur, Bipjeet

    With increasing use of IoTs in diverse fields has increased the demands of different parameters for high level of security, trust and applications. Several companies have invested millions of dollar to fulfill the needs of the market which has given rise variant infrastructures of IoTs. In this p...

  1. Street racing video games and risk-taking driving: An Internet survey of automobile enthusiasts.

    Vingilis, Evelyn; Seeley, Jane; Wiesenthal, David L; Wickens, Christine M; Fischer, Peter; Mann, Robert E

    2013-01-01

    The purpose of this study was to examine the relationships among risky driving attitudes, self-perceptions as a risky driver, playing of "drive'em up" (which rewarded players for frequent traffic and other violations) and "circuit" racing video games as well as self-reported risky driving through a web-based survey of car and racing club members in relation to a socio-cognitive model of the effects of racing video game playing. An Internet questionnaire was developed and included: (1) self-perceptions as a risky driver scales (Driver Thrill Seeking and Competitive Attitude Toward Driving); (2) attitudes regarding street racing; (3) street racing video game playing, and (4) self-reported risky driving (Risk-Taking Driving Scale). A sequential logistic regression was performed entering age and driving exposure as control variables in the first block, self-perceptions as a risky driver in the second block, attitudes in the third block and playing "drive'em up" and "circuit" racing games in the last block to examine their effects on self-reported risk-taking driving. A total of 503 survey respondents were included in the analyses and only 20% reported any risk-taking driving. Higher score on the Competitive Attitude Toward Driving Scale, more positive attitudes toward street racing, and more frequent reported playing of "drive'em up" video games were associated with higher odds on the self-reported Risk-Taking Driving Scale. However, the Driver Thrill Seeking Scale and "circuit" video game playing failed to predict self-reported risk-taking driving. Self-perceptions as a risky driver, positive attitudes toward risky driving and "drive'em up" street-racing games, but not "circuit" racing games, are associated with increased risk-taking driving. These findings are congruent with experimental studies in which games that reward driving violations increased risk taking, suggesting that risk taking may be a function of type of street racing game played by affecting self

  2. Real-time video streaming of sonographic clips using domestic internet networks and free videoconferencing software.

    Liteplo, Andrew S; Noble, Vicki E; Attwood, Ben H C

    2011-11-01

    As the use of point-of-care sonography spreads, so too does the need for remote expert over-reading via telesonogrpahy. We sought to assess the feasibility of using familiar, widespread, and cost-effective existent technology to allow remote over-reading of sonograms in real time and to compare 4 different methods of transmission and communication for both the feasibility of transmission and image quality. Sonographic video clips were transmitted using 2 different connections (WiFi and 3G) and via 2 different videoconferencing modalities (iChat [Apple Inc, Cupertino, CA] and Skype [Skype Software Sàrl, Luxembourg]), for a total of 4 different permutations. The clips were received at a remote location and recorded and then scored by expert reviewers for image quality, resolution, and detail. Wireless transmission of sonographic clips was feasible in all cases when WiFi was used and when Skype was used over a 3G connection. Images transmitted via a WiFi connection were statistically superior to those transmitted via 3G in all parameters of quality (average P = .031), and those sent by iChat were superior to those sent by Skype but not statistically so (average P = .057). Wireless transmission of sonographic video clips using inexpensive hardware, free videoconferencing software, and domestic Internet networks is feasible with retention of image quality sufficient for interpretation. WiFi transmission results in greater image quality than transmission by a 3G network.

  3. Optimization of radiation sensors for a passive terahertz video camera for security applications

    Zieger, G.J.M.

    2014-01-01

    A passive terahertz video camera allows for fast security screenings from distances of several meters. It avoids irradiation or the impressions of nakedness, which oftentimes cause embarrassment and trepidation of the concerned persons. This work describes the optimization of highly sensitive

  4. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers

    Freyberger Michael

    2018-04-01

    Full Text Available An important line of privacy research is investigating the design of systems for secure input and output (I/O within Internet browsers. These systems would allow for users’ information to be encrypted and decrypted by the browser, and the specific web applications will only have access to the users’ information in encrypted form. The state-of-the-art approach for a secure I/O system within Internet browsers is a system called ShadowCrypt created by UC Berkeley researchers [23]. This paper will explore the limitations of ShadowCrypt in order to provide a foundation for the general principles that must be followed when designing a secure I/O system within Internet browsers. First, we developed a comprehensive UI attack that cannot be mitigated with popular UI defenses, and tested the efficacy of the attack through a user study administered on Amazon Mechanical Turk. Only 1 of the 59 participants who were under attack successfully noticed the UI attack, which validates the stealthiness of the attack. Second, we present multiple attack vectors against Shadow-Crypt that do not rely upon UI deception. These attack vectors expose the privacy weaknesses of Shadow DOM—the key browser primitive leveraged by ShadowCrypt. Finally, we present a sketch of potential countermeasures that can enable the design of future secure I/O systems within Internet browsers.

  6. Security analysis and improvements of authentication and access control in the Internet of Things.

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  7. OBSTACLES TO ONLINE SHOPPING: IMPACT OF GENDER AND INTERNET SECURITY ISSUES

    AHU GENİS-GRUBER

    2013-06-01

    Full Text Available In the latest technology era, the widespread usage of internet enabled individuals to interact continuously and led to altered buying behavior patterns. Literature focuses on the critical effects in the field. Among many antecedents to online shopping, previous studies point out two important obstacles:  (i acceptance and tendency to use technology in accordance with gender perceptions and (ii internet security problems. This study analyzes the impact of these two prominent factors on e-commerce utilization by studying the effects of these factors through primary and secondary data; a survey designed specifically for this analysis and the cross-country data from Eurostat. The findings show that while internet security problems significantly impact online shopping behavior, the evidence is mixed for the impact of gender. The results of this paper provide insights for a successful e-commerce transaction and identify important obstacles to be avoided for an efficient e-commerce system.

  8. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  9. Secure Web-based Ground System User Interfaces over the Open Internet

    Langston, James H.; Murray, Henry L.; Hunt, Gary R.

    1998-01-01

    A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

  10. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  11. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  12. Privacy Information Security Classification for Internet of Things Based on Internet Data

    Lu, Xiaofeng; Qu, Zhaowei; Li, Qi; Hui, Pan

    2015-01-01

    A lot of privacy protection technologies have been proposed, but most of them are independent and aim at protecting some specific privacy. There is hardly enough deep study into the attributes of privacy. To minimize the damage and influence of the privacy disclosure, the important and sensitive privacy should be a priori preserved if all privacy pieces cannot be preserved. This paper focuses on studying the attributes of the privacy and proposes privacy information security classification (P...

  13. On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things

    Yu, Hong; He, Jingsha; Liu, Ruohong; Ji, Dajie

    2013-01-01

    In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. H...

  14. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness....... Pervasive usage of such systems gives substantial powers to those monitoring the videos and poses a threat to the privacy of anyone observed by the system. Aside from protecting privacy from the outside attackers, it is equally important to protect the privacy of individuals from the inside personnel...... involved in monitoring surveillance data to minimize the chances of misuse of the system, e.g. voyeurism. In this context, several techniques to protect the privacy of individuals, called privacy enhancing techniques (PET) have therefore been proposed in the literature which detect and mask the privacy...

  15. Safeguarding the User - Developing a Multimodal Design for Surveying and Raising Internet Safety and Security Awareness

    Gjedde, Lisa; Sharp, Robin; Andersen, Preben

    2009-01-01

    Internet safety and security for the user is an issue of great importance for the successful implementation of ICT, but since it is a complex field, with a specialist vocabulary that cannot immediately be understood by the common user, it is difficult to survey the field. The user may not underst......Internet safety and security for the user is an issue of great importance for the successful implementation of ICT, but since it is a complex field, with a specialist vocabulary that cannot immediately be understood by the common user, it is difficult to survey the field. The user may...... describes an ICT-based research method that combines a verbal mode of inquiry with a visual mode employing illustrations, animations and simulations to provide the user with a multimodal media experience. The rationale for this is that we are working in a complex technical field with a specialist vocabulary...

  16. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    2010-09-01

    motivated research in behavior grading systems [56]. Peer-to-peer eCommerce appli- cations such as eBay, Amazon, uBid, and Yahoo have performed research that...Security in Mobile Ad Hoc Networks”. IEEE Security & Privacy , 72–75, 2008. 15. Chakeres, ID and EM Belding-Royer. “AODV Routing Protocol Implementa...Detection System”. Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy , 240–250. 1992. 21. Devore, J.L. and N.R. Farnum

  17. In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security

    Danidou, Yianna; Schafer, Burkhard

    This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.

  18. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  19. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  20. THE RELATIONSHIP BETWEEN INTERNET ADDICTION AND ALCOHOL CONSUMPTION IS INFLUENCED BY THE SMOKING STATUS IN MALE ONLINE VIDEO GAMERS

    Marko Müller

    2017-02-01

    Full Text Available Objective: Mounting evidence suggests a putative link between overuse of digital media and easily accessible drugs such as alcohol and nicotine. Method: We assessed Internet addiction tendencies in a sample of N=1,362 male players of online first-person-shooter-video games. We used Young’s 20-item Internet addiction test (IAT. We also asked participants about their smoking status and alcohol consumption. Results: No significant differences were observed on the IAT between smokers, non-smokers and ex-smokers. However, in line with the majority of the literature, the results yielded support for a link between Internet addiction and alcohol consumption. Of importance, this correlation was influenced by the current smoking status. This relationship was especially pronounced for the group of ex-smokers. Conclusions: It is possible that after quitting smoking, drinking habits and online activities may be used to compensate for nicotine abstinence.

  1. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  2. A Quantitative Study on Japanese Internet User's Awareness to Information Security: Necessity and Importance of Education and Policy

    Toshihiko Takemura; Atsushi Umino

    2009-01-01

    In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the in...

  3. Prototype system of secure VOD

    Minemura, Harumi; Yamaguchi, Tomohisa

    1997-12-01

    Secure digital contents delivery systems are to realize copyright protection and charging mechanism, and aim at secure delivery service of digital contents. Encrypted contents delivery and history (log) management are means to accomplish this purpose. Our final target is to realize a video-on-demand (VOD) system that can prevent illegal usage of video data and manage user history data to achieve a secure video delivery system on the Internet or Intranet. By now, mainly targeting client-server systems connected with enterprise LAN, we have implemented and evaluated a prototype system based on the investigation into the delivery method of encrypted video contents.

  4. Internet

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  5. Ultra-Low-Power Design and Hardware Security Using Emerging Technologies for Internet of Things

    Jiann-Shiun Yuan

    2017-09-01

    Full Text Available In this review article for Internet of Things (IoT applications, important low-power design techniques for digital and mixed-signal analog–digital converter (ADC circuits are presented. Emerging low voltage logic devices and non-volatile memories (NVMs beyond CMOS are illustrated. In addition, energy-constrained hardware security issues are reviewed. Specifically, light-weight encryption-based correlational power analysis, successive approximation register (SAR ADC security using tunnel field effect transistors (FETs, logic obfuscation using silicon nanowire FETs, and all-spin logic devices are highlighted. Furthermore, a novel ultra-low power design using bio-inspired neuromorphic computing and spiking neural network security are discussed.

  6. Sexually Explicit Media on the Internet: A Content Analysis of Sexual Behaviors, Risk, and Media Characteristics in Gay Male Adult Videos

    Downing, Martin J.; Schrimshaw, Eric W.; Antebi, Nadav; Siegel, Karolynn

    2013-01-01

    Recent research suggests that viewing sexually explicit media (SEM), i.e., adult videos, may influence sexual risk taking among men who have sex with men (MSM). Despite this evidence, very little is known about the content of gay male SEM on the Internet, including the prevalence of sexual risk behaviors and their relation to video- and performer-characteristics, viewing frequency, and favorability. The current study content analyzed 302 sexually explicit videos featuring male same-sex perfor...

  7. Internet video telephony allows speech reading by deaf individuals and improves speech perception by cochlear implant users.

    Georgios Mantokoudis

    Full Text Available OBJECTIVE: To analyze speech reading through Internet video calls by profoundly hearing-impaired individuals and cochlear implant (CI users. METHODS: Speech reading skills of 14 deaf adults and 21 CI users were assessed using the Hochmair Schulz Moser (HSM sentence test. We presented video simulations using different video resolutions (1280 × 720, 640 × 480, 320 × 240, 160 × 120 px, frame rates (30, 20, 10, 7, 5 frames per second (fps, speech velocities (three different speakers, webcameras (Logitech Pro9000, C600 and C500 and image/sound delays (0-500 ms. All video simulations were presented with and without sound and in two screen sizes. Additionally, scores for live Skype™ video connection and live face-to-face communication were assessed. RESULTS: Higher frame rate (>7 fps, higher camera resolution (>640 × 480 px and shorter picture/sound delay (<100 ms were associated with increased speech perception scores. Scores were strongly dependent on the speaker but were not influenced by physical properties of the camera optics or the full screen mode. There is a significant median gain of +8.5%pts (p = 0.009 in speech perception for all 21 CI-users if visual cues are additionally shown. CI users with poor open set speech perception scores (n = 11 showed the greatest benefit under combined audio-visual presentation (median speech perception +11.8%pts, p = 0.032. CONCLUSION: Webcameras have the potential to improve telecommunication of hearing-impaired individuals.

  8. Trends in Scientific Literature on Addiction to the Internet, Video Games, and Cell Phones from 2006 to 2010.

    Carbonell, Xavier; Guardiola, Elena; Fuster, Héctor; Gil, Frederic; Panova, Tayana

    2016-01-01

    The goals of the present work were to retrieve the scientific articles published on addiction to the Internet, video games, and cell phones and to analyze the pattern of publications in this area (who is doing the research, when and where it is taking place, and in which journals it is being published), to determine the research being conducted as well as to document geographical trends in publication over time in three types of technological addictions: Internet, cell phones, and video games. Articles indexed in PubMed and PsycINFO between 2006 and 2010 related to the pathological use of Internet, cell phones, and video games were retrieved. Search results were reviewed to eliminate articles that were not relevant or were duplicates. Three hundred and thirty valid articles were retrieved from PubMed and PsycINFO from 2006 to 2010. Results were compared with those of 1996-2005. The year with the highest number of articles published was 2008 (n = 96). The most productive countries, in terms of number of articles published, were China (n = 67), the United States (n = 56), the United Kingdom (n = 47), and Taiwan (n = 33). The most commonly used language was English (70.3%), followed by Chinese (15.4%). Articles were published in 153 different journals. The journal that published the most articles was Cyberpsychology and Behavior (n = 73), followed by Chinese Journal of Clinical Psychology (n = 27) and International Journal of Mental Health and Addiction (n = 16). Internet was the area most frequently studied, with an increasing interest in other areas such as online video games and cell phones. The number of publications on technological addictions reached a peak in 2008. The scientific contributions of China, Taiwan, and Korea are overrepresented compared to other scientific fields such as drug addiction. The inclusion of Internet Gaming Disorder in the Diagnostic and Statistical Manual of Mental Disorders, 5(th) Edition could change the publication trends in the

  9. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  10. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  11. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  12. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

    Emanuel Ferreira Jesus

    2018-01-01

    Full Text Available The Internet of Things (IoT is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.

  13. The Internet and Security: Do We need a Man With A Red Flag To Walk In Front of Computers?

    Edwards, Lilian

    2007-01-01

    This editorial focusses on the topic of internet security; its real, or perceived threats to individuals, and the regulatory framework in place to deal with cybercrime. Edwards suggests some obligations for computer owners as an attempt to ensure the security of their computer.

  14. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  15. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  16. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System

    V. A. Alexandrov

    2016-01-01

    Full Text Available This paper comprises the development and implementation of systems using the concept of Internet of Things. In terms of active development of industries, use the concept of the Internet of Things, the information security problem is urgent. To create a protected module of information-telecommunication system which implements the Internet of Things concept, it is important to take into account all its aspects. To determine relevant threats, it is necessary to use the detailed risk analysis according to existing GOST standards when choosing protection measures, one must rely on identified relevant threats. Actual threats and necessary protective actions are determined in this paper for implementation of Smart House computer appliance module, in order to develop a protected part of Smart House, which is necessary for realization of room access control. We solved the following tasks in the work, namely, a description of the system Smart Home, a description of steps and evaluation system security Smart Home; implementation of hardware assembly and writing a code for the selected fragment of the system; safety evaluation of the selected fragment Smart House and identification of actual threats; make recommendations to counter current threats; software implementation of one of the most urgent threats and software implementation of protective measures for a selected threat. A feature of the work is an integrated approach to the design with the use of the intruder models, analysis of the system’s assets and evaluation of their security.

  17. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  18. Network Security Issues in The Internet of Things (IoT)

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  19. Using innovation from block chain technology to address privacy and security problems of Internet of Things

    Manocha, Jitendra

    2017-01-01

    Internet of things (IoT) is growing at a phenomenal speed and outpacing all the technological revolutions that occurred in the past. Together with window of opportunity it also poses quite a few challenges. One of the most important and unresolved challenge is vulnerability in security and privacy in IoT. This is mainly due to lack of a global decentralized standard even though characteristically IoT is based on distributed systems. Due to lack of standard IoT has interoperability issue betwe...

  20. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  1. The energy and greenhouse-gas implications of internet video streaming in the United States

    Shehabi, Arman; Walker, Ben; Masanet, Eric

    2014-01-01

    The rapid growth of streaming video entertainment has recently received attention as a possibly less energy intensive alternative to the manufacturing and transportation of digital video discs (DVDs). This study utilizes a life-cycle assessment approach to estimate the primary energy use and greenhouse-gas emissions associated with video viewing through both traditional DVD methods and online video streaming. Base-case estimates for 2011 video viewing energy and CO 2 (e) emission intensities indicate video streaming can be more efficient than DVDs, depending on DVD viewing method. Video streaming benefits from relatively more efficient end-user devices than DVD viewing, though much of that savings is lost when accounting for the additional energy from network data transmission. Video streaming appears distinctly favorable when compared against any DVD viewing that includes consumer driving, which significantly increases the energy and CO 2 (e) emissions per viewing hour. Total US 2011 video viewing required about 192 PJ of primary energy and emitted about 10.5 billion kg of CO 2 (e). Shifting all 2011 DVD viewing to video streaming reduces the total primary energy use to about 162 PJ and the CO 2 (e) emissions to about 8.6 billion kg, representing a savings equivalent to the primary energy used to meet the electricity demand of nearly 200 000 US households each year. Sensitivity analysis indicates that results are most influenced by the end-user DVD player power demand, data transmission energy, and consumer travel for store DVDs. Data center energy use—both operational and embodied within the IT equipment—account for <1% of the total video streaming energy use. Results from this study indicate that designers and policy makers should focus on the efficiency of end-user devices and network transmission energy to curb future increases in energy use from the proliferation of video streaming. (letters)

  2. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things

    Chen Wang

    2018-01-01

    Full Text Available Internet of Things (IoT is a research field that has been continuously developed and innovated in recent years and is also an important driving force for the improvement of people’s life in the future. There are lots of scenarios in IoT where we need to collaborate through devices to complete tasks; that is, a device sends data to other devices, and other devices operate on the aid of the data. These transmitted data are often users’ privacy data, such as medical data and grid data. We propose an instant encrypted transmission based security scheme for such scenarios in IoT. The analysis in this paper indicates that our scheme can guarantee the security of users’ data while ensuring rapid transmission and acquisition of instant IoT data.

