55 Hits in 11.3 sec

Happiness for Your Children and Grandchildren

Narciso Rosario
2022 Zenodo  
The documents Snowden stole from the NSA proved that by 2012 they had the ability to 163 : app developer's private key into all iOS applications.  ...  of attacks against our rights and, the proper, moral way of life.  ...  Whenever a government official promises to give us free stuff what they're promising to do is to steal from our neighbor or our children's future (if they finance it with debt) take a huge cut for themselves  ... 
doi:10.5281/zenodo.5874767 fatcat:6phwrwxwt5fzln2ai2x3lwfpie

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
All errors and omissions are my own (though of course I faced constraints on length and number of citations).  ...  I also thank Tuomas Sandholm for feedback on the kidney exchange section, and David Pennock for feedback on the prediction markets section.  ...  According to Stanton, Bintro's goal is not only to demonstrate the use of Web 3.0 technologies today, but also to build an engine for powering other Web 3.0 apps in the future.  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

Journalism and public relations

Guy Versailles
2020 Journal of Professional Communication  
What if, to the contrary the way to the future would be cooperation between news media?  ...  Are newsrooms flooded with emails from citizens who demand more?  ...  True to the North-American journalistic tradition, it stays well away from any suggestion that government might support the media directly.  ... 
doi:10.15173/jpc.v6i1.4343 fatcat:yzxar25v2felrbhizbjwgsfwpm

On the importance of ecologically valid usable security research for end users and IT workers [article]

Sascha Fahl, University, My
System Designers: Distributing Software in a Bullet-Proof Way Disclaimer: The contents of this chapter were previously published as part of the paper "Hey, NSA: Stay Away from my Market!  ...  Future Proofing App Markets against Powerful Attackers" presented at 21 th ACM Conference on Computer and Communications Security (CCS) in 2014 [74] together with co-authors Sergej Dechand, Felix Fischer  ...  Choose from 1 (strongly disagree) to 5 (strongly agree) for the following:  ... 
doi:10.15488/8668 fatcat:7oh5c5uplrdbdhwnejmhnfo5fi

Pizzagate, Pedogate - inside Podesta's emails [article]

Victor Christianto
2020 Figshare  
well as his then future wife Malania.  ...  Revised 1/24/2017 [120] (Archived) Willamette Week, Prosecutors Ask Judge to Allow Future Refiling of Charges Against Terry Bean. Nigel Jaquiss, 8/31/2015.  ...  This man was way too powerful to come from an ordinary family.  ... 
doi:10.6084/m9.figshare.12423758 fatcat:6uvipoushjbfdpzcioynxuewre

On improving privacy and security through user-informed design [article]

Marta Piekarska, Technische Universität Berlin, Technische Universität Berlin, Jean-Pierre Seifert
It is my strong belief, and hypothesis of the following thesis, that users do care about their privacy; they just do not know how to protect it. In my work I postulate the following...  ...  Let's take the term "disturbance"; the way we interpret a behavior as annoying or unsolicited varies from individual to individual.  ...  With the granted permissions, the attacker connects to the networks and stays idle until another collaborating app is installed.  ... 
doi:10.14279/depositonce-6718 fatcat:ww6dnavqvbeoznffqm3r7v4wey

Mobile privacy and apps: investigating behavior and attitude

Stefanie Havelka, Humboldt-Universität Zu Berlin
This dissertation examines the role of culture, mobile privacy, apps, and user behavior and attitude.  ...  Diese Dissertation untersucht das Nutzerverhalten und die Einstellungen von Smartphone- und App-BenutzerInnen und welche Rolle die Kultur in Bezug auf mobile Privatsphäre spielt.  ...  And it might lay groundwork for future research or provided a framework for future research projects.  ... 
doi:10.18452/21715 fatcat:5xss7pvjvfd3xfiu7zkwasny2e

Perceived security and usage of a mobile payment application [article]

