Conclusion

Author(s):  
Clement Guitton

The conclusion starts by summarizing the contributions of this book, before considering what the future of attribution may look like. It briefly analyzes the consequences for privacy of large metadata collection, and the effects on Internet governance of attribution mechanisms being revealed. More specifically, it contends that the potential breaking up of the Internet into multiple ‘Internets’ will reshape the practice of cyber security to some extent, but that the political limitations of attribution will remain very similar. This last chapter also briefly outlines the basis for future work by showing that attribution is not only limited to cyber attacks but also emerges in many other situations, involving the need to strike a "right" balance between anonymity, privacy and security, which is one of the key challenges of the twenty-first century. Hence, the approach to attribution will reflect how society wishes to address the anonymity-privacy-security triangle, and how it has the potential to shape the balance between these three questions for years to come.

Author(s):  
Fred Powell

This chapter explores the political context of human rights and how it is shaping the future. It argues that human rights constitute the very substance of democracy by conferring a universal set of rights on the citizen, arguing that Hannah Arendt’s famous phrase ‘the right to have rights’ defines the complex relationship between democracy, human rights and civil society. It discusses how human rights embracing both individual liberty and social justice have been historically contested and critically assesses the state of human rights in today’s world along with the potential threats and opportunities for human rights development into the future. The chapter concludes by arguing that the restoration of a universal welfare state, as the embodiment of human rights in a globalised world, arguably should be the priority for the future of democracy in the twenty-first century.


2012 ◽  
Vol 143 (1) ◽  
pp. 99-109 ◽  
Author(s):  
Matthew Allen

This article explore how, in the first decade of the twenty-first century, the internet became historicised, meaning that its public existence is now explicitly framed through a narrative that locates the current internet in relation to a past internet. Up until this time, in popular culture, the internet had been understood mainly as the future-in-the-present, as if it had no past. The internet might have had a history, but it had no historicity. That has changed because of Web 2.0, and the effects of Tim O'Reilly's creative marketing of that label. Web 2.0, in this sense not a technology or practice but the marker of a discourse of historical interpretation dependent on versions, created for us a second version of the web, different from (and yet connected to) that of the 1990s. This historicising moment aligned the past and future in ways suitable to those who might control or manage the present. And while Web 3.0, implied or real, suggests the ‘future’, it also marks out a loss of other times, or the possibility of alterity understood through temporality.


Author(s):  
Keith Richotte

Chapter two describes the early treaty and social history that defined the political stakes for the Plains Ojibwe and Métis into the future. This discussion includes a number of various treaties and their contexts that eventually came to define the boundaries of the Turtle Mountain Band of Chippewa Indians. Focusing primarily on the middle third of the nineteenth century, this chapter also demonstrates the growing colonial impositions that Plains Ojibwe and Métis were beginning to face in a rapidly changing world. The political environment that set the stage for the rest of what was to come was built in this time.


Author(s):  
Jonika Lamba ◽  
Esha Jain

Cybersecurity is not just about fortification of data. It has wide implications such as maintaining safety, privacy, integrity, and trust of the patients in the healthcare sector. This study methodically reviews the need for cybersecurity amid digital transformation with the help of emerging technologies and focuses on the application and incorporation of blockchain and the internet of things (IoT) to ensure cybersecurity in the well-being of the business. It was found in the study that worldwide, advanced technology has been used in managing the flow of data and information, India should focus on maintaining the same IT-enabled infrastructure to reduce causalities in the nation and on the other hand improve administration, privacy, and security in the hospital sector. Depending on the network system, resource allocation, and mobile devices, there is a need to prioritize the resources and efforts in the era of digitalization.