  3. Secure and privacy-preserving data communication in Internet of Things

    Zhu, Liehuang; Xu, Chang

    2017-01-01

    This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.

  4. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  5. 77 FR 19479 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    2012-03-30

    ... devices designed to receive and play back video programming, including smartphones, tablets, personal... it could rely on video programming distributors or providers working with program suppliers with whom... VPD to obtain required captions. We also disagree with MPAA and Time Warner that extending the...

  6. Internet Video Telephony Allows Speech Reading by Deaf Individuals and Improves Speech Perception by Cochlear Implant Users

    Mantokoudis, Georgios; Dähler, Claudia; Dubach, Patrick; Kompis, Martin; Caversaccio, Marco D.; Senn, Pascal

    2013-01-01

    Objective To analyze speech reading through Internet video calls by profoundly hearing-impaired individuals and cochlear implant (CI) users. Methods Speech reading skills of 14 deaf adults and 21 CI users were assessed using the Hochmair Schulz Moser (HSM) sentence test. We presented video simulations using different video resolutions (1280×720, 640×480, 320×240, 160×120 px), frame rates (30, 20, 10, 7, 5 frames per second (fps)), speech velocities (three different speakers), webcameras (Logitech Pro9000, C600 and C500) and image/sound delays (0–500 ms). All video simulations were presented with and without sound and in two screen sizes. Additionally, scores for live Skype™ video connection and live face-to-face communication were assessed. Results Higher frame rate (>7 fps), higher camera resolution (>640×480 px) and shorter picture/sound delay (<100 ms) were associated with increased speech perception scores. Scores were strongly dependent on the speaker but were not influenced by physical properties of the camera optics or the full screen mode. There is a significant median gain of +8.5%pts (p = 0.009) in speech perception for all 21 CI-users if visual cues are additionally shown. CI users with poor open set speech perception scores (n = 11) showed the greatest benefit under combined audio-visual presentation (median speech perception +11.8%pts, p = 0.032). Conclusion Webcameras have the potential to improve telecommunication of hearing-impaired individuals. PMID:23359119

  7. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    2011-09-28

    ... words, captions may identify speakers, sound effects, music, and laughter.\\23\\ \\19\\ See Closed... captioning increased somewhat, through the voluntary efforts of the video programming industry.\\26\\ As the...

  8. Integrated homeland security system with passive thermal imaging and advanced video analytics

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  9. Association between Internet Gaming Disorder or Pathological Video-Game Use and Comorbid Psychopathology: A Comprehensive Review.

    González-Bueso, Vega; Santamaría, Juan José; Fernández, Daniel; Merino, Laura; Montero, Elena; Ribas, Joan

    2018-04-03

    The addictive use of video games is recognized as a problem with clinical relevance and is included in international diagnostic manuals and classifications of diseases. The association between "Internet addiction" and mental health has been well documented across a range of investigations. However, a major drawback of these studies is that no controls have been placed on the type of Internet use investigated. The aim of this study is to review systematically the current literature in order to explore the association between Internet Gaming Disorder (IGD) and psychopathology. An electronic literature search was conducted using PubMed, PsychINFO, ScienceDirect, Web of Science and Google Scholar (r.n. CRD42018082398). The effect sizes for the observed correlations were identified or computed. Twenty-four articles met the eligibility criteria. The studies included comprised 21 cross-sectional and three prospective designs. Most of the research was conducted in Europe. The significant correlations reported comprised: 92% between IGD and anxiety, 89% with depression, 85% with symptoms of attention deficit hyperactivity disorder (ADHD), and 75% with social phobia/anxiety and obsessive-compulsive symptoms. Most of the studies reported higher rates of IGD in males. The lack of longitudinal studies and the contradictory results obtained prevent detection of the directionality of the associations and, furthermore, show the complex relationship between both phenomena.

  10. Association between Internet Gaming Disorder or Pathological Video-Game Use and Comorbid Psychopathology: A Comprehensive Review

    González-Bueso, Vega; Santamaría, Juan José; Merino, Laura; Montero, Elena; Ribas, Joan

    2018-01-01

    The addictive use of video games is recognized as a problem with clinical relevance and is included in international diagnostic manuals and classifications of diseases. The association between “Internet addiction” and mental health has been well documented across a range of investigations. However, a major drawback of these studies is that no controls have been placed on the type of Internet use investigated. The aim of this study is to review systematically the current literature in order to explore the association between Internet Gaming Disorder (IGD) and psychopathology. An electronic literature search was conducted using PubMed, PsychINFO, ScienceDirect, Web of Science and Google Scholar (r.n. CRD42018082398). The effect sizes for the observed correlations were identified or computed. Twenty-four articles met the eligibility criteria. The studies included comprised 21 cross-sectional and three prospective designs. Most of the research was conducted in Europe. The significant correlations reported comprised: 92% between IGD and anxiety, 89% with depression, 85% with symptoms of attention deficit hyperactivity disorder (ADHD), and 75% with social phobia/anxiety and obsessive-compulsive symptoms. Most of the studies reported higher rates of IGD in males. The lack of longitudinal studies and the contradictory results obtained prevent detection of the directionality of the associations and, furthermore, show the complex relationship between both phenomena. PMID:29614059

  11. Association between Internet Gaming Disorder or Pathological Video-Game Use and Comorbid Psychopathology: A Comprehensive Review

    Vega González-Bueso

    2018-04-01

    Full Text Available The addictive use of video games is recognized as a problem with clinical relevance and is included in international diagnostic manuals and classifications of diseases. The association between “Internet addiction” and mental health has been well documented across a range of investigations. However, a major drawback of these studies is that no controls have been placed on the type of Internet use investigated. The aim of this study is to review systematically the current literature in order to explore the association between Internet Gaming Disorder (IGD and psychopathology. An electronic literature search was conducted using PubMed, PsychINFO, ScienceDirect, Web of Science and Google Scholar (r.n. CRD42018082398. The effect sizes for the observed correlations were identified or computed. Twenty-four articles met the eligibility criteria. The studies included comprised 21 cross-sectional and three prospective designs. Most of the research was conducted in Europe. The significant correlations reported comprised: 92% between IGD and anxiety, 89% with depression, 85% with symptoms of attention deficit hyperactivity disorder (ADHD, and 75% with social phobia/anxiety and obsessive-compulsive symptoms. Most of the studies reported higher rates of IGD in males. The lack of longitudinal studies and the contradictory results obtained prevent detection of the directionality of the associations and, furthermore, show the complex relationship between both phenomena.

  12. Security and Privacy in the Medical Internet of Things: A Review

    Wencheng Sun

    2018-01-01

    Full Text Available Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. Instead of going to the hospital for help, patients’ health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare. The amount of data handled by MIoT devices grows exponentially, which means higher exposure of sensitive data. The security and privacy of the data collected from MIoT devices, either during their transmission to a cloud or while stored in a cloud, are major unsolved concerns. This paper focuses on the security and privacy requirements related to data flow in MIoT. In addition, we make in-depth study on the existing solutions to security and privacy issues, together with the open challenges and research issues for future work.

  13. Video Encryption-A Survey

    Jolly Shah; Vikas Saxena

    2011-01-01

    Multimedia data security is becoming important with the continuous increase of digital communications on internet. The encryption algorithms developed to secure text data are not suitable for multimedia application because of the large data size and real time constraint. In this paper, classification and description of various video encryption algorithms are presented. Analysis and Comparison of these algorithms with respect to various parameters like visual degradation, encryption ratio, spe...

  14. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  15. To the Question of Information Security and Providing State and Municipal Services by Means of the Internet

    Alexander A. Galushkin

    2015-09-01

    Full Text Available In the present article author investigates interconnected questions of information security and providing state and municipal services by means of the global information Internet. Author analyzes opinions of the number of leading Russian and foreign experts and scientists. In the summary author draws a conclusion that implementation of rules of law answering to modern realities and also fruitful work of law enforcement and supervisory authorities regarding law application practice improvement is necessary for information security and human rights protection.

  16. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  17. Internet

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  18. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    2013-09-05

    ... Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed... reply comments. On August 14, 2013, Telecommunications for the Deaf and Hard of Hearing, Inc. (TDI) et..., and 1.46, the Motion for Extension of Time filed by Telecommunications for the Deaf and Hard of...

  19. Perancangan Dan Pembuatan Pengamanan Video Chat Dengan Menggunakan Metode Enkripsi RC4

    Putra, Stevie Suwanto; Budhi, Gregorius Satia; Andjarwirawan, Justinus

    2015-01-01

    Technological development at this time has been growing rapidly with the internet. Along with the development the more the usefulness of the Internet. Not only used for browsing, now the Internet is also used for communication. Such as email, chat, and etc. The increasing development of communication technology, then people start to think about the secure of the communication technology. As in a video chat, only the person entitled to know the information in the video chat. But the encryption...

  20. Sexually explicit media on the internet: a content analysis of sexual behaviors, risk, and media characteristics in gay male adult videos.

    Downing, Martin J; Schrimshaw, Eric W; Antebi, Nadav; Siegel, Karolynn

    2014-05-01

    Recent research suggests that viewing sexually explicit media (SEM), i.e., adult videos, may influence sexual risk taking among men who have sex with men. Despite this evidence, very little is known about the content of gay male SEM on the Internet, including the prevalence of sexual risk behaviors and their relation to video- and performer-characteristics, viewing frequency, and favorability. The current study content analyzed 302 sexually explicit videos featuring male same-sex performers that were posted to five highly trafficked adult-oriented websites. Findings revealed that gay male SEM on the Internet features a variety of conventional and nonconventional sexual behaviors. There was a substantial prevalence of unprotected anal intercourse (UAI) (34 %) and was virtually the same as the prevalence of anal sex with a condom (36 %). The presence of UAI was not associated with video length, amateur production, number of video views, favorability, or website source. However, the presence of other potentially high-risk behaviors (e.g., ejaculation in the mouth, and ejaculation on/in/rubbed into the anus) was associated with longer videos, more views, and group sex videos (three or more performers). The findings of high levels of sexual risk behavior and the fact that there was virtually no difference in the prevalence of anal sex with and without a condom in gay male SEM have important implications for HIV prevention efforts, future research on the role of SEM on sexual risk taking, and public health policy.

  1. Broadcasting Engineering Laboratories--Audio/Video and Data--in Real-Time over the Internet

    Jain, Prashant K.; Gu, Yuxiang; Rizwan-uddin

    2008-01-01

    Internet extends the reach of existing laboratory and training infrastructure to beyond the walls of such facilities. Though nothing can replace the hands-on experience in a laboratory; a carefully developed web-based digital lab may be the next best thing. In some cases, there may be benefits associated with a "distance laboratory" that…

  2. Bla-bla-bla: video chat service on the Internet, a market feasibility study

    Lindgreen, A.; Antioco, M.D.J.; Wetzels, M.G.M.

    2004-01-01

    The Internet is changing the way that companies carry out their business and, in fact, constitutes an entirely new application domain, which makes product innovation possible. Moreover, it is a new medium for reaching consumers, which is a central preoccupation to organisations in the current

  3. Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning

    Marcin Piotr Pawlowski

    2015-01-01

    Full Text Available Internet of Things security is one of the most challenging parts of the domain. Combining strong cryptography and lifelong security with highly constrained devices under conditions of limited energy consumption and no maintenance time is extremely difficult task. This paper presents an approach that combines authentication and bootstrapping protocol (TEPANOM with Extensible Authentication Protocol (EAP framework optimized for the IEEE 802.15.4 networks. The solution achieves significant reduction of network resource usage. Additionally, by application of EAP header compacting approach, further network usage savings have been reached. The EAP-TEPANOM solution has achieved substantial reduction of 42% in the number of transferred packets and 35% reduction of the transferred data. By application of EAP header compaction, it has been possible to achieve up to 80% smaller EAP header. That comprises further reduction of transferred data for 3.84% for the EAP-TEPANOM method and 10% for the EAP-TLS-ECDSA based methods. The results have placed the EAP-TEPANOM method as one of the most lightweight EAP methods from ones that have been tested throughout this research, making it feasible for large scale deployments scenarios of IoT.

  4. Internet-Based Solutions for a Secure and Efficient Seismic Network

    Bhadha, R.; Black, M.; Bruton, C.; Hauksson, E.; Stubailo, I.; Watkins, M.; Alvarez, M.; Thomas, V.

    2017-12-01

    The Southern California Seismic Network (SCSN), operated by Caltech and USGS, leverages modern Internet-based computing technologies to provide timely earthquake early warning for damage reduction, event notification, ShakeMap, and other data products. Here we present recent and ongoing innovations in telemetry, security, cloud computing, virtualization, and data analysis that have allowed us to develop a network that runs securely and efficiently.Earthquake early warning systems must process seismic data within seconds of being recorded, and SCSN maintains a robust and resilient network of more than 350 digital strong motion and broadband seismic stations to achieve this goal. We have continued to improve the path diversity and fault tolerance within our network, and have also developed new tools for latency monitoring and archiving.Cyberattacks are in the news almost daily, and with most of our seismic data streams running over the Internet, it is only a matter of time before SCSN is targeted. To ensure system integrity and availability across our network, we have implemented strong security, including encryption and Virtual Private Networks (VPNs).SCSN operates its own data center at Caltech, but we have also installed real-time servers on Amazon Web Services (AWS), to provide an additional level of redundancy, and eventually to allow full off-site operations continuity for our network. Our AWS systems receive data from Caltech-based import servers and directly from field locations, and are able to process the seismic data, calculate earthquake locations and magnitudes, and distribute earthquake alerts, directly from the cloud.We have also begun a virtualization project at our Caltech data center, allowing us to serve data from Virtual Machines (VMs), making efficient use of high-performance hardware and increasing flexibility and scalability of our data processing systems.Finally, we have developed new monitoring of station average noise levels at most stations

  5. Host based internet protocol (IP) packet analysis to enhance network security

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  6. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, Pdifferences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  7. Adaptive Content Management for UGC Video Delivery in Mobile Internet Era

    Qilin Fan

    2016-01-01

    Full Text Available The demand of storing and transferring user generated content (UGC has been rapidly growing with the popularization of mobile devices equipped with video recording and playback capabilities. As a typical application of software-defined networks/network functions virtualization-based pervasive communications infrastructure, content delivery networks (CDNs have been widely leveraged to distribute contents across different geographical locations. Nevertheless, the content delivery for UGC is inefficient with the existing “pull-based” caching mechanism in traditional CDNs, because there exists a huge volume of lukewarm or cold UGC which results in a low cache hit ratio. In this paper, we propose a “push-based” caching mechanism to efficiently and economically deliver UGC videos. Different from traditional CDNs which separate the original content storage and caching, we directly store UGC videos into selective servers which serve as both reliable storages and user-facing uploading servers. By carefully and dynamically selecting the storage locations of each UGC object based on its popularity and locality, we not only guarantee the data availability but also remarkably improve the content distribution performance and reduce the distribution cost.

  8. Violence exposure in real-life, video games, television, movies, and the internet: is there desensitization?

    Funk, Jeanne B; Baldacci, Heidi Bechtoldt; Pasold, Tracie; Baumgardner, Jennifer

    2004-02-01

    It is believed that repeated exposure to real-life and to entertainment violence may alter cognitive, affective, and behavioral processes, possibly leading to desensitization. The goal of the present study was to determine if there are relationships between real-life and media violence exposure and desensitization as reflected in related characteristics. One hundred fifty fourth and fifth graders completed measures of real-life violence exposure, media violence exposure, empathy, and attitudes towards violence. Regression analyses indicated that only exposure to video game violence was associated with (lower) empathy. Both video game and movie violence exposure were associated with stronger proviolence attitudes. The active nature of playing video games, intense engagement, and the tendency to be translated into fantasy play may explain negative impact, though causality was not investigated in the present design. The samples' relatively low exposure to real-life violence may have limited the identification of relationships. Although difficult to quantify, desensitization to violence should be further studied using related characteristics as in the present study. Individual differences and causal relationships should also be examined.

  9. Leadership and New Technologies. New Security Issues for Management of Internet Connectivity and Remote Control in Automotive Industry

    Cosmin Cătălin Olteanu

    2015-05-01

    Full Text Available The main purpose of the paper is to illustrate the importance of implementing new security policies for infotainment systems in automotive industry. A car is full of technology and is easier today to control car systems through an internet connection linked to car system infotainment. This is how it is possible to gain control of critical car systems. More than 84% of users doesn’t even know the risk of remote control of the car in the presence of Internet connection.

  10. A NoSQL–SQL Hybrid Organization and Management Approach for Real-Time Geospatial Data: A Case Study of Public Security Video Surveillance

    Chen Wu

    2017-01-01

    Full Text Available With the widespread deployment of ground, air and space sensor sources (internet of things or IoT, social networks, sensor networks, the integrated applications of real-time geospatial data from ubiquitous sensors, especially in public security and smart city domains, are becoming challenging issues. The traditional geographic information system (GIS mostly manages time-discretized geospatial data by means of the Structured Query Language (SQL database management system (DBMS and emphasizes query and retrieval of massive historical geospatial data on disk. This limits its capability for on-the-fly access of real-time geospatial data for online analysis in real time. This paper proposes a hybrid database organization and management approach with SQL relational databases (RDB and not only SQL (NoSQL databases (including the main memory database, MMDB, and distributed files system, DFS. This hybrid approach makes full use of the advantages of NoSQL and SQL DBMS for the real-time access of input data and structured on-the-fly analysis results which can meet the requirements of increased spatio-temporal big data linking analysis. The MMDB facilitates real-time access of the latest input data such as the sensor web and IoT, and supports the real-time query for online geospatial analysis. The RDB stores change information such as multi-modal features and abnormal events extracted from real-time input data. The DFS on disk manages the massive geospatial data, and the extensible storage architecture and distributed scheduling of a NoSQL database satisfy the performance requirements of incremental storage and multi-user concurrent access. A case study of geographic video (GeoVideo surveillance of public security is presented to prove the feasibility of this hybrid organization and management approach.

  11. Smartphone-based secure authenticated session sharing in Internet of Personal Things

    Krishnan, Ram; Ninglekhu, Jiwan

    2015-03-01

    In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.

  12. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  13. Reframing video gaming and internet use addiction: empirical cross-national comparison of heavy use over time and addiction scales among young users.