Hanul Sieger, Technische Universität Berlin, Technische Universität Berlin, Sebastian Möller
Price, shopping environment, and attacks are also influential. Different security methods showed significant differences in evaluation and use of the app.  ...  The security method used with the mobile payment app was varied (no security, PIN, fingerprint recognition) and "attacks" were simulated on the payment methods.  ...  As its predictive power is still under-developed to be used for a guiding software analysis, the modules are implemented as a proof-of-concept.  ... 
doi:10.14279/depositonce-4804 fatcat:kaanbvj3pjanfpnoznwd5rholm

Bullets to Bytes: Defending the United Kingdom in Cyberspace, 2009 - 2019

Robb Bloomfield
2019 unpublished
'. 28 Environmentalists represent the newest of the groups, and 'emphasise the Internet's non-violent properties and power transference, while trying to deflect away from the Internet's role in warfare  ...  do not exploit international markets and move crucial elements of CNI overseas -'financial regulators in countries such as 462 Anderson, (2015) . 463 said 'Cyber threats are proof that we need more  ... 
doi:10.13140/rg.2.2.20191.61600 fatcat:w2etfczs6bdrvmz3ruzr74xake

Discriminatory Refusal of Carriage in North America

Arnold Kean, Barbara Reukema
1984 The American journal of comparative law  
"Price discrimination in the presence of substan:t;.lal. market power can aIso be' -a.dvantageous from the standpoint of economic efficiencn by 'perm!  ...  , ~ fllgh~are mèant to entice the middle incorne tr~~el1er away from ' ...:' ~ '\ .... .  ...  Correqtive action Wél.s taken t~·prevent the future releas~ of persons.found ta "oe attempting ta car~j weapon~ through screening. .,  ... 
doi:10.2307/840378 fatcat:bkcxybpycfcu5c3iaf4ntzcrui

Forced to live side by side. Power, privacy and conflict in the Tor network

Daniele Pizio
In order to achieve this objective, the study a) traces a genealogy of the imaginaries embodied into Tor and the power relationships that model its infrastructure and functions, b) investigates how its  ...  The new bomb-proof network for everyone. Freedom hackers challenge the NSA").  ...  father Gabriele, my cousin Gomati and my aunt Mirella, who passed away while I was writing it.  ... 
doi:10.25392/ fatcat:f66tdsjfjrezppt56k6flrtksi

DIGITAL BRITAIN-Final Report DIGITAL BRITAIN Final Report Presented to Parliament by The Secretary of State for Culture, Media and Sport and the Minister for Communications, Technology and Broadcasting. By Command of Her Majesty

2009 unpublished
It has a measure of future-proofing so that, as the market deploys next-generation broadband, we do not immediately face another problem of exclusion.  ...  stays competitive.  ...  She monitored site traffic using Technorati, the service that shows which other blogs are connecting to Wife in the North, where users are from and how long they stay on the site.  ... 

Data-Driven, Personalized Usable Privacy

Hamza Harkous
@Viber Hi, is your service secured against spying by the nsa and gchq? 118. .@automatic Who owns my driving data? Will my driving behavior be aggregated and sold? 119.  ...  Hey @Optus why am I getting calls from people wanting to sell me funeral insurance? Have you sold my phone number to a call centre? 31.  ...  It then enables them to set rules for encrypting uploaded files and shows them what apps still work with their protected data.  ... 
doi:10.5075/epfl-thesis-7841 fatcat:6y4qqq36prdzbiqwfpumgeig2m

Special aspects of aviation occupational and environmental medicine

1978 Applied Ergonomics  
He may be slightly above or he stay be superior by a large magnitude.  ...  the power was increased.  ...  SUMMARY The concept of operations from shelters is to provide protection for the aircraft from surprise attack whilst on the ground.  ... 
doi:10.1016/0003-6870(78)90170-9 fatcat:yhmeua4qvvfq5kuuukxeua2gy4


Ian Dunham
As an action of resistance against the anti-community forces employed by streaming services, Krukowski suggests that musicians counterintuitively give music away.  ...  I discovered jazz and classical properly through What, for example, and found my taste in it. I spent nearly 25% of my life downloading music from What.  ... 
doi:10.7282/t3v128f3 fatcat:5utnkgfimbhovkekxbdec76v2y
« Previous Showing results 1 — 15 out of 55 results