    Baggio, Stéphanie; Dupuis, Marc; Studer, Joseph; Spilka, Stanislas; Daeppen, Jean-Bernard; Simon, Olivier; Berchtold, André; Gmel, Gerhard

    2016-03-01

    Evidence-based and reliable measures of addictive disorders are needed in general population-based assessments. One study suggested that heavy use over time (UOT) should be used instead of self-reported addiction scales (AS). This study compared UOT and AS regarding video gaming and internet use empirically, using associations with comorbid factors. Cross-sectional data from the 2011 French Survey on Health and Consumption on Call-up and Preparation for Defence-Day (ESCAPAD), cross-sectional data from the 2012 Swiss ado@internet.ch study and two waves of longitudinal data (2010-13) of the Swiss Longitudinal Cohort Study on Substance Use Risk Factors (C-SURF). Three representative samples from the general population of French and Swiss adolescents and young Swiss men, aged approximately 17, 14 and 20 years, respectively. ESCAPAD: n =22 945 (47.4% men); ado@internet.ch: n =3049 (50% men); C-SURF: n =4813 (baseline + follow-up, 100% men). We assessed video gaming/internet UOT ESCAPAD and ado@internet.ch: number of hours spent online per week, C-SURF: latent score of time spent gaming/using internet] and AS (ESCAPAD: Problematic Internet Use Questionnaire, ado@internet.ch: Internet Addiction Test, C-SURF: Gaming AS). Comorbidities were assessed with health outcomes (ESCAPAD: physical health evaluation with a single item, suicidal thoughts, and appointment with a psychiatrist; ado@internet.ch: WHO-5 and somatic health problems; C-SURF: Short Form 12 (SF-12 Health Survey) and Major Depression Inventory (MDI). UOT and AS were correlated moderately (ESCAPAD: r = 0.40, ado@internet.ch: r = 0.53 and C-SURF: r = 0.51). Associations of AS with comorbidity factors were higher than those of UOT in cross-sectional (AS: .005 ≤ |b| ≤ 2.500, UOT: 0.001 ≤ |b| ≤ 1.000) and longitudinal analyses (AS: 0.093 ≤ |b| ≤ 1.079, UOT: 0.020 ≤ |b| ≤ 0.329). The results were similar across gender in ESCAPAD and ado@internet

  14. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    Cha, Shi-Cho; Chen, Jyun-Fu

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900

  15. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    Shi-Cho Cha

    2017-10-01

    Full Text Available Bluetooth Low Energy (BLE has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  16. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.

    Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu

    2017-10-14

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  17. Storage, access, and retrieval of endoscopic and laparoscopic video

    Bellaire, Gunter; Steines, Daniel; Graschew, Georgi; Thiel, Andreas; Bernarding, Johannes; Tolxdorff, Thomas; Schlag, Peter M.

    1999-05-01

    The system presented here enhances documentation and data- secured, second-opinion facilities by integrating video into DICOM3.0. Digital stereoscopic video sequences (DSVS) are especially in demand for surgery (laparoscopy, microsurgery, surgical microscopy, second opinion, virtual reality). Therefore DSVS are also integrated into the DICOM video concept. We present an implementation for a medical video server extended by a DICOM interface. Security mechanisms conforming with DICOM are integrated to enable secure internet access. Digital (stereoscopic) video sequences relevant for surgery should be examined regarding the clip length necessary for diagnosis and documentation and the clip size manageable with today's hardware. Methods for DSVS compression are described, implemented, and tested. Image sources relevant for this paper include, among others, a stereoscopic laparoscope and a monoscopic endoscope. Additionally, an approach is presented to analyze the motion of the endoscopic camera for future automatic video- cutting.

  18. European Trends in Privacy: How can we increase internet security and protect individual privacy?

    Soren Duus Ostergaard

    2004-04-01

    Full Text Available In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases through gateways has become a standard way of doing things. Legislation has been put in place which in many countries give the authorities increased right to analyze personal data ? In some cases overriding existing privacy legislation. >In a networked world everybody leaves traces that are personally individually identifiable (PII. When we use our mobile phone, the cell network provider knows the location you are in and the time of the call. When you browse a bookstore on the internet, an applet will tell the web-site owner of your buying habits - and the moment you make a purchase on the net, you leave behind a sign of your reading habits and intellectual preferences. When you use your credit card on the net to buy flowers, the address of the receiver is recorded and related to your ID. If you are under medical treatment and receive medicine, the prescription will inform about your deceases. Under which circumstances do you want this information to be revealed? Most countries as well as the European Union and its member countries have since long been aware of the potential threat against personal integrity in case a malevolent organization got hold of all this information. And now Governments in most countries are becoming increasingly interested in accessing personal information to prevent terrorism and establish an electronic surveillance of dubious elements in the society. This paper intends to describe how IT solutions with a special focus on the public sector could be developed and deployed that will help organizations as well as individuals to protect their personally identifiable information, set up policies that will be translated to watch dogs that will ensure that these policies are

  19. SEGMENTASI LAYANAN INTERNET BANKING

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  20. Prevalence of Addiction to the Internet, Computer Games, DVD, and Video and Its Relationship to Anxiety and Depression in a Sample of Iranian High School Students

    Ahmadi, Jamshid; Amiri, Amin; Ghanizadeh, Ahmad; Khademalhosseini, Mitra; Khademalhosseini, Zeinab; Gholami, Zeinab; Sharifian, Maryam

    2014-01-01

    Objective: The objective of this study was to assess the prevalence of addiction to the Internet, computer games, DVD, and video and its relationship to anxiety and depression in a sample of Iranian high school students. Methods: In this cross-sectional study 1020 high school students (males and females) were selected randomly from different areas of Shiraz city in southern Iran. They were interviewed according to the Diagnostic and Statistical Manual of Mental Disorders, 4th ed (DSM-IV) crit...

  1. Internet of Things (IoT Based Design of a Secure and Lightweight Body Area Network (BAN Healthcare System

    Yong-Yuan Deng

    2017-12-01

    Full Text Available As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT. At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN. These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  2. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-12-15

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  3. Secure transfer of surveillance data over Internet using Virtual Private Network technology. Field trial between STUK and IAEA

    Smartt, H.; Martinez, R.; Caskey, S.; Honkamaa, T.; Ilander, T.; Poellaenen, R.; Jeremica, N.; Ford, G.

    2000-01-01

    One of the primary concerns of employing remote monitoring technologies for IAEA safeguards applications is the high cost of data transmission. Transmitting data over the Internet has been shown often to be less expensive than other data transmission methods. However, data security of the Internet is often considered to be at a low level. Virtual Private Networks has emerged as a solution to this problem. A field demonstration was implemented to evaluate the use of Virtual Private Networks (via the Internet) as a means for data transmission. Evaluation points included security, reliability and cost. The existing Finnish Remote Environmental Monitoring System, located at the STUK facility in Helsinki, Finland, served as the field demonstration system. Sandia National Laboratories (SNL) established a Virtual Private Network between STUK (Radiation and Nuclear Safety Authority) Headquarters in Helsinki, Finland, and IAEA Headquarters in Vienna, Austria. Data from the existing STUK Remote Monitoring System was viewed at the IAEA via this network. The Virtual Private Network link was established in a proper manner, which guarantees the data security. Encryption was verified using a network sniffer. No problems were? encountered during the test. In the test system, fixed costs were higher than in the previous system, which utilized telephone lines. On the other hand transmission and operating costs are very low. Therefore, with low data amounts, the test system is not cost-effective, but if the data amount is tens of Megabytes per day the use of Virtual Private Networks and Internet will be economically justifiable. A cost-benefit analysis should be performed for each site due to significant variables. (orig.)

  4. A Crowd-Based Intelligence Approach for Measurable Security, Privacy, and Dependability in Internet of Automated Vehicles with Vehicular Fog

    Ashish Rauniyar

    2018-01-01

    Full Text Available With the advent of Internet of things (IoT and cloud computing technologies, we are in the era of automation, device-to-device (D2D and machine-to-machine (M2M communications. Automated vehicles have recently gained a huge attention worldwide, and it has created a new wave of revolution in automobile industries. However, in order to fully establish automated vehicles and their connectivity to the surroundings, security, privacy, and dependability always remain a crucial issue. One cannot deny the fact that such automatic vehicles are highly vulnerable to different kinds of security attacks. Also, today’s such systems are built from generic components. Prior analysis of different attack trends and vulnerabilities enables us to deploy security solutions effectively. Moreover, scientific research has shown that a “group” can perform better than individuals in making decisions and predictions. Therefore, this paper deals with the measurable security, privacy, and dependability of automated vehicles through the crowd-based intelligence approach that is inspired from swarm intelligence. We have studied three use case scenarios of automated vehicles and systems with vehicular fog and have analyzed the security, privacy, and dependability metrics of such systems. Our systematic approaches to measuring efficient system configuration, security, privacy, and dependability of automated vehicles are essential for getting the overall picture of the system such as design patterns, best practices for configuration of system, metrics, and measurements.

  5. Zephyr: A secure Internet-based process to streamline engineering procurements using the World Wide Web

    Jordan, C.W.; Cavitt, R.E.; Niven, W.A.; Warren, F.E.; Taylor, S.S.; Sharick, T.M.; Vickers, D.L.; Mitschkowetz, N.; Weaver, R.L.

    1996-08-13

    Lawrence Livermore National Laboratory (LLNL) is piloting an Internet- based paperless process called `Zephyr` to streamline engineering procurements. Major benefits have accrued by using Zephyr in reducing procurement time, speeding the engineering development cycle, facilitating industrial collaboration, and reducing overall costs. Programs at LLNL are benefiting by the efficiencies introduced since implementing Zephyr`s engineering and commerce on the Internet.

  6. Solution for Data Security Challenges Faced by Smart Grid Evolution - Video

    level, and then we can get into the discussion with Dataguise. The security of data is important at generated. So, all of these non-functional attributes of data security are very important, and all of them Text Version | Energy Systems Integration Facility | NREL Solution for Data Security Challenges

  7. Including Internet insurance as part of a hospital computer network security plan.

    Riccardi, Ken

    2002-01-01

    Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.

  8. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  9. Prevalence of Addiction to the Internet, Computer Games, DVD, and Video and Its Relationship to Anxiety and Depression in a Sample of Iranian High School Students.

    Ahmadi, Jamshid; Amiri, Amin; Ghanizadeh, Ahmad; Khademalhosseini, Mitra; Khademalhosseini, Zeinab; Gholami, Zeinab; Sharifian, Maryam

    2014-01-01

    The objective of this study was to assess the prevalence of addiction to the Internet, computer games, DVD, and video and its relationship to anxiety and depression in a sample of Iranian high school students. In this cross-sectional study 1020 high school students (males and females) were selected randomly from different areas of Shiraz city in southern Iran. They were interviewed according to the Diagnostic and Statistical Manual of Mental Disorders, 4(th) ed (DSM-IV) criteria. About 50% of the students were females, 277 students (27.2%) were studying in the first year of high school, 242 (23.7%) were in the second year, and others in the third year. The prevalence of anxiety was significantly higher in females than in males (p video CD dependents (p addiction may cause depression and anxiety in high school students. It seems necessary to develop an Internet addiction prevention program for adolescents taking into account the psychological factors such as depression and Internet use habits.

  10. Moving towards Cloud Security

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  11. Se busca mercado adolescente: internet y videojuegos, las nuevas estrategias de la industria tabacalera Aiming for the adolescent market: internet and video games, the new strategies of the tobacco industry

    Tonatiuh Barrientos-Gutiérrez

    2012-06-01

    Full Text Available La exposición a publicidad sobre tabaco está asociada con el inicio en el consumo, particularmente en población joven, por lo que su control es un objetivo clave para reducir la incidencia de tabaquismo. Históricamente, la industria tabacalera ha sido pionera en la utilización de tecnologías de comunicación para posicionarse ante nuevos mercados y mantener la preferencia de los consumidores. Internet y los videojuegos han trascendido el espacio del entretenimiento, convirtiéndose en medios de comunicación masiva con un alto potencial publicitario. El presente artículo hace una revisión de la literatura existente sobre la presencia de tabaco en internet y videojuegos, con la intención de definir líneas de trabajo para desarrollar mecanismos efectivos de regulación y control de la publicidad en estos medios.Exposure to tobacco advertisement is associated with smoking initiation among the youth, its elimination is a key objective to effectively curb the tobacco epidemic. Historically, the tobacco industry has pioneered the use of new communication technologies to keep and expand their market. Nowadays, Internet and video games have transcended the entertainment sphere, becoming significant media for massive communication and providing new opportunities for advertisement. The present essay reviews the existing literature on tobacco presence in the Internet and video games to define research and policy tasks required to develop effective means for tobacco advertisement regulation and control.

  12. Security Considerations of Doing Business via the Internet: Cautions To Be Considered.

    Aldridge, Alicia; White, Michele; Forcht, Karen

    1997-01-01

    Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…

  13. Proposed Embedded Security Framework for Internet of Things (IoT)

    Babar, Sachin D.; Stango, Antonietta; Prasad, Neeli R.

    2011-01-01

    IoT is going to be an established part of life by extending the communication and networking anytime, anywhere. Security requirements for IoT will certainly underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. This paper gives...

  14. High-tech tools for exercise motivation: use and role of technologies such as the internet, mobile applications, social media, and video games.

    Tate, Deborah F; Lyons, Elizabeth J; Valle, Carmina G

    2015-01-01

    IN BRIEF The majority of patients with type 2 diabetes are not active at recommended levels, and many do not have access to behavior change programs to support lifestyle change. Thus, tools and programs designed to promote the adoption and maintenance of physical activity using technology may be helpful. This article reviews the evidence regarding the use of technology tools such as the Internet, mobile applications, social media, and video games and provides suggestions for evaluating the potential benefit of such tools for behavior change.

  15. High-Tech Tools for Exercise Motivation: Use and Role of Technologies Such as the Internet, Mobile Applications, Social Media, and Video Games

    Lyons, Elizabeth J.; Valle, Carmina G.

    2015-01-01

    IN BRIEF The majority of patients with type 2 diabetes are not active at recommended levels, and many do not have access to behavior change programs to support lifestyle change. Thus, tools and programs designed to promote the adoption and maintenance of physical activity using technology may be helpful. This article reviews the evidence regarding the use of technology tools such as the Internet, mobile applications, social media, and video games and provides suggestions for evaluating the potential benefit of such tools for behavior change. PMID:25717278

  16. Secure real-time wireless video streaming in the aeronautical telecommunications network

    Czernik, Pawel; Olszyna, Jakub

    2010-09-01

    As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor

  17. Presentation of various types of electronic business available on the Internet, Advantages, Disadvantages, Key Requirements and Security, Implementation Model of an Electronic Business

    Andreea A.S. Ionescu; Raul Serban

    2012-01-01

    This paper speaks about the advantages, disadvantages, key requirements necessary of an electronic business, the infrastructure of the Internet, the existing main networks on the Internet, standards used to develop electronic business and the security of an e-business environment. As we know in an organization the information is an asset that has value and should be protected and diversified. We also propose an implementation model of an electronic business that interconnects two concepts: ER...

  18. Copyright on the internet: achieving security through electronic devices an artificial intelligence approach

    Niebla Zatarain, Jesus Manuel

    2018-01-01

    This thesis aims to provide a novel approach to ensure copyright compliance online, appropriate for the Internet of Things and the robotic revolution. To achieve this, three different aims are pursued: - A novel application of “by design” solutions to copyright protection is introduced and its advantages and disadvantages discussed from a jurisprudential and doctrinal perspective. - On the basis of this, a new theoretical framework for legal AI is developed that draws on ...

  19. SMART HOME SECURITY SOLUTIONS BASED ON INTERNET OF THINGS (IOT) USING WIFI INTERFACE

    Bhavna1, Dr. Neetu Sharma2

    2018-01-01

    Smart home system is very popular in modern days that give many kind of application that make everything is simple and easy to control. In modern day, home appliances are using wireless technology and can be accessed by internet that will make residents life easier and organized. IoT-based Home Automation System is designed to assist the people with physical disabilities and elderly to provide support as well as to control the electrical appliances and monitor the room temperature using mobil...

  20. Security and Privacy in the Medical Internet of Things: A Review

    Sun, Wencheng; Cai, Zhiping; Li, Yangyang; Liu, Fang; Fang, Shengqun; Wang, Guoyan

    2018-01-01

    Medical Internet of Things, also well known as MIoT, is playing a more and more important role in improving the health, safety, and care of billions of people after its showing up. Instead of going to the hospital for help, patients’ health-related parameters can be monitored remotely, continuously, and in real time, then processed, and transferred to medical data center, such as cloud storage, which greatly increases the efficiency, convenience, and cost performance of healthcare. The amount...

  1. Sexual videos in Internet: a test of 11 hypotheses about intimate practices and gender interactions in Latin America

    Monge-Nájera, Julián; Corrales, Karla Vega

    2015-01-01

    There is a marked lack of literature on user-submitted sexual videos from Latin America. To start filling that gap, we present a formal statistical testing of several hypotheses about the characteristics of 214 videos from Nereliatube.com posted from the inauguration of the site until December 2010. We found that in most cases the video was made consensually and the camera was operated by the man. The most frequent practice shown was fellatio, followed by vaginal penetration.  The great major...

  2. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  3. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  4. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-10-13

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.

  5. On the security of consumer wearable devices in the Internet of Things.

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  6. Beyond the Convenience of the Internet of Things: Security and Privacy Concerns

    Moganedi, Mapoung S

    2017-06-01

    Full Text Available . Leary, “Writing Narrative Literature Reviews,” vol. 1, no. 3, pp. 311– 320, 1997. [17] J. E. Wallace, “How to write a literature review,” 2013. [18] M. Fons, F. Fons, and E. Cantó, “Embedded security: New trends in personal recognition systems,” Proc...

  7. Addressing the Cyber-security and Cyber-terrorism Threats [video

    Robi Sen; Center for Homeland Defense and Security Naval Postgraduate School

    2015-01-01

    While cyber terrorism is a relatively new threat in the world of national defense, the security issues we face are not necessarily new as a genre. In this segment, Chief Science Officer Robi Sen draws on the changing attitudes towards the cyber world. Topics include cooperation between law enforcement and hackers, the major motivations behind criminal hacking, and the realistic threats of cyber terrorism.

  8. Moving towards Cloud Security

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  9. Use of Videos Improves Informed Consent Comprehension in Web-Based Surveys Among Internet-Using Men Who Have Sex With Men: A Randomized Controlled Trial.

    Hall, Eric William; Sanchez, Travis H; Stein, Aryeh D; Stephenson, Rob; Zlotorzynska, Maria; Sineath, Robert Craig; Sullivan, Patrick S

    2017-03-06

    .39-1.48) and the staff-produced video (score increase=0.99; 95% CI 0.42-1.56) were still significant. Video-based consent methods improve consent comprehension of MSM participating in a Web-based HIV behavioral survey. This effect may be partially mediated through increased time spent reviewing the consent material; however, the video consent may still be superior to standard consent in improving participant comprehension of key study facts. Clinicaltrials.gov NCT02139566; https://clinicaltrials.gov/ct2/show/NCT02139566 (Archived by WebCite at http://www.webcitation.org/6oRnL261N). ©Eric William Hall, Travis H Sanchez, Aryeh D Stein, Rob Stephenson, Maria Zlotorzynska, Robert Craig Sineath, Patrick S Sullivan. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.03.2017.

  10. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.

    Park, Namje; Kang, Namhi

    2015-12-24

    The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  11. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle

    Namje Park

    2015-12-01

    Full Text Available The Internet of Things (IoT, which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.

  12. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD) Scheme.

    Idbeaa, Tarik; Abdul Samad, Salina; Husain, Hafizah

    2016-01-01

    This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD). Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs) of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES) algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  13. A Secure and Robust Compressed Domain Video Steganography for Intra- and Inter-Frames Using Embedding-Based Byte Differencing (EBBD Scheme.

    Tarik Idbeaa

    Full Text Available This paper presents a novel secure and robust steganographic technique in the compressed video domain namely embedding-based byte differencing (EBBD. Unlike most of the current video steganographic techniques which take into account only the intra frames for data embedding, the proposed EBBD technique aims to hide information in both intra and inter frames. The information is embedded into a compressed video by simultaneously manipulating the quantized AC coefficients (AC-QTCs of luminance components of the frames during MPEG-2 encoding process. Later, during the decoding process, the embedded information can be detected and extracted completely. Furthermore, the EBBD basically deals with two security concepts: data encryption and data concealing. Hence, during the embedding process, secret data is encrypted using the simplified data encryption standard (S-DES algorithm to provide better security to the implemented system. The security of the method lies in selecting candidate AC-QTCs within each non-overlapping 8 × 8 sub-block using a pseudo random key. Basic performance of this steganographic technique verified through experiments on various existing MPEG-2 encoded videos over a wide range of embedded payload rates. Overall, the experimental results verify the excellent performance of the proposed EBBD with a better trade-off in terms of imperceptibility and payload, as compared with previous techniques while at the same time ensuring minimal bitrate increase and negligible degradation of PSNR values.

  14. Implementing voice over Internet protocol in mobile ad hoc network – analysing its features regarding efficiency, reliability and security

    Naveed Ahmed Sheikh

    2014-05-01

    Full Text Available Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET environment is a challenging problem. Voice over Internet protocol (VoIP has originally been developed over the past two decades for infrastructure-based networks. There are strict timing constraints for acceptable quality VoIP services, in addition to registration and discovery issues in VoIP end-points. In MANETs, ad hoc nature of networks and multi-hop wireless environment with significant packet loss and delays present formidable challenges to the implementation. Providing a secure real-time VoIP service on MANET is the main design objective of this paper. The authors have successfully developed a prototype system that establishes reliable and efficient VoIP communication and provides an extremely flexible method for voice communication in MANETs. The authors’ cooperative mesh-based MANET implementation can be used for rapidly deployable VoIP communication with survivable and efficient dynamic networking using open source software.

  15. E-Commerce Privacy and Security System

    Kuldeep Kaur; Dr. Ashutosh Pathak

    2015-01-01

    The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cybe...

  16. C-space : Fostering new creative paradigms based on recording and sharing 'casual' videos through the internet

    Simoes, Bruno; Aksenov, Petr; Santos, Pedro; Arentze, Theo; De Amicis, Raffaele

    2015-01-01

    A key theme in ubiquitous computing is to create smart environments in which there is seamless integration of people, information, and physical reality. In this manuscript, we describe a set of tools that facilitate the creation of such environments, e,g, a service to transform videos recorded with

  17. SECURE INTERNET OF THINGS-BASED CLOUD FRAMEWORK TO CONTROL ZIKA VIRUS OUTBREAK.

    Sareen, Sanjay; Sood, Sandeep K; Gupta, Sunil Kumar

    2017-01-01

    Zika virus (ZikaV) is currently one of the most important emerging viruses in the world which has caused outbreaks and epidemics and has also been associated with severe clinical manifestations and congenital malformations. Traditional approaches to combat the ZikaV outbreak are not effective for detection and control. The aim of this study is to propose a cloud-based system to prevent and control the spread of Zika virus disease using integration of mobile phones and Internet of Things (IoT). A Naive Bayesian Network (NBN) is used to diagnose the possibly infected users, and Google Maps Web service is used to provide the geographic positioning system (GPS)-based risk assessment to prevent the outbreak. It is used to represent each ZikaV infected user, mosquito-dense sites, and breeding sites on the Google map that helps the government healthcare authorities to control such risk-prone areas effectively and efficiently. The performance and accuracy of the proposed system are evaluated using dataset for 2 million users. Our system provides high accuracy for initial diagnosis of different users according to their symptoms and appropriate GPS-based risk assessment. The cloud-based proposed system contributed to the accurate NBN-based classification of infected users and accurate identification of risk-prone areas using Google Maps.

  18. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  19. Privacy enabling technology for video surveillance

    Dufaux, Frédéric; Ouaret, Mourad; Abdeljaoued, Yousri; Navarro, Alfonso; Vergnenègre, Fabrice; Ebrahimi, Touradj

    2006-05-01

    In this paper, we address the problem privacy in video surveillance. We propose an efficient solution based on transformdomain scrambling of regions of interest in a video sequence. More specifically, the sign of selected transform coefficients is flipped during encoding. We address more specifically the case of Motion JPEG 2000. Simulation results show that the technique can be successfully applied to conceal information in regions of interest in the scene while providing with a good level of security. Furthermore, the scrambling is flexible and allows adjusting the amount of distortion introduced. This is achieved with a small impact on coding performance and negligible computational complexity increase. In the proposed video surveillance system, heterogeneous clients can remotely access the system through the Internet or 2G/3G mobile phone network. Thanks to the inherently scalable Motion JPEG 2000 codestream, the server is able to adapt the resolution and bandwidth of the delivered video depending on the usage environment of the client.

  20. Evaluation of a video-based Internet intervention as preparation for inpatient psychosomatic rehabilitation: study protocol for a randomized controlled trial.

    Becker, Jan; Beutel, Manfred E; Gerzymisch, Katharina; Schulz, Dirk; Siepmann, Martin; Knickenberg, Rudolf J; Schmädeke, Stefan; Ferdinand, Peter; Zwerenz, Rüdiger

    2016-06-13

    Patients' treatment expectations are a key factor in psychotherapy. Several studies have linked higher expectations to better treatment success. Therefore, we want to evaluate the impact of a targeted video-based intervention on patients' expectations and the treatment success of inpatient rehabilitation. All patients who will be referred to inpatient psychosomatic rehabilitation in three clinics will receive a study flyer with information about how to log in to the study platform together with the usual clinic information leaflet. Patients will receive the study information and informed consent upon login and will be randomized into the intervention or the control group. The intervention group (n = 394) will get access to our virtual online clinic, containing several videos about inpatient rehabilitation, until their admission to inpatient rehabilitation. The control group (n = 394) will receive no special treatment preparation. Questionnaires will be given at study inclusion (T0), two weeks before admission to (T1), and at the end of (T2) inpatient rehabilitation. The primary outcome is the outcome expectancy measured with the Credibility Expectancy Questionnaire at T1. Secondary outcomes include treatment motivation, mental health, work ability, depression, anxiety, and satisfaction with and usage of the Internet platform. We expect the intervention group to benefit from the additional preparation concerning their outcome expectancy. If successful, this approach could be used in the future to enhance the efficacy of inpatient rehabilitation. ClinicalTrials.gov: NCT02532881 . Registered on 25 August 2015.

  1. Use of a voice and video internet technology as an alternative to in-person urgent care clinic visits.

    Brunett, Patrick H; DiPiero, Albert; Flores, Christine; Choi, Dongseok; Kum, Hayley; Girard, Donald E

    2015-06-01

    This study aimed to determine the feasibility of patient-initiated online Internet urgent care visits, and to describe patient characteristics, scope of care, provider adherence to protocols, and diagnostic and therapeutic utilization. A total of 456 unique patients were seen via Internet-based technology during the study period, generating 478 consecutive total patient visits. Of the 82 patients referred for an in-person evaluation, 75 patients (91.5%) reported to the clinic as instructed. None of the 82 patients recommended for in-person evaluation required an emergency department referral, hospital admission or urgent consultative referral. We conclude that real-time online primary and urgent care visits are feasible, safe and potentially beneficial in increasing convenient access to urgent and primary care. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  2. Internet Economics IV

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  3. Trends in scientific literature on addiction to the internet, video games, and cell phones from 2006 to 2010

    Xavier Carbonell

    2016-01-01

    Conclusions: The number of publications on technological addictions reached a peak in 2008. The scientific contributions of China, Taiwan, and Korea are overrepresented compared to other scientific fields such as drug addiction. The inclusion of Internet Gaming Disorder in the Diagnostic and Statistical Manual of Mental Disorders, 5 th Edition could change the publication trends in the technological addiction area and underline the relevance of this upcoming disorder in dissatisfaction with life in general.

  4. Digital communication communication, multimedia, security

    Meinel, Christoph

    2014-01-01

    The authors give a detailed summary about the fundamentals and the historical background of digital communication. This includes an overview of the encoding principles and algorithms of textual information, audio information, as well as images, graphics, and video in the Internet. Furthermore the fundamentals of computer networking, digital security and cryptography are covered. Thus, the book provides a well-founded access to communication technology of computer networks, the internet and the WWW. Numerous pictures and images, a subject-index and a detailed list of historical personalities in

  5. Standardized access, display, and retrieval of medical video

    Bellaire, Gunter; Steines, Daniel; Graschew, Georgi; Thiel, Andreas; Bernarding, Johannes; Tolxdorff, Thomas; Schlag, Peter M.

    1999-05-01

    The system presented here enhances documentation and data- secured, second-opinion facilities by integrating video sequences into DICOM 3.0. We present an implementation for a medical video server extended by a DICOM interface. Security mechanisms conforming with DICOM are integrated to enable secure internet access. Digital video documents of diagnostic and therapeutic procedures should be examined regarding the clip length and size necessary for second opinion and manageable with today's hardware. Image sources relevant for this paper include 3D laparoscope, 3D surgical microscope, 3D open surgery camera, synthetic video, and monoscopic endoscopes, etc. The global DICOM video concept and three special workplaces of distinct applications are described. Additionally, an approach is presented to analyze the motion of the endoscopic camera for future automatic video-cutting. Digital stereoscopic video sequences are especially in demand for surgery . Therefore DSVS are also integrated into the DICOM video concept. Results are presented describing the suitability of stereoscopic display techniques for the operating room.

  6. Internet Censorship

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  7. Current experiences with internet telepathology and possible evolution in the next generation of Internet services.

    Della Mea, V; Beltrami, C A

    2000-01-01

    The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.

  8. An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce: Using An Extension of the Technology Acceptance Model

    Muniruddeen Lallmahamood

    2007-01-01

    This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM) is used to examine the above perception. A survey was distributed, the 187 responses mainly from the urban cities in Malaysia, hav e generally agreed that security and privacy are still the main concerns while using Internet banking. The research model explains over half of the variance of the intenti...

  9. Quantitative analysis of Internet television and video (WebTV: A study of formats, content, and source

    José Borja ARJONA MARTÍN

    2014-07-01

    Full Text Available Due to the significant increase in the last five years of audiovisual content distribution over the web, this paper is focused on a study aimed at the description and classification of a wide sample of audiovisual initiatives whose access is carried out by means of the World Wide Web. The purpose of this study is to promote the debate concerning the different names of these incipient media, as well as their categorization and description so that an organised universe of the WebTV phenomenon could be provided. An analysis of formats and content is carried out on the basis of quantitative techniques in order to propose a categorization typology. These formats and content will be studied under three key variables: "Content", "Origin" and "Domain .tv". "Content" will help us define the programmatic lines of our study sample; “Source” refers to the source of a particular item of study (“Native WebTV or WebTV representative of a conventional media and "Domain.tv" will specify the proportion of case studies hosted with domain .tv. The results obtained in this study will offer the researchers and the professionals a comprehensive description of the models currently adopted in the field of video and television on the net.

  10. Information and Communications Technologies (ICT): Problematic use of Internet, video games, mobile phones, instant messaging and social networks using MULTICAGE-TIC.

    Pedrero Pérez, Eduardo J; Ruiz Sánchez de León, José María; Rojo Mota, Gloria; Llanero Luque, Marcos; Pedrero Aguilar, Jara; Morales Alonso, Sara; Puerta García, Carmen

    2018-01-01

    Use/abuse of Information and Communications Technologies (ICT) has in recent years become a topic of great interest. Current discussion addresses whether it must be considered addictive behaviour and if it is a problem that primarily affects adolescents and youth. This study aims to understand the problems that affect people of all ages in controlling the use of these ICTs and whether they are related to mental health problems, stress and difficulties in executive control of behaviour. A survey was administered through social networks and email, using the MULTICAGE-ICT, a questionnaire that explores problems in the use of Internet, mobile phones, video games, instant messaging and social networks. Additionally, the Prefrontal Symptom Inventory, General Health Questionnaire and Perceived Stress Scale were administered. The sample was comprised of 1,276 individuals of all ages from different Spanish-speaking countries. The results indicate that about 50% of the sample, regardless of age or other variables, presents significant problems with the use of these technologies, and that these problems are directly related to symptoms of poor prefrontal functioning, stress and mental health problems. The results reveal the need for reconsidering whether we are facing an addictive behaviour or a new problem demanding environmental, psychological, sociological and sociopolitical explanations; therefore, it is necessary to reformulate actions to be implemented to address and refocus our understanding of the problem.

  11. Design of a cyber security awareness campaign for internet Cafés users in rural areas

    Labuschagne, WA

    2011-05-01

    Full Text Available very low cyber literacy rates. A consequence of these two factors is that many Internet users access the Internet without understanding or even realising the dangers of the cyber world. Proactive measures need to be developed to ensure that these new...

  12. SECRETS OF SONG VIDEO

    Chernyshov Alexander V.

    2014-04-01

    Full Text Available The article focuses on the origins of the song videos as TV and Internet-genre. In addition, it considers problems of screen images creation depending on the musical form and the text of a songs in connection with relevant principles of accent and phraseological video editing and filming techniques as well as with additional frames and sound elements.

  13. International Mathematical Internet Olympiad

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  14. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve

  15. Streaming Video--The Wave of the Video Future!

    Brown, Laura

    2004-01-01

    Videos and DVDs give the teachers more flexibility than slide projectors, filmstrips, and 16mm films but teachers and students are excited about a new technology called streaming. Streaming allows the educators to view videos on demand via the Internet, which works through the transfer of digital media like video, and voice data that is received…

  16. The Development and Evaluation of a Peer-Training Program for Elementary School Students Teaching Secure Internet Use

    Korkmaz, Murat; Esen, Binnaz Kiran

    2013-01-01

    The aim of this study is to design and evaluate a peer-training program about changing students' internet use habits. This study was conducted with students from two different elementary schools in Mersin, Turkey, who were enrolled in 7th or 8th grade in the 2009-2010 academic year. A total of 24 students participated in the program, 12 of whom…

  17. 一种分布式互联网彩票安全策略%A distributed security strategy for internet lottery

    梅颖

    2017-01-01

    This paper proposes a distributed security strategy for internet lottery;it builds a distributed public ledger based on the blockchain technology to record all lottery transactions and provides the specific details of the strategy and the prototype architecture,analyzes the security characteristics of the strategy about anonymity,non-repudiation,tamper-resistant,transparency,which proves that the strategy can effectively solve the problems caused by the traditional centralization technology,that make operation is opaque,easy to be artificially controlled,lottery transactions in the entire process cannot be perceived by the user,so as to provide an effective solution for the construction of a secure internet lottery system.%提出了一种分布式互联网彩票安全策略,该策略基于区块链技术建立一个分布式公共账本,记录所有的彩票交易记录.详细阐述了该策略的具体细节和原型体系结构,并通过对该策略的匿名性、抗抵赖性、防篡改、透明性等安全特性进行分析,证明该策略能有效解决传统的基于中心化技术所导致运营不透明、容易被人为控制、彩票交易的整个流程中也不能被用户察觉等问题,为构建安全的互联网彩票系统提供有效的解决方案.

  18. Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment

    Mihai-Gabriel IONITA

    2016-01-01

    Full Text Available Threat information exchange is a critical part of any security system. Decisions regarding security are taken with more confidence and with more results when the whole security context is known. The fog computing paradigm enhances the use cases of the already used cloud computing systems by bringing all the needed resources to the end-users towards the edge of the network. While fog decentralizes the cloud, it is very important to correlate security events which happen in branch offices around the globe for correct and timely decisions. In this article, we propose an infrastructure based on custom locally installed OSSEC agents which communicate with a central AlienVault deployment for event correlation. The agents are based on a neural network which takes actions based on risk assessment inspired by the human immune system. All of the threat information is defined by STIX expressions and a TAXII server can share this information with foreign organizations. The proposed implementation can successfully be implemented in an IoT scenario, with added security for the “brownfiled” devices.

  19. A content analysis of food and beverage advertisements associated with Arabic children's videos on the internet and its relation to dental health

    Abdulrahman Dahham AlSaffan

    2017-01-01

    Conclusion: The results of this study suggest that the content and penetration of advertisements on the internet vary too much to be meaningfully regulated. Dentists should be aware of the effect of these advertisements and counsel parents to the dangers of targeted advertising of high sugar products on the internet.

  20. A Discussion on Internet Security Based on the IPv6 agreement%基于IPv6协议的网络安全问题探讨

    张贵军

    2011-01-01

    With the increase of the Internet application of next generation, our government、net service providers and consumers paid more attention to the safety of IPv6. This essay introduced the IPv6 agreement first, then analyzed some security issues. We hope these problems can be solved in the deploy process of IPv6 agreement.%随着下一代互联网应用的不断增加,国家、网络运营商和用户对于IPv6的安全问题日益重视。本文在对IPv6协议简单介绍的基础上,分析了IPv6网络目前存在的一些安全问题,希望在部署IPv6协议的过程中能够不断地解决这些问题。

  1. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    Shi-Cho Cha; Kuo-Hui Yeh; Jyun-Fu Chen

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exi...

  2. Video Encryption and Decryption on Quantum Computers

    Yan, Fei; Iliyasu, Abdullah M.; Venegas-Andraca, Salvador E.; Yang, Huamin

    2015-08-01

    A method for video encryption and decryption on quantum computers is proposed based on color information transformations on each frame encoding the content of the encoding the content of the video. The proposed method provides a flexible operation to encrypt quantum video by means of the quantum measurement in order to enhance the security of the video. To validate the proposed approach, a tetris tile-matching puzzle game video is utilized in the experimental simulations. The results obtained suggest that the proposed method enhances the security and speed of quantum video encryption and decryption, both properties required for secure transmission and sharing of video content in quantum communication.

  3. Banking on the Internet.

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  4. Coverage of the Test of Memory Malingering, Victoria Symptom Validity Test, and Word Memory Test on the Internet: is test security threatened?

    Bauer, Lyndsey; McCaffrey, Robert J

    2006-01-01

    In forensic neuropsychological settings, maintaining test security has become critically important, especially in regard to symptom validity tests (SVTs). Coaching, which can entail providing patients or litigants with information about the cognitive sequelae of head injury, or teaching them test-taking strategies to avoid detection of symptom dissimulation has been examined experimentally in many research studies. Emerging evidence supports that coaching strategies affect psychological and neuropsychological test performance to differing degrees depending on the coaching paradigm and the tests administered. The present study sought to examine Internet coverage of SVTs because it is potentially another source of coaching, or information that is readily available. Google searches were performed on the Test of Memory Malingering, the Victoria Symptom Validity Test, and the Word Memory Test. Results indicated that there is a variable amount of information available about each test that could threaten test security and validity should inappropriately interested parties find it. Steps that could be taken to improve this situation and limitations to this exploration are discussed.

  5. Information security foundations, technologies and applications

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  6. Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

    Jeyamala Chandrasekaran

    2015-01-01

    Full Text Available Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES and (ii generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

  7. Robust and Imperceptible Watermarking of Video Streams for Low Power Devices

    Ishtiaq, Muhammad; Jaffar, M. Arfan; Khan, Muhammad A.; Jan, Zahoor; Mirza, Anwar M.

    With the advent of internet, every aspect of life is going online. From online working to watching videos, everything is now available on the internet. With the greater business benefits, increased availability and other online business advantages, there is a major challenge of security and ownership of data. Videos downloaded from an online store can easily be shared among non-intended or unauthorized users. Invisible watermarking is used to hide copyright protection information in the videos. The existing methods of watermarking are less robust and imperceptible and also the computational complexity of these methods does not suit low power devices. In this paper, we have proposed a new method to address the problem of robustness and imperceptibility. Experiments have shown that our method has better robustness and imperceptibility as well as our method is computationally efficient than previous approaches in practice. Hence our method can easily be applied on low power devices.

  8. Analysis and study of data security in the Internet of Things paradigm from a Blockchain technology approach

    Rull Aixa, David

    2018-01-01

    This project is a space of information and knowledge of the IoT paradigm and Blockchain technology with the analysis of the most relevant research articles and the study of the most important threats of IoT technologies and scenarios. In addition, it offers an overview of the current state of the paradigm from the perspective of security and the opportunities that its combination with Blockchain technology can bring to our society. Aquest projecte és un espai d'informació i coneixement ...

  9. The Internet of Hackable Things

    Giaretta, Alberto; Mazzara, Manuel; Dragoni, Nicola

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

  10. Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Ajiboye, Sola O.; Birch, Philip; Chatwin, Christopher; Young, Rupert

    2015-03-01

    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems `expose' relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT).

  11. The Impact of the Internet of Things (IoT) on the IT Security Infrastructure of Traditional Colleges and Universities in the State of Utah

    Campbell, Wendy

    2017-01-01

    The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…

  12. Evaluation of a video-based Internet intervention as preparation for inpatient psychosomatic rehabilitation: study protocol for a randomized controlled trial

    Becker, Jan; Beutel, Manfred E.; Gerzymisch, Katharina; Schulz, Dirk; Siepmann, Martin; Knickenberg, Rudolf J.; Schm?deke, Stefan; Ferdinand, Peter; Zwerenz, R?diger

    2016-01-01

    Background Patients? treatment expectations are a key factor in psychotherapy. Several studies have linked higher expectations to better treatment success. Therefore, we want to evaluate the impact of a targeted video-based intervention on patients? expectations and the treatment success of inpatient rehabilitation. Methods/design All patients who will be referred to inpatient psychosomatic rehabilitation in three clinics will receive a study flyer with information about how to log in to the ...

  13. Maximizing Resource Utilization in Video Streaming Systems

    Alsmirat, Mohammad Abdullah

    2013-01-01

    Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…

  14. Don't Just Sit There - Do Something!: Engaging and Empowering U.S. Adults Through Short, Funny, Internet Videos About Climate Change

    Portlock, J.; Laird, H.

    2015-12-01

    Communitopia, a 501(c)3 organization, uses humor, new media, and the short video format to engage and empower audiences and improve climate literacy. Our main project, the Don't Just Sit There - Do Something! video series (http://djst.tv), takes the complex subject of climate science, breaks it down into digestible nuggets of short, funny video, and couples it with easy actions viewers can take to make a difference. The series has 25 episodes so far, and more than 80,000 views on YouTube. We are reaching our target audience of high-school-age and adult viewers in the United States (94% of viewers are known to fit this demographic). Don't Just Sit There - Do Something! uses a strategic model for breaking through the fear and dread around climate change in the general population. It uses humor, positivity and brevity to frame the issue, and gives the audience simple actions designed to empower in each self-contained episode. We approach each piece of the climate puzzle with scientific rigor, and cite all our sources. Our approach is light-hearted and fun, because it is a more productive way to have a conversation about tough issues than scolding and guilt. The series is ongoing, and we are always focused on climate change. To determine the efficacy of our approach and efforts, we measure video views and other metrics through our YouTube channel, compile feedback and comments through YouTube and other social media outlets, and track actions taken through web metrics (click-through rates). We are also currently working with the Behavioral and Community Health Sciences Department at the University of Pittsburgh Graduate School of Public Health to evaluate the videos' impact. From August-October 2015, we are using an online survey to evaluate the Don't Just Sit There - Do Something! series. We will assess viewers' climate change education and awareness, commitment to support action steps that alleviate climate change, and inclination to support policy action before and

  15. Grid Security

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. Se busca mercado adolescente: internet y videojuegos, las nuevas estrategias de la industria tabacalera Aiming for the adolescent market: internet and video games, the new strategies of the tobacco industry

    Tonatiuh Barrientos-Gutiérrez; Inti Barrientos-Gutiérrez; Luz Myriam Reynales-Shigematsu; James F Thrasher; Eduardo Lazcano-Ponce

    2012-01-01

    La exposición a publicidad sobre tabaco está asociada con el inicio en el consumo, particularmente en población joven, por lo que su control es un objetivo clave para reducir la incidencia de tabaquismo. Históricamente, la industria tabacalera ha sido pionera en la utilización de tecnologías de comunicación para posicionarse ante nuevos mercados y mantener la preferencia de los consumidores. Internet y los videojuegos han trascendido el espacio del entretenimiento, convirtiéndose en medios de...

  17. Retailing and Shopping on the Internet.

    Rowley, Jennifer

    1996-01-01

    Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)

  18. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  19. Internet enlightens; Internet eclaire

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  20. Internet enlightens; Internet eclaire

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  1. Internet enlightens; Internet eclaire

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  2. Internet enlightens; Internet eclaire

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  3. Internet addiction: A case report

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  4. Reduction in Fall Rate in Dementia Managed Care Through Video Incident Review: Pilot Study.

    Bayen, Eleonore; Jacquemot, Julien; Netscher, George; Agrawal, Pulkit; Tabb Noyce, Lynn; Bayen, Alexandre

    2017-10-17

    Falls of individuals with dementia are frequent, dangerous, and costly. Early detection and access to the history of a fall is crucial for efficient care and secondary prevention in cognitively impaired individuals. However, most falls remain unwitnessed events. Furthermore, understanding why and how a fall occurred is a challenge. Video capture and secure transmission of real-world falls thus stands as a promising assistive tool. The objective of this study was to analyze how continuous video monitoring and review of falls of individuals with dementia can support better quality of care. A pilot observational study (July-September 2016) was carried out in a Californian memory care facility. Falls were video-captured (24×7), thanks to 43 wall-mounted cameras (deployed in all common areas and in 10 out of 40 private bedrooms of consenting residents and families). Video review was provided to facility staff, thanks to a customized mobile device app. The outcome measures were the count of residents' falls happening in the video-covered areas, the acceptability of video recording, the analysis of video review, and video replay possibilities for care practice. Over 3 months, 16 falls were video-captured. A drop in fall rate was observed in the last month of the study. Acceptability was good. Video review enabled screening for the severity of falls and fall-related injuries. Video replay enabled identifying cognitive-behavioral deficiencies and environmental circumstances contributing to the fall. This allowed for secondary prevention in high-risk multi-faller individuals and for updated facility care policies regarding a safer living environment for all residents. Video monitoring offers high potential to support conventional care in memory care facilities. ©Eleonore Bayen, Julien Jacquemot, George Netscher, Pulkit Agrawal, Lynn Tabb Noyce, Alexandre Bayen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 17.10.2017.

  5. Streaming Audio and Video: New Challenges and Opportunities for Museums.

    Spadaccini, Jim

    Streaming audio and video present new challenges and opportunities for museums. Streaming media is easier to author and deliver to Internet audiences than ever before; digital video editing is commonplace now that the tools--computers, digital video cameras, and hard drives--are so affordable; the cost of serving video files across the Internet…

  6. You Are There: No Budget for Travel? Try Video Chat

    Langhorst, Eric

    2009-01-01

    The author discusses how he used video chat as an alternative to a physical trip. Any teacher with an Internet hookup and a $30 webcam can connect with anyone in the world using video chat. Programs like Skype Video and the Google Mail's video chat function make it easy and, best of all, are completely free. The author discusses how to get started…

  7. Video Watermarking Implementation Based on FPGA

    EL-ARABY, W.S.M.S.

    2012-01-01

    The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content. With the rapid growth of the Internet and the multimedia systems in distributed environments, digital data owners are now easier to transfer multimedia documents across the Internet. However, current technology does not protect their copyrights properly. This leads to wide interest of multimedia security and multimedia copyright protection and it has become a great concern to the public in recent years. In the early days, encryption and control access techniques were used to protect the ownership of media. Recently, the watermarking techniques are utilized to keep safely the copyrights. In this thesis, a fast and secure invisible video watermark technique has been introduced. The technique based mainly on DCT and Low Frequency using pseudo random number (PN) sequence generator for embedding algorithm. The system has been realized using VHDL and the results have been verified using MATLAB. The implementation of the introduced watermark system done using Xilinx chip (XCV800). The implementation results show that the total area of watermark technique is 45% of total FPGA area with maximum delay equals 16.393ns. The experimental results show that the two techniques have mean square error (MSE) equal to 0.0133 and peak signal to noise ratio (PSNR) equal to 66.8984db. The results have been demonstrated and compared with conventional watermark technique using DCT.

  8. Saving the internet.

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  9. Epistemic Authority, Lies, and Video

    Andersen, Rune Saugmann

    2013-01-01

    This article analyses how videos of violent protests become politically powerful arguments able to intervene in debates about security. It does so by looking at a series of videos taken by police authorities and protesters during street battles in Copenhagen in August 2009, when protesters opposed...

  10. Encrypted IP video communication system

    Bogdan, Apetrechioaie; Luminiţa, Mateescu

    2010-11-01

    Digital video transmission is a permanent subject of development, research and improvement. This field of research has an exponentially growing market in civil, surveillance, security and military aplications. A lot of solutions: FPGA, ASIC, DSP have been used for this purpose. The paper presents the implementation of an encrypted, IP based, video communication system having a competitive performance/cost ratio .

  11. Robust Watermarking of Video Streams

    T. Polyák

    2006-01-01

    Full Text Available In the past few years there has been an explosion in the use of digital video data. Many people have personal computers at home, and with the help of the Internet users can easily share video files on their computer. This makes possible the unauthorized use of digital media, and without adequate protection systems the authors and distributors have no means to prevent it.Digital watermarking techniques can help these systems to be more effective by embedding secret data right into the video stream. This makes minor changes in the frames of the video, but these changes are almost imperceptible to the human visual system. The embedded information can involve copyright data, access control etc. A robust watermark is resistant to various distortions of the video, so it cannot be removed without affecting the quality of the host medium. In this paper I propose a video watermarking scheme that fulfills the requirements of a robust watermark. 

  12. Internet enlightens; Internet eclaire

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  13. The Internet of Hackable Things

    Dragoni, Nicola; Giaretta, Alberto; Mazzara, Manuel

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order...

  14. Dashboard Videos

    Gleue, Alan D.; Depcik, Chris; Peltier, Ted

    2012-01-01

    Last school year, I had a web link emailed to me entitled "A Dashboard Physics Lesson." The link, created and posted by Dale Basier on his "Lab Out Loud" blog, illustrates video of a car's speedometer synchronized with video of the road. These two separate video streams are compiled into one video that students can watch and analyze. After seeing…

  15. Video microblogging

    Bornoe, Nis; Barkhuus, Louise

    2010-01-01

    Microblogging is a recently popular phenomenon and with the increasing trend for video cameras to be built into mobile phones, a new type of microblogging has entered the arena of electronic communication: video microblogging. In this study we examine video microblogging, which is the broadcasting...... of short videos. A series of semi-structured interviews offers an understanding of why and how video microblogging is used and what the users post and broadcast....

  16. SOCIAL MEDIA SECURITY

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  17. Video Surveillance: Privacy Issues and Legal Compliance

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a...

  18. Video demystified

    Jack, Keith

    2004-01-01

    This international bestseller and essential reference is the "bible" for digital video engineers and programmers worldwide. This is by far the most informative analog and digital video reference available, includes the hottest new trends and cutting-edge developments in the field. Video Demystified, Fourth Edition is a "one stop" reference guide for the various digital video technologies. The fourth edition is completely updated with all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video (Video over DSL, Ethernet, etc.), as well as discussions of the latest standards throughout. The accompanying CD-ROM is updated to include a unique set of video test files in the newest formats. *This essential reference is the "bible" for digital video engineers and programmers worldwide *Contains all new chapters on MPEG-4, H.264, SDTV/HDTV, ATSC/DVB, and Streaming Video *Completely revised with all the latest and most up-to-date industry standards.

  19. Internet Ethics Issues and Actions in Japan

    江澤, 義典

    2013-01-01

    The International Symposium on Internet Ethics 2012 was planned and organized by the Korea Internet Security Agency and was held in September 2012 at the Lotte Hotel World in Seoul. This note relates to the presentation in Japan, it outlines current Internet ethics issues and actions in Japan. Moreover, four aspects of Japanese civilization were introduced as the bases of these ethics issues.

  20. Older Adults' Knowledge of Internet Hazards

    Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.

    2010-01-01

    Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…

  1. Video pedagogy

    Länsitie, Janne; Stevenson, Blair; Männistö, Riku; Karjalainen, Tommi; Karjalainen, Asko

    2016-01-01

    The short film is an introduction to the concept of video pedagogy. The five categories of video pedagogy further elaborate how videos can be used as a part of instruction and learning process. Most pedagogical videos represent more than one category. A video itself doesn’t necessarily define the category – the ways in which the video is used as a part of pedagogical script are more defining factors. What five categories did you find? Did you agree with the categories, or are more...

  2. Watermarking textures in video games

    Liu, Huajian; Berchtold, Waldemar; Schäfer, Marcel; Lieb, Patrick; Steinebach, Martin

    2014-02-01

    Digital watermarking is a promising solution to video game piracy. In this paper, based on the analysis of special challenges and requirements in terms of watermarking textures in video games, a novel watermarking scheme for DDS textures in video games is proposed. To meet the performance requirements in video game applications, the proposed algorithm embeds the watermark message directly in the compressed stream in DDS files and can be straightforwardly applied in watermark container technique for real-time embedding. Furthermore, the embedding approach achieves high watermark payload to handle collusion secure fingerprinting codes with extreme length. Hence, the scheme is resistant to collusion attacks, which is indispensable in video game applications. The proposed scheme is evaluated in aspects of transparency, robustness, security and performance. Especially, in addition to classical objective evaluation, the visual quality and playing experience of watermarked games is assessed subjectively in game playing.

  3. The Era of Mobile Internet Mobile Phone Information Security Strategy of Shallow Research%移动互联网时代手机信息安全策略

    黄赛

    2015-01-01

    Articles focus on mobile Internet hand on behalf of the smartphone security issues, from the communication network selection strategy, the mobile terminal selection strategy, the use of mobile phones security policy, social information security environment to create four latitude on smartphone security strategy for full range analysis, introduce, strive for ordinary readers fully understand the safety problem of the intelligent mobile phone and application in the reality of life and learning, so that everyone's smartphone safer and more at ease.%文章聚焦于移动互联网手代智能手机安全问题,从通信网络选择策略、手机终端选择策略、手机使用安全策略、社会信息安全环境营造四个纬度对智能手机安全策略进行全方位的分析、介绍,力求让普通读者全面了解掌握智能手机安全问题,并应用于现实生活学习中,从而使大家的智能手机更安全、使用更放心。

  4. Internet Roadside Cafe #6. [Videotape.

    American Library Association Video/Library Video Network, Towson, MD.

    This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…

  5. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  6. Internet Factories

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  7. Internet factories

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  8. Internet Economics

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  9. Internet economics

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  10. Skype resilience to high motion videos

    Exarchakos, G.; Druda, L.; Menkovski, V.; Bellavista, P.; Liotta, A.

    Skype is one of the most popular video call services in the current Internet world. One of its strengths is the use of an adaptive mechanism to match the constraints of the underlying network. This work is focused on how this mechanism can maximize the video quality as perceived by the viewers using

  11. Internet-based treatment for panic disorder: A three-arm randomized controlled trial comparing guided (via real-time video sessions) with unguided self-help treatment and a waitlist control. PAXPD study results.

    Ciuca, Amalia M; Berger, Thomas; Crişan, Liviu G; Miclea, Mircea

    2018-05-01

    A growing body of evidence suggests that Internet-based cognitive behavioral treatments (ICBT) are effective to treat anxiety disorders. However, the effect of therapist guidance in ICBT is still under debate and guided ICBT offered in a real-time audio-video communication format has not yet been systematically investigated. This three-arm RCT compared the efficacy of guided with unguided ICBT (12 weeks intervention) and a waitlist (WL). A total of 111 individuals meeting the diagnostic criteria for panic disorder (PD) were randomly assigned to one of three conditions. Primary outcomes were the severity of self-report panic symptoms and diagnostic status. Secondary outcomes were symptoms of depression, functional impairment, catastrophic cognitions, fear of sensations and body vigilance. At post-treatment, both active conditions showed superior outcomes regarding PD and associated symptoms (guided ICBT vs. WL: d = 1.04-1.36; unguided ICBT vs. WL: d = 0.70-1.06). At post-treatment, the two active conditions did not differ significantly in self-reported symptom reduction (d = 0.21-0.54, all ps > 0.05), but the guided treatment was superior to the unguided treatment in terms of diagnostic status (χ 2 (1) = 13.15, p < 0.01). Treatment gains were maintained at successive follow-ups and the guided treatment became superior to the unguided treatment at 6 months follow-up (d = 0.72-1.05, all ps < 0.05). Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Internet marketing

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  13. Camera network video summarization

    Panda, Rameswar; Roy-Chowdhury, Amit K.

    2017-05-01

    Networks of vision sensors are deployed in many settings, ranging from security needs to disaster response to environmental monitoring. Many of these setups have hundreds of cameras and tens of thousands of hours of video. The difficulty of analyzing such a massive volume of video data is apparent whenever there is an incident that requires foraging through vast video archives to identify events of interest. As a result, video summarization, that automatically extract a brief yet informative summary of these videos, has attracted intense attention in the recent years. Much progress has been made in developing a variety of ways to summarize a single video in form of a key sequence or video skim. However, generating a summary from a set of videos captured in a multi-camera network still remains as a novel and largely under-addressed problem. In this paper, with the aim of summarizing videos in a camera network, we introduce a novel representative selection approach via joint embedding and capped l21-norm minimization. The objective function is two-fold. The first is to capture the structural relationships of data points in a camera network via an embedding, which helps in characterizing the outliers and also in extracting a diverse set of representatives. The second is to use a capped l21-norm to model the sparsity and to suppress the influence of data outliers in representative selection. We propose to jointly optimize both of the objectives, such that embedding can not only characterize the structure, but also indicate the requirements of sparse representative selection. Extensive experiments on standard multi-camera datasets well demonstrate the efficacy of our method over state-of-the-art methods.

  14. Security system signal supervision

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  15. Internet accounting

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  16. Wireless Internet

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  17. The Internet of things connecting objects

    Chaouchi, Hakima

    2013-01-01

    Internet of Things: Connecting Objects… puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.

  18. Space Internet-Embedded Web Technologies Demonstration

    Foltz, David A.

    2001-01-01

    The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.

  19. ONLINE LEARNING: CAN VIDEOS ENHANCE LEARNING?

    HAJHASHEMI, Karim; ANDERSON, Neil; JACKSON, Cliff; CALTABIANO, Nerina

    2015-01-01

    Highereducation lecturers integrate different media into their courses. Internet-basededucational video clips have gained prominence, as this media is perceived topromote deeper thought processes, communication and interaction among users,and makeclassroom content more diverse.This paper provides a literature overview of the increasing importance ofonline videos across all modes of instruction. It discusses a quantitative andqualitative research design that was used to assess on-line video pe...

  20. Technical video documentation UN Security Council Resolution 687. 7. IAEA inspection in Iraq October 1991, IAEA inspection no. 8 Iraq November 1991

    1991-01-01

    This video documents the 7th and 8th IAEA inspections to Iraq (A1 Tuwaitha, A1 Atheer, A1 Qa Qaa sites and A1 Hatteen High Explosive Test Site) and the destruction and removal of various equipment suitable for nuclear weapon development

  1. Advanced Internet Protocols, Services, and Applications

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  2. Mobile Video in Everyday Social Interactions

    Reponen, Erika; Lehikoinen, Jaakko; Impiö, Jussi

    Video recording has become a spontaneous everyday activity for many people, thanks to the video capabilities of modern mobile phones. Internet connectivity of mobile phones enables fluent sharing of captured material even real-time, which makes video an up-and-coming everyday interaction medium. In this article we discuss the effect of the video camera in the social environment, everyday life situations, mainly based on a study where four groups of people used digital video cameras in their normal settings. We also reflect on another study of ours, relating to real-time mobile video communication and discuss future views. The aim of our research is to understand the possibilities in the domain of mobile video. Live and delayed sharing seem to have their special characteristics, live video being used as a virtual window between places whereas delayed video usage has more scope for good-quality content. While this novel way of interacting via mobile video enables new social patterns, it also raises new concerns for privacy and trust between participating persons in all roles, largely due to the widely spreading possibilities of videos. Video in a social situation affects cameramen (who record), targets (who are recorded), passers-by (who are unintentionally in the situation), and the audience (who follow the videos or recording situations) but also the other way around, the participants affect the video by their varying and evolving personal and communicational motivations for recording.

  3. 77 FR 1971 - Supplemental Security Income and Homeless Individuals

    2012-01-12

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0087] Supplemental Security Income and Homeless Individuals AGENCY: Social Security Administration. ACTION: Notice; Request for Comments. SUMMARY...

  4. No Reference Video-Quality-Assessment Model for Monitoring Video Quality of IPTV Services

    Yamagishi, Kazuhisa; Okamoto, Jun; Hayashi, Takanori; Takahashi, Akira

    Service providers should monitor the quality of experience of a communication service in real time to confirm its status. To do this, we previously proposed a packet-layer model that can be used for monitoring the average video quality of typical Internet protocol television content using parameters derived from transmitted packet headers. However, it is difficult to monitor the video quality per user using the average video quality because video quality depends on the video content. To accurately monitor the video quality per user, a model that can be used for estimating the video quality per video content rather than the average video quality should be developed. Therefore, to take into account the impact of video content on video quality, we propose a model that calculates the difference in video quality between the video quality of the estimation-target video and the average video quality estimated using a packet-layer model. We first conducted extensive subjective quality assessments for different codecs and video sequences. We then model their characteristics based on parameters related to compression and packet loss. Finally, we verify the performance of the proposed model by applying it to unknown data sets different from the training data sets used for developing the model.

  5. A Conceptual Characterization of Online Videos Explaining Natural Selection

    Bohlin, Gustav; Göransson, Andreas; Höst, Gunnar E.; Tibell, Lena A. E.

    2017-01-01

    Educational videos on the Internet comprise a vast and highly diverse source of information. Online search engines facilitate access to numerous videos claiming to explain natural selection, but little is known about the degree to which the video content match key evolutionary content identified as important in evolution education research. In…

  6. Remote sensing and monitor system for a large poultry farm based on Internet

    Bai, Hongwu; Teng, Guanghui; Ma, Liang; Li, Zhizhong; Yuan, Zhengdong; Li, Minzan; Yang, Xiuslayerg

    2005-09-01

    A remote sensing and monitor system for a large poultry layer farm is developed based on distributed data acquisition and internet control. The supervising system applied patent techniques known as arc orbit movable vidicon, wireless video transmission and telecommunications. It features supervising at all orientations, and digital video telecommunicating through internet. All measured and control information is sent to a central computer, which is in charge of storing, displaying, analyzing and serving to internet, where managers can monitor real time production scene anywhere and customers can also see the healthy layers through internet. This paper primarily discusses how to design the remote sensing and monitor system (RSMS), and its usage in a large poultry farm, Deqingyuan Healthy Breeding Ecological Garden, Yanqing County, Beijing, China. The system applied web service technology and the middleware using XML language and Java language. It preponderated in data management, data exchange, expansibility, security, and compatibility. As a part of poultry sustainable development management system, it has been applied in a large farm with 1,200,000 layers. Tests revealed that there was distinct decline in the death ratio of chicken with 2. 2%, as the surroundings of layers had been ameliorated. At the same time, there was definite increase in the laying ratio with 3. 5%.

  7. Smart security proven practices

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  8. Immersive video

    Moezzi, Saied; Katkere, Arun L.; Jain, Ramesh C.

    1996-03-01

    Interactive video and television viewers should have the power to control their viewing position. To make this a reality, we introduce the concept of Immersive Video, which employs computer vision and computer graphics technologies to provide remote users a sense of complete immersion when viewing an event. Immersive Video uses multiple videos of an event, captured from different perspectives, to generate a full 3D digital video of that event. That is accomplished by assimilating important information from each video stream into a comprehensive, dynamic, 3D model of the environment. Using this 3D digital video, interactive viewers can then move around the remote environment and observe the events taking place from any desired perspective. Our Immersive Video System currently provides interactive viewing and `walkthrus' of staged karate demonstrations, basketball games, dance performances, and typical campus scenes. In its full realization, Immersive Video will be a paradigm shift in visual communication which will revolutionize television and video media, and become an integral part of future telepresence and virtual reality systems.

  9. Internet technology for clinical application in a digital radiology department

    Bergh, B.; Pietsch, M.; Vogl, T.J.

    2000-01-01

    Problem: To provide an overview and to assess the clinical feasibility of internet technology-based systems for hospital-wide image and report distribution as well as for video conferencing. Methods: The paper describes the theoretical concept behind, the various technical approaches and the experience gained from different systems. Results: Image and report distribution: Advantages include the universal availability of images and reports inside and outside hospitals; ease of use; security features; image and report integration; cost savings by reducing support and training efforts and by optimising available hardware. The main critical issues are performance and workflow integration with RIS and PACS. Video conferencing: Main advantages are the standardised, software-based approach and the low investments for hard- and software. Depending on the desired usage the communication performance can be seen as inappropriate. Conclusion: Today, internet technology-based systems appear to satisfy the main clinical needs in radiology. The mentioned drawbacks could be eliminated by means of modified software implementation and focused standardisation efforts. Considering the numerous advantages of these systems a further distribution can be expected for the future. (orig.) [de

  10. Video Bandwidth Compression System.

    1980-08-01

    scaling function, located between the inverse DPCM and inverse transform , on the decoder matrix multiplier chips. 1"V1 T.. ---- i.13 SECURITY...Bit Unpacker and Inverse DPCM Slave Sync Board 15 e. Inverse DPCM Loop Boards 15 f. Inverse Transform Board 16 g. Composite Video Output Board 16...36 a. Display Refresh Memory 36 (1) Memory Section 37 (2) Timing and Control 39 b. Bit Unpacker and Inverse DPCM 40 c. Inverse Transform Processor 43

  11. Internet piracy

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  12. A chaotic stream cipher and the usage in video protection

    Lian Shiguo; Sun Jinsheng; Wang Jinwei; Wang Zhiquan

    2007-01-01

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  13. An improvement analysis on video compression using file segmentation

    Sharma, Shubhankar; Singh, K. John; Priya, M.

    2017-11-01

    From the past two decades the extreme evolution of the Internet has lead a massive rise in video technology and significantly video consumption over the Internet which inhabits the bulk of data traffic in general. Clearly, video consumes that so much data size on the World Wide Web, to reduce the burden on the Internet and deduction of bandwidth consume by video so that the user can easily access the video data.For this, many video codecs are developed such as HEVC/H.265 and V9. Although after seeing codec like this one gets a dilemma of which would be improved technology in the manner of rate distortion and the coding standard.This paper gives a solution about the difficulty for getting low delay in video compression and video application e.g. ad-hoc video conferencing/streaming or observation by surveillance. Also this paper describes the benchmark of HEVC and V9 technique of video compression on subjective oral estimations of High Definition video content, playback on web browsers. Moreover, this gives the experimental ideology of dividing the video file into several segments for compression and putting back together to improve the efficiency of video compression on the web as well as on the offline mode.

  14. Video games

    Kolář, Vojtěch

    2012-01-01

    This thesis is based on a detailed analysis of various topics related to the question of whether video games can be art. In the first place it analyzes the current academic discussion on this subject and confronts different opinions of both supporters and objectors of the idea, that video games can be a full-fledged art form. The second point of this paper is to analyze the properties, that are inherent to video games, in order to find the reason, why cultural elite considers video games as i...

  15. Is love of nature in the US becoming love of electronic media? 16-year downtrend in national park visits explained by watching movies, playing video games, internet use, and oil prices.

    Pergams, Oliver R W; Zaradic, Patricia A

    2006-09-01

    After 50 years of steady increase, per capita visits to US national parks have declined since 1988. This decline, coincident with the rise in electronic entertainment media, may represent a shift in recreation choices with broader implications for the value placed on biodiversity conservation and environmentally responsible behavior. We compared the decline in per capita visits with a set of indicators representing alternate recreation choices and constraints. The Spearman correlation analyses found this decline in NPV to be significantly negatively correlated with several electronic entertainment indicators: hours of television, (rs=-0.743, P<0.001), video games (rs=-0.773, P<0.001), home movies (rs=-0.788, P<0.001), theatre attendance (rs=-0.587, P<0.025) and internet use (rs=-0.783, P<0.001). There were also significant negative correlations with oil prices (rs=-0.547, P<0.025), foreign travel (rs=-0.452, P<0.05), and Appalachian Trail hikers (rs=-0.785, P<0.001). Income was significantly positively correlated with foreign travel (rs=0.621, P<0.005) but negatively correlated with national park visits (rs=-0.697, P<0.005). There was no significant correlation of mean number of vacation days, indicating available vacation time is probably not a factor. Federal funding actually increased during this period, and so was rejected as a probable factor. Park capacity was rejected as limiting since both total overnight stays and visits at the seven most popular parks rose well into the mid-1990s. Aging of baby boomers was also rejected as they are only now reaching retirement age, and thus during the period of visitation decline were still of prime family vacation age. Multiple linear regression of four of the entertainment media variables as well as oil prices explains 97.5% of this recent decline (r=0.975, multiple r2=0.950, adjusted multiple r2=0.925, SE=0.015, F=37.800, P<0.0001). We may be seeing evidence of a fundamental shift away from people's appreciation of

  16. [Internet addiction].

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  17. Internet Policy

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  18. [Internet addiction--a case report].

    Pejović-Milovancević, Milica; Popović-Deusić, Smiljka; Draganić-Gajić, Saveta; Lecić-Tosevski, Dusica

    2009-01-01

    Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction). Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behaviour. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  19. ATM and Internet protocol

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  20. A cross-sectional analysis of video games and attention deficit hyperactivity disorder symptoms in adolescents

    Rabinowitz Terry; Chan Philip A

    2006-01-01

    Abstract Background Excessive use of the Internet has been associated with attention deficit hyperactivity disorder (ADHD), but the relationship between video games and ADHD symptoms in adolescents is unknown. Method A survey of adolescents and parents (n = 72 adolescents, 72 parents) was performed assessing daily time spent on the Internet, television, console video games, and Internet video games, and their association with academic and social functioning. Subjects were high school students...

  1. Secure E-Commerce Protocol

    Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin

    2011-01-01

    E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Proto...

  2. Monitoring and diagnosis of vegetable growth based on internet of things

    Zhang, Qian; Yu, Feng; Fu, Rong; Li, Gang

    2017-10-01

    A new condition monitoring method of vegetable growth was proposed, which was based on internet of things. It was combined remote environmental monitoring, video surveillance, intelligently decision-making and two-way video consultation together organically.

  3. The wireless internet explained

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  4. Akademisk video

    Frølunde, Lisbeth

    2017-01-01

    Dette kapitel har fokus på metodiske problemstillinger, der opstår i forhold til at bruge (digital) video i forbindelse med forskningskommunikation, ikke mindst online. Video har længe været benyttet i forskningen til dataindsamling og forskningskommunikation. Med digitaliseringen og internettet ...

  5. Internet effects

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  6. A laboratory evaluation of color video monitors

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video monitors used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color video technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories established a program to evaluate the newest relevant color video equipment. This report documents the evaluation of an integral component, color monitors. It briefly discusses a critical parameter, dynamic range, details test procedures, and evaluates the results

  7. A laboratory evaluation of color video monitors

    Terry, P.L.

    1993-07-01

    Sandia National Laboratories has considerable experience with monochrome video monitors used in alarm assessment video systems. Most of these systems, used for perimeter protection, were designed to classify rather than to identify intruders. There is a growing interest in the identification function of security video systems for both access control and insider protection. Because color video technology is rapidly changing and because color information is useful for identification purposes, Sandia National Laboratories established a program to evaluate the newest relevant color video equipment. This report documents the evaluation of an integral component, color monitors. It briefly discusses a critical parameter, dynamic range, details test procedures, and evaluates the results.

  8. Cyber Security : Home User's Perspective

    Ikonen, Mikko

    2014-01-01

    Cyber security is important to understand for home users. New technology allows for new cyber threats to emerge and new solutions must be considered to counter them. Nearly every device is connected to the Internet and this opens new possibilities and threats to cyber security. This Bachelor's thesis explores the different aspects of cyber security and suggests solutions to different cyber security issues found. The different aspects of cyber security under research here include personal ...

  9. Internet enlightens; Internet eclaire

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  10. Volume of Requests for Internet Medicare Replacement Cards

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2008 onwards for Internet Medicare Replacement Card. The dataset includes only...

  11. Interactive video audio system: communication server for INDECT portal

    Mikulec, Martin; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Rozhon, Jan; Mehic, Miralem

    2014-05-01

    The paper deals with presentation of the IVAS system within the 7FP EU INDECT project. The INDECT project aims at developing the tools for enhancing the security of citizens and protecting the confidentiality of recorded and stored information. It is a part of the Seventh Framework Programme of European Union. We participate in INDECT portal and the Interactive Video Audio System (IVAS). This IVAS system provides a communication gateway between police officers working in dispatching centre and police officers in terrain. The officers in dispatching centre have capabilities to obtain information about all online police officers in terrain, they can command officers in terrain via text messages, voice or video calls and they are able to manage multimedia files from CCTV cameras or other sources, which can be interesting for officers in terrain. The police officers in terrain are equipped by smartphones or tablets. Besides common communication, they can reach pictures or videos sent by commander in office and they can respond to the command via text or multimedia messages taken by their devices. Our IVAS system is unique because we are developing it according to the special requirements from the Police of the Czech Republic. The IVAS communication system is designed to use modern Voice over Internet Protocol (VoIP) services. The whole solution is based on open source software including linux and android operating systems. The technical details of our solution are presented in the paper.

  12. Task-oriented quality assessment and adaptation in real-time mission critical video streaming applications

    Nightingale, James; Wang, Qi; Grecos, Christos

    2015-02-01

    In recent years video traffic has become the dominant application on the Internet with global year-on-year increases in video-oriented consumer services. Driven by improved bandwidth in both mobile and fixed networks, steadily reducing hardware costs and the development of new technologies, many existing and new classes of commercial and industrial video applications are now being upgraded or emerging. Some of the use cases for these applications include areas such as public and private security monitoring for loss prevention or intruder detection, industrial process monitoring and critical infrastructure monitoring. The use of video is becoming commonplace in defence, security, commercial, industrial, educational and health contexts. Towards optimal performances, the design or optimisation in each of these applications should be context aware and task oriented with the characteristics of the video stream (frame rate, spatial resolution, bandwidth etc.) chosen to match the use case requirements. For example, in the security domain, a task-oriented consideration may be that higher resolution video would be required to identify an intruder than to simply detect his presence. Whilst in the same case, contextual factors such as the requirement to transmit over a resource-limited wireless link, may impose constraints on the selection of optimum task-oriented parameters. This paper presents a novel, conceptually simple and easily implemented method of assessing video quality relative to its suitability for a particular task and dynamically adapting videos streams during transmission to ensure that the task can be successfully completed. Firstly we defined two principle classes of tasks: recognition tasks and event detection tasks. These task classes are further subdivided into a set of task-related profiles, each of which is associated with a set of taskoriented attributes (minimum spatial resolution, minimum frame rate etc.). For example, in the detection class

  13. Oncology information on the Internet.

    Goto, Yasushi; Nagase, Takahide

    2012-05-01

    Owing to new developments in Internet technologies, the amount of available oncology information is growing. Both patients and caregivers are increasingly using the Internet to obtain medical information. However, while it is easy to provide information, ensuring its quality is always a concern. Thus, many instruments for evaluating the quality of health information have been created, each with its own advantages and disadvantages. The increasing importance of online search engines such as Google warrants the examination of the correlation between their rankings and medical quality. The Internet also mediates the exchange of information from one individual to another. Mailing lists of advocate groups and social networking sites help spread information to patients and caregivers. While text messages are still the main medium of communication, audio and video messages are also increasing rapidly, accelerating the communication on the Internet. Future health information developments on the Internet include merging patients' personal information on the Internet with their traditional health records and facilitating the interaction among patients, caregivers and health-care providers. Through these developments, the Internet is expected to strengthen the mutually beneficial relationships among all stakeholders in the field of medicine.

  14. Internet printing

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  15. Digital video for the desktop

    Pender, Ken

    1999-01-01

    Practical introduction to creating and editing high quality video on the desktop. Using examples from a variety of video applications, benefit from a professional's experience, step-by-step, through a series of workshops demonstrating a wide variety of techniques. These include producing short films, multimedia and internet presentations, animated graphics and special effects.The opportunities for the independent videomaker have never been greater - make sure you bring your understanding fully up to date with this invaluable guide.No prior knowledge of the technology is assumed, with explanati

  16. Internet-based remote consultations - general practitioner experience and attitudes in Norway and Germany.

    Kampik, Timotheus; Larsen, Frank; Bellika, Johan Gustav

    2015-01-01

    The objective of the study was to identify experiences and attitudes of German and Norwegian general practitioners (GPs) towards Internet-based remote consultation solutions supporting communication between GPs and patients in the context of the German and Norwegian healthcare systems. Interviews with four German and five Norwegian GPs were conducted. The results were qualitatively analyzed. All interviewed GPs stated they would like to make use of Internet-based remote consultations in the future. Current experiences with remote consultations are existent to a limited degree. No GP reported to use a comprehensive remote consultation solution. The main features GPs would like to see in a remote consultation solution include asynchronous exchange of text messages, video conferencing with text chat, scheduling of remote consultation appointments, secure login and data transfer and the integration of the remote consultation solution into the GP's EHR system.

  17. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of the collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.

  18. Video Podcasts

    Nortvig, Anne Mette; Sørensen, Birgitte Holm

    2016-01-01

    This project’s aim was to support and facilitate master’s students’ preparation and collaboration by making video podcasts of short lectures available on YouTube prior to students’ first face-to-face seminar. The empirical material stems from group interviews, from statistical data created through...... YouTube analytics and from surveys answered by students after the seminar. The project sought to explore how video podcasts support learning and reflection online and how students use and reflect on the integration of online activities in the videos. Findings showed that students engaged actively...

  19. Video games.

    Funk, Jeanne B

    2005-06-01

    The video game industry insists that it is doing everything possible to provide information about the content of games so that parents can make informed choices; however, surveys indicate that ratings may not reflect consumer views of the nature of the content. This article describes some of the currently popular video games, as well as developments that are on the horizon, and discusses the status of research on the positive and negative impacts of playing video games. Recommendations are made to help parents ensure that children play games that are consistent with their values.

  20. [Internet addiction].

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  1. Internet Inquiry

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  2. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  3. Internet research in an international context.

    Baernholdt, Marianne; Clarke, Sean P

    2006-02-01

    Computers and the Internet provide researchers with new options in surveying. When using electronic surveys, several practical and methodological issues need to be considered such as whether the majority of the surveyed population has Internet access and whether an e-mail or a Web-based survey is most appropriate. Other important considerations relate to Internet security issues and, in international research, the possibility of language barriers. Despite these challenges, electronic surveys offer a promising alternative to conventional mail surveys.

  4. Internet Banking integration within the banking system

    Constantin Marian MATEI; Catalin Ionut SILVESTRU; Dragos Stefan SILVESTRU

    2008-01-01

    Internet Banking developed due to increasing demand of online banking transactions. The biggest advantages of Internet Banking consist of complex banking solutions, 24 hours availability, quick and secure access to the back-end application through Internet. These advantages are due to the use of SOA (service-oriented architecture). SOA appeared as a necessity of companies to integrate big and independent portions of applications, in order to obtain an homogeneous functionality of the system....

  5. Internet culture

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  6. Internet Connectivity

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  7. Internet enlightens

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  8. Internet enlightens

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  9. Network security

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  10. O uso de videogames, jogos de computador e internet por uma amostra de universitários da Universidade de São Paulo The use of video, computer and internet games by a sample of college students from the University of São Paulo

    Fernanda Tomie Icassati Suzuki

    2009-01-01

    Full Text Available OBJETIVO: Avaliar uso de jogos eletrônicos (videogames, jogos de computador e internet em uma amostra de universitários. MÉTODO: Um questionário a respeito de comportamentos relacionados ao uso de jogos eletrônicos, contendo a escala Problem Videogame Playing (PVP, foi aplicado em 100 alunos da Universidade de São Paulo (USP. RESULTADOS: A maioria (83% relatou ter jogado no último ano, dentre a qual 81,9% eram homens, 51,8% jogavam de 1 a 2 horas por sessão; 74,4% afirmaram que jogar não interfere em seus relacionamentos sociais e 60,5%, que o uso de jogos violentos não influencia sua agressividade. Os estudantes dividiram-se entre jogadores ocasionais e frequentes, diferenciando-se por duração de cada sessão, jogo preferido, motivação para jogar, e influência do jogo na vida social. Cerca de 5% relataram só parar de jogar quando interrompidos, normalmente jogar mais de 4 horas por sessão e se relacionar mais com amigos virtuais, sugerindo maior envolvimento com a atividade. Na escala PVP, 15,8% da amostra preencheu mais da metade dos itens, indicando consequências adversas associadas ao uso dos jogos eletrônicos. CONCLUSÃO: Observou-se que o uso de jogos eletrônicos é comum entre os estudantes da USP e que uma parcela apresenta problemas relacionados ao excesso de jogo.OBJECTIVE: To evaluate the use of electronic games (video games, computer and internet games in a sample of college students. METHOD: A questionnaire on behaviors related to the use of electronic games, including the Problem Videogame Playing (PVP scale was filled in by 100 students from University of São Paulo (USP. RESULTS: The majority (83% reported playing electronic games within the last year, among which, 81,9% were men, 51,8% played between 1 and 2 hours per session; 74,4% reported that the practice of electronic games does not interfere on their social relationships and 60,5% that the use of violent games does not have an effect over their

  11. An Analysis of Fraud on the Internet.

    Baker, C. Richard

    1999-01-01

    Examines the issue of fraud on the Internet and discusses three areas with significant potential for misleading and fraudulent practices: securities sales and trading; electronic commerce, including privacy and information protection; and the rapid growth of Internet companies, including advertising issues. (Author/LRW)

  12. Video Comparator

    Rose, R.P.

    1978-01-01

    The Video Comparator is a comparative gage that uses electronic images from two sources, a standard and an unknown. Two matched video cameras are used to obtain the electronic images. The video signals are mixed and displayed on a single video receiver (CRT). The video system is manufactured by ITP of Chatsworth, CA and is a Tele-Microscope II, Model 148. One of the cameras is mounted on a toolmaker's microscope stand and produces a 250X image of a cast. The other camera is mounted on a stand and produces an image of a 250X template. The two video images are mixed in a control box provided by ITP and displayed on a CRT. The template or the cast can be moved to align the desired features. Vertical reference lines are provided on the CRT, and a feature on the cast can be aligned with a line on the CRT screen. The stage containing the casts can be moved using a Boeckleler micrometer equipped with a digital readout, and a second feature aligned with the reference line and the distance moved obtained from the digital display

  13. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet

    Jason C. Northrup

    2015-07-01

    Full Text Available The Internet Process Addiction Test (IPAT was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term “Internet addiction” is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  14. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet.

    Northrup, Jason C; Lapierre, Coady; Kirk, Jeffrey; Rae, Cosette

    2015-07-28

    The Internet Process Addiction Test (IPAT) was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term "Internet addiction" is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT) demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  15. ADAPTIVE STREAMING OVER HTTP (DASH UNTUK APLIKASI VIDEO STREAMING

    I Made Oka Widyantara

    2015-12-01

    Full Text Available This paper aims to analyze Internet-based streaming video service in the communication media with variable bit rates. The proposed scheme on Dynamic Adaptive Streaming over HTTP (DASH using the internet network that adapts to the protocol Hyper Text Transfer Protocol (HTTP. DASH technology allows a video in the video segmentation into several packages that will distreamingkan. DASH initial stage is to compress the video source to lower the bit rate video codec uses H.26. Video compressed further in the segmentation using MP4Box generates streaming packets with the specified duration. These packages are assembled into packets in a streaming media format Presentation Description (MPD or known as MPEG-DASH. Streaming video format MPEG-DASH run on a platform with the player bitdash teritegrasi bitcoin. With this scheme, the video will have several variants of the bit rates that gave rise to the concept of scalability of streaming video services on the client side. The main target of the mechanism is smooth the MPEG-DASH streaming video display on the client. The simulation results show that the scheme based scalable video streaming MPEG-DASH able to improve the quality of image display on the client side, where the procedure bufering videos can be made constant and fine for the duration of video views

  16. Interactive Internet Based Pendulum for Learning Mechatronics

    Sethson, Magnus R.

    2003-01-01

    This paper describes an Internet based remote experimental setup of a double lined pendulum mechanism for students experiments at the M. Sc. Level. Some of the first year experience using this web-based setup in classes is referred. In most of the courses given at the division of mechanical engineering systems at Linkoeping Institute of Technology we provide experimental setups to enhance the teaching Of M.Sc. students. Many of these experimental setups involve mechatronical systems. Disciplines like fluid power, electronics, and mechanics and also software technologies are used in each experiment. As our campus has recently been split into two different cities some new concepts for distance learning have been studied. The one described here tries to implement remotely controlled mechatronic setups for teaching basic programming of real-time operating systems and analysis of the dynamics of mechanical systems. The students control the regulators for the pendulum through a web interface and get measurement results and a movie back through their email. The present setup uses a double linked pendulum that is controlled by a DC-motor and monitored through both camera and angular position sensors. All software needed is hosted on a double-processor PC running the RedHat 7.1. distribution complemented with real-time scheduling using DIAPM-RTAI 1.7. The Internet site is presented to the students using PHP, Apache and MySQL. All of the used software originates from the open source domain. The experience from integrating these technologies and security issues is discussed together with the web-camera interface. One of the important experiences from this project so far is the need for a good visual feedback. This is both in terms of video speed but also in resolution. It has been noticed that when the students makes misstates and wants to search the failure they want clear, large images with high resolution to support their personal believes in the cause of the failure. Even

  17. 互联网众筹融资的《证券法》适用问题研究%The Legal Research on Internet-based Crowdfunding and The Security Law

    刁文卓

    2015-01-01

    Crowdfunding ,the use of Internet to raise money through small contributions from a large number of investors ,could cause a revolution in small‐business financing .However ,crowdfunding also poses some problems under The Interpretation of the Supreme People's Court of Several Issues on the SpecificApplicationofLawintheHandlingofCriminalCasesaboutIllegalFund‐raising.Inthisarti‐cle ,the author proposed that crowdfunding sometimes involves the sale of securities ,triggering the regis‐tration requirements of T he Security L aw .As a result ,the definition of security should be enlarged under The Security Law .We need to learn overseas experience represented by the JOBS Act ,and accurately de‐fine the legal status and characteristics of crowdfunding .We also need to make the appropriate response to the legal structure and regulatory system of crowdfunding based on the proper coordination between the capital formation and investor protection .%众筹融资作为一种处于萌芽期的互联网金融模式,由于面临数量众多的投资者且融资金额较大,极易触碰非法集资的红线。通过分析,众筹融资本质是一种证券发行行为,筹资者、众筹平台、投资人这三方参与主体分别对应着发行人、证券交易所和投资者这三种《证券法》下的特定主体。但由于我国《证券法》的适用范围过窄,导致众筹融资无法适用《证券法》而被冠以“非法集资”的罪名。因此,扩大“证券”的范围是为众筹融资“正名”的直接途径,同时借鉴美国2012年JOBS法案中对众筹融资注册豁免的经验,在妥善协调资本形成与投资者保护关系的基础上,针对众筹融资的法律构造和监管制度作出相应的回应。

  18. Dementia caregivers' responses to 2 Internet-based intervention programs.

    Marziali, Elsa; Garcia, Linda J

    2011-02-01

    The aim of this study was to examine the impact on dementia caregivers' experienced stress and health status of 2 Internet-based intervention programs. Ninety-one dementia caregivers were given the choice of being involved in either an Internet-based chat support group or an Internet-based video conferencing support group. Pre-post outcome measures focused on distress, health status, social support, and service utilization. In contrast to the Chat Group, the Video Group showed significantly greater improvement in mental health status. Also, for the Video Group, improvements in self-efficacy, neuroticism, and social support were associated with lower stress response to coping with the care recipient's cognitive impairment and decline in function. The results show that, of 2 Internet-based intervention programs for dementia caregivers, the video conferencing intervention program was more effective in improving mental health status and improvement in personal characteristics were associated with lower caregiver stress response.

  19. Networking Foundations for Collaborative Computing at Internet Scope

    Dommel, H-Peter; Garcia-Luna-Aceves, J. J

    2006-01-01

    ... and at various levels of granularity. This aspect stands in contrast to legacy client-server applications such as Internet radio broadcast or video-on-demand, and to asynchronous, document-centric collaboration tools like email, instant...

  20. Digital cinema video compression

    Husak, Walter

    2003-05-01

    The Motion Picture Industry began a transition from film based distribution and projection to digital distribution and projection several years ago. Digital delivery and presentation offers the prospect to increase the quality of the theatrical experience for the audience, reduce distribution costs to the distributors, and create new business opportunities for the theater owners and the studios. Digital Cinema also presents an opportunity to provide increased flexibility and security of the movies for the content owners and the theater operators. Distribution of content via electronic means to theaters is unlike any of the traditional applications for video compression. The transition from film-based media to electronic media represents a paradigm shift in video compression techniques and applications that will be discussed in this paper.

  1. Secure Embedded Systems

    2016-02-26

    enables each subsystem with a key management (KM) function and an Advanced Encryption Standard ( AES ) encryption and decryption function. Subsystem A...off, flies to its destination, and then collects video data. Video data containing target information are encrypted and broadcast to authorized ground...select these devices on the basis of their ability to encrypt and authenticate configuration bitstreams, incorporate security monitors to detect attacks

  2. Optimal resource allocation for distributed video communication

    He, Yifeng

    2013-01-01

    While most books on the subject focus on resource allocation in just one type of network, this book is the first to examine the common characteristics of multiple distributed video communication systems. Comprehensive and systematic, Optimal Resource Allocation for Distributed Video Communication presents a unified optimization framework for resource allocation across these systems. The book examines the techniques required for optimal resource allocation over Internet, wireless cellular networks, wireless ad hoc networks, and wireless sensor networks. It provides you with the required foundat

  3. Learning from Narrated Instruction Videos.

    Alayrac, Jean-Baptiste; Bojanowski, Piotr; Agrawal, Nishant; Sivic, Josef; Laptev, Ivan; Lacoste-Julien, Simon

    2017-09-05

    Automatic assistants could guide a person or a robot in performing new tasks, such as changing a car tire or repotting a plant. Creating such assistants, however, is non-trivial and requires understanding of visual and verbal content of a video. Towards this goal, we here address the problem of automatically learning the main steps of a task from a set of narrated instruction videos. We develop a new unsupervised learning approach that takes advantage of the complementary nature of the input video and the associated narration. The method sequentially clusters textual and visual representations of a task, where the two clustering problems are linked by joint constraints to obtain a single coherent sequence of steps in both modalities. To evaluate our method, we collect and annotate a new challenging dataset of real-world instruction videos from the Internet. The dataset contains videos for five different tasks with complex interactions between people and objects, captured in a variety of indoor and outdoor settings. We experimentally demonstrate that the proposed method can automatically discover, learn and localize the main steps of a task input videos.

  4. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  5. The Overview and Appliance of some Streaming Video software solutions

    Qin , Yan

    2010-01-01

    This paper introduces the basic streaming media technology, the streaming media system structure, principles of streaming media technology; streaming media file formats and so on. After that, it discusses the use streaming media in distance education, broadband video on demand, Internet broadcasting, video conferences and a more detailed exposition in streaming media. As the existing technology has been unable to satisfy the increasing needs of the Internet users, the streaming media technol...

  6. PUBLICATION BANS IN A FACEBOOK AGE: HOW INTERNET VIGILANTES HAVE CHALLENGED THE YOUTH CRIMINAL JUSTICE ACT’S “SECRECY LAWS” FOLLOWING THE 2011 VANCOUVER STANLEY CUP RIOT

    Tania Arvanitidis

    2016-08-01

    Full Text Available On June 15th, 2011, a hockey riot occurred in Vancouver, British Columbia. This event is prominent in Canada’s history for, among other reasons, the unprecedented extent to which it was documented via photographs and video footage. The days that followed the riot saw much of this media documentation uploaded to social media platforms on the Internet, where Internet users worked together to identify and collectively “name and shame” those believed to have been involved in the disturbance. Several individuals targeted by these “Internet vigilantes” were young offenders whose identities are legally protected from publication under the Youth Criminal Justice Act (YCJA. This article examines the phenomenon of “Internet vigilantism”, and raises the issue of whether those provisions within the YCJA that prohibit the identification of youth remain relevant today, given the current difficulties in enforcing these provisions. Following an overview of these “secrecy provisions”, the phenomenon of Internet vigilantism is defined, and challenges posed by acts of Internet vigilantism are discussed. A “naming and shaming” Facebook group created for the purpose of identifying participants in the 2011 Vancouver riot is then looked to as a case study of Internet vigilantism in action. This article concludes with recommendations for how justice officials and social media outlets may modify current practices to better protect the safety and security of young offenders, and to minimize harmful instances of Internet vigilantism.

  7. 5G internet of things: A survey

    Li, S.; Xu, L.; Zhao, S.

    2018-01-01

    The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today's IoT that can boost cellular operationgs, IoT security, and network challenges and driving the Internet future to the edge. The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. This...

  8. VoIP Security

    Fontanini, Piero

    2008-01-01

    VOIP or Voice Over Internet Protocol is a common term for phone service over IP based networks. There are much information about VoIP and some of how VoIP can be secured. There is however no standard for VoIP and no general solution for VoIP Security. The security in VoIP systems today are often non existing or in best case weak and often based on proprietary solutions. This master thesis investigates threats to VoIP system and describes existing alternatives for securing Vo...

  9. Internet firewalls: questions and answers

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  10. Video Golf

    1995-01-01

    George Nauck of ENCORE!!! invented and markets the Advanced Range Performance (ARPM) Video Golf System for measuring the result of a golf swing. After Nauck requested their assistance, Marshall Space Flight Center scientists suggested video and image processing/computing technology, and provided leads on commercial companies that dealt with the pertinent technologies. Nauck contracted with Applied Research Inc. to develop a prototype. The system employs an elevated camera, which sits behind the tee and follows the flight of the ball down range, catching the point of impact and subsequent roll. Instant replay of the video on a PC monitor at the tee allows measurement of the carry and roll. The unit measures distance and deviation from the target line, as well as distance from the target when one is selected. The information serves as an immediate basis for making adjustments or as a record of skill level progress for golfers.

  11. Towards a quantum internet

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  12. A Security Checklist for ERP Implementations

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  13. Everyone's Internet

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  14. Internet Sexualities

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  15. Internet bullying.

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Computer Security: the security marathon

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  17. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    2010-08-01

    SUBJECT TERMS Internet Protocol, Computer Networking, Network Security, Computer Security, Technology Deployment 16. SECURITY CLASSIFICATION OF...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and...Science and Technology committee and the Internet Architecture Board. Dr. Sincoskie was Executive Director of the Computer Networking Research

  18. Video media-induced aggressiveness in children.

    Cardwell, Michael Steven

    2013-09-01

    Transmission of aggressive behaviors to children through modeling by adults has long been a commonly held psychological concept; however, with the advent of technological innovations during the last 30 years, video media-television, movies, video games, and the Internet-has become the primary model for transmitting aggressiveness to children. This review explores the acquisition of aggressive behaviors by children through modeling behaviors in violent video media. The impact of aggressive behaviors on the child, the family, and society is addressed. Suggestive action plans to curb this societal ill are presented.

  19. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Watzlaf, Valerie J.M.; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR. PMID:25945172

  20. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance

    Valerie J.M. Watzlaf

    2010-10-01

    Full Text Available Voice over the Internet Protocol (VoIP systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR therapy that can provide voice and video teleconferencing between patients and therapists.  Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care, and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.   

  1. VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance.

    Watzlaf, Valerie J M; Moeini, Sohrab; Firouzan, Patti

    2010-01-01

    Voice over the Internet Protocol (VoIP) systems such as Adobe ConnectNow, Skype, ooVoo, etc. may include the use of software applications for telerehabilitation (TR) therapy that can provide voice and video teleconferencing between patients and therapists. Privacy and security applications as well as HIPAA compliance within these protocols have been questioned by information technologists, providers of care and other health care entities. This paper develops a privacy and security checklist that can be used within a VoIP system to determine if it meets privacy and security procedures and whether it is HIPAA compliant. Based on this analysis, specific HIPAA criteria that therapists and health care facilities should follow are outlined and discussed, and therapists must weigh the risks and benefits when deciding to use VoIP software for TR.

  2. Internet Policy

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  3. Internet Shopping

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  4. [Internet addiction].

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  5. OAS :: Videos

    subscriptions Videos Photos Live Webcast Social Media Facebook @oasofficial Facebook Twitter @oas_official Audios Photos Social Media Facebook Twitter Newsletters Press and Communications Department Contact us at Rights Actions against Corruption C Children Civil Registry Civil Society Contact Us Culture Cyber

  6. Automatic mashup generation of multiple-camera videos

    Shrestha, P.

    2009-01-01

    The amount of user generated video content is growing enormously with the increase in availability and affordability of technologies for video capturing (e.g. camcorders, mobile-phones), storing (e.g. magnetic and optical devices, online storage services), and sharing (e.g. broadband internet,

  7. Factors that Influence Learning Satisfaction Delivered by Video Streaming Technology

    Keenan, Daniel Stephen

    2010-01-01

    In 2005, over 100,000 e-Learning courses were offered in over half of all U.S. postsecondary education institutions with nearly 90% of all community colleges and four year institutions offering online education. Streaming video is commonplace across the internet offering seamless video and sound anywhere connectivity is available effectively…

  8. Playing with Video Games: Going to a New Addiction?

    Tavormina, Maurilio Giuseppe Maria; Tavormina, Romina

    2017-09-01

    The frequent and protracted use of video games with serious personal, family and social consequences is no longer just a pleasant pastime and could lead to mental and physical health problems. Although there is no official recognition of video game addiction on the Internet as a mild mental health disorder, further scientific research is needed.

  9. Delivering Extension to the Living Room Using Internet TV

    Rice, Grant G., III

    2014-01-01

    Television is a widely adopted source for viewing educational information. Unfortunately, producing a television show on network television can be costly and time consuming. Internet TV offers Extension video content producers the opportunity to create a niche topic channel quickly and at low cost. Internet TV offers viewers a low-cost and…

  10. Internet Use and Cognitive Development: A Theoretical Framework

    Johnson, Genevieve

    2006-01-01

    The number of children and adolescents accessing the Internet as well as the amount of time online are steadily increasing. The most common online activities include playing video games, accessing web sites, and communicating via chat rooms, email, and instant messaging. A theoretical framework for understanding the effects of Internet use on…

  11. Multimedia presentation of radiological image data using the internet

    Beier, J.; Sell, C.; Hosten, N.; Fleck, E.; Felix, R.

    1997-01-01

    Aim: Recent developments of the Internet (World Wide Web) allow the integration of audio, video, digital film sequences, and three-dimensional data. The applicability of these innovations for medical documentation is demonstrated. Methods: Our existing software for medical image processing and 3D reconstruction was extended to provide images, film sequences, and complex 3D models in an Internet-compatible data format. Results: The multimedia results of the image processing were integrated into Internet documents. Specialized programs are no longer necessary for visualization. The Internet software allows for user-friendly handling and interactive presentation of the 2D and 3D data. Conclusions: The Internet offers public-domain software for display of images, audio/video, and 3D data. Thus, the tools of the Internet represent an ideal basis for local hospital information systems, computer-aided medical education, and teleconferencing. (orig.) [de

  12. Video game addiction test: validity and psychometric characteristics.

    Rooij, A.J. van; Schoenmakers, T.M.; Eijnden, R.J.J.M. van den; Vermulst, A.A.; Mheen, D. van de

    2012-01-01

    The study explores the reliability, validity, and measurement invariance of the Video game Addiction Test (VAT). Game-addiction problems are often linked to Internet enabled online games; the VAT has the unique benefit that it is theoretically and empirically linked to Internet addiction. The study

  13. Video Game Addiction Test: Validity and Psychometric Characteristics

    Rooij, A.J. van; Schoenmakers, T.M.; Eijnden, R.J.J.M. van den; Vermulst, A.A.; Mheen, H. van de

    2012-01-01

    The study explores the reliability, validity, and measurement invariance of the Video game Addiction Test (VAT). Game-addiction problems are often linked to Internet enabled online games; the VAT has the unique benefit that it is theoretically and empirically linked to Internet addiction. The study

  14. Error Resilient Video Compression Using Behavior Models

    Jacco R. Taal

    2004-03-01

    Full Text Available Wireless and Internet video applications are inherently subjected to bit errors and packet errors, respectively. This is especially so if constraints on the end-to-end compression and transmission latencies are imposed. Therefore, it is necessary to develop methods to optimize the video compression parameters and the rate allocation of these applications that take into account residual channel bit errors. In this paper, we study the behavior of a predictive (interframe video encoder and model the encoders behavior using only the statistics of the original input data and of the underlying channel prone to bit errors. The resulting data-driven behavior models are then used to carry out group-of-pictures partitioning and to control the rate of the video encoder in such a way that the overall quality of the decoded video with compression and channel errors is optimized.

  15. 4K Video Traffic Prediction using Seasonal Autoregressive Modeling

    D. R. Marković

    2017-06-01

    Full Text Available From the perspective of average viewer, high definition video streams such as HD (High Definition and UHD (Ultra HD are increasing their internet presence year over year. This is not surprising, having in mind expansion of HD streaming services, such as YouTube, Netflix etc. Therefore, high definition video streams are starting to challenge network resource allocation with their bandwidth requirements and statistical characteristics. Need for analysis and modeling of this demanding video traffic has essential importance for better quality of service and experience support. In this paper we use an easy-to-apply statistical model for prediction of 4K video traffic. Namely, seasonal autoregressive modeling is applied in prediction of 4K video traffic, encoded with HEVC (High Efficiency Video Coding. Analysis and modeling were performed within R programming environment using over 17.000 high definition video frames. It is shown that the proposed methodology provides good accuracy in high definition video traffic modeling.

  16. Secure quantum key distribution

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  17. Security in cloud computing

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  18. Faktor Penentu Yang Mempengaruhi Penggunaan Layanan Internet Banking

    Sihotang, Ellen Theresia

    2016-01-01

    This study aims to analysis the important factor that influence the use of internet banking according to Booklet Perbankan Indonesia 2016 and the implication for the marketing of internet banking services. Security has become a determining factor which affecting the use of internet banking services. It is important for the bank to find out how to maintain the customers who have used the internet banking services in order to encounter competition with a variety of banking services distributi...

  19. Validation of Internet Application: Study, Analysis and Evaluation

    Dinesh Kumar

    2012-01-01

    Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. The Internet Security became a very important and complex field of researches in our present time, especially if we apply this to the discussion of Internet protocols as basic interfaces for exchanging sensitive data over the Internet and finding appropriate and trustworthy algorithms for their validation. Test Competence Centre at Ericsson AB has expertise on tes...

  20. The Use of Smart Glasses for Surgical Video Streaming.

    Hiranaka, Takafumi; Nakanishi, Yuta; Fujishiro, Takaaki; Hida, Yuichi; Tsubosaka, Masanori; Shibata, Yosaku; Okimura, Kenjiro; Uemoto, Harunobu

    2017-04-01

    Observation of surgical procedures performed by experts is extremely important for acquisition and improvement of surgical skills. Smart glasses are small computers, which comprise a head-mounted monitor and video camera, and can be connected to the internet. They can be used for remote observation of surgeries by video streaming. Although Google Glass is the most commonly used smart glasses for medical purposes, it is still unavailable commercially and has some limitations. This article reports the use of a different type of smart glasses, InfoLinker, for surgical video streaming. InfoLinker has been commercially available in Japan for industrial purposes for more than 2 years. It is connected to a video server via wireless internet directly, and streaming video can be seen anywhere an internet connection is available. We have attempted live video streaming of knee arthroplasty operations that were viewed at several different locations, including foreign countries, on a common web browser. Although the quality of video images depended on the resolution and dynamic range of the video camera, speed of internet connection, and the wearer's attention to minimize image shaking, video streaming could be easily performed throughout the procedure. The wearer could confirm the quality of the video as the video was being shot by the head-mounted display. The time and cost for observation of surgical procedures can be reduced by InfoLinker, and further improvement of hardware as well as the wearer's video shooting technique is expected. We believe that this can be used in other medical settings.

  1. Characterization of YouTube Video Streaming Traffic

    Ravattu, Radha; Balasetty, Prudhviraj

    2013-01-01

    Online digital videos have made a revolutionary evolution since the social networking sites such as YouTube and Hulu have emerged. These websites facilitate video accessable and only a click away. Ever increasing internet traffic and a very significant increase in the use of videos in social networking has led to the problem of network congestion. Consequently, it becomes essential and imperative to analyze the traffic flow and comprehend how it is being delivered from the server. If the flow...

  2. Video Coding Technique using MPEG Compression Standards

    Akorede

    The two dimensional discrete cosine transform (2-D DCT) is an integral part of video and image compression ... solution for the optimum trade-off by applying rate-distortion theory has been ..... Int. J. the computer, the internet and management,.

  3. Avoiding the internet of insecure industrial things

    Urquhart, Lachlan; McAuley, Derek

    2018-01-01

    Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to ...

  4. DASH-based network performance-aware solution for personalised video delivery systems

    Rovcanin, Lejla

    2016-01-01

    Video content is an increasingly prevalent contributor of Internet traffic. The proliferation of available video content has been fuelled by both Internet expansion and the growing power and affordability of viewing devices. Such content can be consumed anywhere and anytime, using a variety of technologies. The high data rates required for streaming video content and the large volume of requests for such content degrade network performance when devices compete for finite network bandwidth. Th...

  5. Analisis Kinerja Trafik Video Chatting Pada Sistem Client- Client Dengan Aplikasi Wireshark

    Yuvandra, Rayhan

    2014-01-01

    Teknologi Video chat adalah salah satu media komunikasi yang memberikan kemudahan pengguna untuk dapat melihat wajah lawan bicara dalam chatting dengan menggunakan kamera yang terdapat di notebook atau perangkat komputer. Video chat juga membutuhkan jaringan internet sebagai media transmisinya. Salah satu aplikasi untuk video chat adalah skype. Skype adalah software aplikasi komunikasi suara berbasis IP dengan teknologi P2P ( peer to peer ) melalui internet antara sesama pengguna skype. Pene...

  6. Internet Alternatifs

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  7. A method of mobile video transmission based on J2ee

    Guo, Jian-xin; Zhao, Ji-chun; Gong, Jing; Chun, Yang

    2013-03-01

    As 3G (3rd-generation) networks evolve worldwide, the rising demand for mobile video services and the enormous growth of video on the internet is creating major new revenue opportunities for mobile network operators and application developers. The text introduced a method of mobile video transmission based on J2ME, giving the method of video compressing, then describing the video compressing standard, and then describing the software design. The proposed mobile video method based on J2EE is a typical mobile multimedia application, which has a higher availability and a wide range of applications. The users can get the video through terminal devices such as phone.

  8. Quality of Experience management for video streams : the case of Skype

    Liotta, A.; Druda, L.; Exarchakos, G.; Menkovski, V.; Khalil, I.

    2012-01-01

    With the widespread adoption of mobile Internet, the process of streaming video has become varied and complex. A diversity of factors affect the way we perceive quality in video streaming (also known as 'quality of experience', or QoE), involving far more than the individual video and network

  9. Video teleconsultation service: who is needed to do what, to get it implemented in daily care?

    Visser, Jacqueline J W; Bloo, J K C; Grobbe, F A; Vollenbroek-Hutten, M M R

    2010-05-01

    In telemedicine, technology is used to deliver services. Because of this, it is expected that various actors other than those involved in traditional care are involved in and need to cooperate, to deliver these services. The aim of this study was to establish a clear understanding of these actors and their roles and interrelationships in the delivery of telemedicine. A video teleconsultation service is used as a study case. A business modeling approach as described in the Freeband Business Blueprint Method was used. The method brings together the four domains that make up a business model, that is, service, technology, organization, and finance, and covers the integration of these domains. The method uses several multidisciplinary workshops, addressing each of the four domains. Results of the four domains addressed showed that (1) the video teleconsultation service is a store and put-forward video teleconsult for healthcare providers. The service is accepted and has added value for the quality of care. However, the market is small; (2) the technology consists of a secured Internet Web-based application, standard personal computer, broadband Internet connection, and a digital camera; (3) a new role and probably entity, responsible for delivering the integrated service to the healthcare professionals, was identified; and finally (4) financial reimbursement for the service delivery is expected to be most successful when set up through healthcare insurance companies. Pricing needs to account for the fee of healthcare professionals as well as for technical aspects, education, and future innovation. Implementation of the video teleconsult service requires multidisciplinary cooperation and integration. Challenging aspects are the small market size and the slow implementation speed, among others. This supports the argument that accumulation of several telemedicine applications is necessary to make it financially feasible for at least some of the actors.

  10. Application Security Automation

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  11. Understanding computer security

    Etalle, Sandro; Zannone, N.

    2014-01-01

    Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely

  12. Variations in recruitment yield, costs, speed and participant diversity across Internet platforms in a global study examining the efficacy of an HIV/AIDS and HIV testing animated and live-action video among English- or Spanish-speaking Internet or social media users

    Winnie Shao

    2015-04-01

    Full Text Available For a world-wide, Internet-based study on HIV/AIDS and HIV testing knowledge, we compared the yields, speed and costs of recruitment and participant diversity across free postings on 13 Internet or social media platforms, paid advertising or postings on 3 platforms, and separate free postings and paid advertisements on Facebook. Platforms were compared by study completions (yield, time to completion, completion to enrollment ratios (CERs, and costs/completion; and by participants’ demographic characteristics, HIV testing history, and health literacy levels. Of the 482 English-speaking participants, Amazon Mechanical Turk yielded the most participants, recruited participants at the fastest rate and had the highest CER (0.78 and lowest costs/completion. Of the 335 Spanish-speaking participants, Facebook yielded the most participants and recruited participants at the fastest rate, although Amazon Mechanical Turk had the highest CER (0.72 and lowest costs/completion. Across platforms participants differed substantially according to their demographic characteristics, HIV testing history and health literacy skills. The study results highlight the need for researchers to strongly consider choice of Internet or social media platforms when conducting Internet-based research. Because of the sample specifications and cost restraints of studies, specific Internet/social media or participant selection platforms will be much more effective or appropriate than others.

  13. VARIATIONS IN RECRUITMENT YIELD, COSTS, SPEED AND PARTICIPANT DIVERSITY ACROSS INTERNET PLATFORMS IN A GLOBAL STUDY EXAMINING THE EFFICACY OF AN HIV/AIDS AND HIV TESTING ANIMATED AND LIVE-ACTION VIDEO AMONG ENGLISH- OR SPANISH-SPEAKING INTERNET OR SOCIAL MEDIA USERS.

    Shao, Winnie; Guan, Wentao; Clark, Melissa A; Liu, Tao; Santelices, Claudia; Cortés, Dharma E; Merchant, Roland C

    For a world-wide, Internet-based study on HIV/AIDS and HIV testing knowledge, we compared the yields, speed and costs of recruitment and participant diversity across free postings on 13 Internet or social media platforms, paid advertising or postings on 3 platforms, and separate free postings and paid advertisements on Facebook. Platforms were compared by study completions (yield), time to completion, completion to enrollment ratios (CERs), and costs/ completion; and by participants' demographic characteristics, HIV testing history, and health literacy levels. Of the 482 English-speaking participants, Amazon Mechanical Turk yielded the most participants, recruited participants at the fastest rate and had the highest CER (0.78) and lowest costs / completion. Of the 335 Spanish-speaking participants, Facebook yielded the most participants and recruited participants at the fastest rate, although Amazon Mechanical Turk had the highest CER (0.72) and lowest costs/completion. Across platforms participants differed substantially according to their demographic characteristics, HIV testing history and health literay skills. The study results highlight the need for researchers to strongly consider choice of Internet or social media plaforms when conducting Internet-based research. Because of the sample specifications and cost restraints of studies, specific Internet/ social media or participant selection plaforms will be much more effective or appropriate than others.

  14. Customer perceptions on Internet banking information protection

    André Redlinghuis

    2010-12-01

    Objectives: This article has reported on the results of a survey (a close-ended questionnaire that was conducted by alumni of the University of Johannesburg (UJ. The research problem for this study has been formulated as ‘what are Internet banking customers’ perception on information protection when using Internet banking services and products?’ Method: The methodology for this study falls on quantitative research. The research study consisted of a detailed literature review, followed by an empirical component which consisted of a quantitative questionnaire. The questionnaire used in this study consisted of eight sections covering biographical information, financial institution and Internet banking, Internet banking service quality and delivery, Internet banking functionality, Internet banking costs, Internet banking convenience and relationships, Internet banking trust and Internet banking security and information technology (IT. Results: It was established that the findings of this research could assist financial institutions with fostering and building greater value adding relationships with their customers. These value-adding endeavours will ensure that customers experience and perceive their Internet banking experience to be enriching. Education and awareness campaigns are key focus areas financial institutions should continuously invest in. Information should be easily retrievable and communicated in a manner that makes sense to the diverse customer base, especially within South Africa with its diverse cultures and languages. Conclusion: The final conclusion that could be reached is that Internet banking products and services will continue to grow across various divides and platforms as the Internet costs decrease in future, the growth of Internet related products and services such as Internet banking will increase.

  15. Security Issues in E-Business Platforms

    Defta Costinela – Luminita; Iacob Nicoleta - Magdalena

    2011-01-01

    E-business consists mostly in the implementation of the business processes by using the information technology and internet services. Since all business processes must be connected to the internet and available for users, the choice of the information solutions on which e-business is built is crucial for the security. Now more than ever, businesses need to be concerned about the security of their networks. In this paper we will highlight the security threats related to the e-business platform...

  16. IP Security für Linux

    Parthey, Mirko

    2001-01-01

    Die Nutzung des Internet für sicherheitskritische Anwendungen erfordert kryptographische Schutzmechanismen. IP Security (IPsec) definiert dafür geeignete Protokolle. Diese Arbeit gibt einen Überblick über IPsec. Eine IPsec-Implementierung für Linux (FreeS/WAN) wird auf Erweiterbarkeit und Praxistauglichkeit untersucht. Using the Internet in security-critical areas requires cryptographic protection, for which IP Security (IPsec) defines suitable protocols. This paper gives an overview of IP...

  17. Summary Report on Unconditionally Secure Protocols

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  18. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  19. Identifying hidden voice and video streams

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  20. Linux Server Security

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--