2011 ◽  
Vol 480-481 ◽  
pp. 758-762
Author(s):  
Jin Qu Zhang

A shapefile to SWF conversion software was mainly introduced. By converting the traditional GIS files such as ESRI Shapefile to the Shock Wave Flash (SWF) file format, the GIS data was highly compressed and suitable for the Internet publication. The generation of SWF files provided a complement for the current WebGIS technology and by using the converted SWF map files, an extended example of flash-based application in multi-level analysis to the socio-economic data was constructed. The example demenstrated its easy configuration and powerful potential ablities. More powerful applications based on SWF will be continued in the future work.


2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.


2021 ◽  
Vol 11 (16) ◽  
pp. 7738
Author(s):  
Kyounggon Kim ◽  
Faisal Abdulaziz Alfouzan ◽  
Huykang Kim

Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-attacks is gradually changing. Early cyber-attacks were usually conducted by curious personal hackers who used simple techniques to hack homepages and steal personal information. Lately, cyber attackers have started using sophisticated cyber-attack techniques that enable them to retrieve national confidential information beyond the theft of personal information or defacing websites. These sophisticated and advanced cyber-attacks can disrupt the critical infrastructures of a nation. Much research regarding cyber-attacks has been conducted; however, there has been a lack of research related to measuring cyber-attacks from the perspective of offensive cybersecurity. This motivated us to propose a methodology for quantifying cyber-attacks such that they are measurable rather than abstract. For this purpose, we identified each element of offensive cybersecurity used in cyber-attacks. We also investigated the extent to which the detailed techniques identified in the offensive cyber-security framework were used, by analyzing cyber-attacks. Based on these investigations, the complexity and intensity of cyber-attacks can be measured and quantified. We evaluated advanced persistent threats (APT) and fileless cyber-attacks that occurred between 2010 and 2020 based on the methodology we developed. Based on our research methodology, we expect that researchers will be able to measure future cyber-attacks.


Author(s):  
Tim Unwin

Technology is all too often seen as being inherently good, and there are powerful interests limiting the amount of attention paid to the darker side of ICTs and Internet access in particular. However, these darker aspects are crucial to understanding ICT4D, especially since they can more seriously impact the poor, both countries and people, than the rich. The following main challenges are covered in the chapter: privacy and security; the Surface Web and the Dark Web; cyber-security and resilience; negative aspects of the exploitation of Big Data and the abuse of people through social media; and the increasing dehumanization of people through the use of ICTs and the Internet of Things.


Author(s):  
Kirti Raj Bhatele ◽  
Harsh Shrivastava ◽  
Neha Kumari

Cyber security has become a major concern in the digital era. Data breaches, ID theft, cracking the captcha, and other such stories abound, affecting millions of individuals as well as organizations. The challenges have always been endless in inventing right controls and procedures and implementing them with acute perfection for tackling with cyber attacks and crimes. The ever-increasing risk of cyber attacks and crimes grew exponentially with recent advancements in artificial intelligence. It has been applied in almost every field of sciences and engineering. From healthcare to robotics, AI has created a revolution. This ball of fire couldn't be kept away from cyber criminals, and thus, the “usual” cyber attacks have now become “intelligent” cyber attacks. In this chapter, the authors discuss specific techniques in artificial intelligence that are promising. They cover the applications of those techniques in cyber security. They end the discussion talking about the future scope of artificial intelligence and cyber security.


Latin Jazz ◽  
2020 ◽  
pp. 141-174
Author(s):  
Christopher Washburne

This chapter is an ethnographic study of New York–based Latin jazz in the twenty-first century. It uses five prominent bandleaders actively shaping the future of Latin jazz as case studies—Eddie Palmieri, Michele Rosewoman, Carlos Henríquez, Miguel Zenón, and Bobby Sanabria—demonstrating how the historical specificities and developments discussed in the preceding chapters continue to reverberate and inform the music made in the present. Their voices and perspectives demonstrate how each of these musicians adopts unique strategies to navigate the terrain of inequity and adversity. They represent significant trends that will assert much influence on generations of musicians to come. Their combined perspectives suggest that Latin jazz is not, nor ever should it have been, an “other jazz.” Its presence can no longer be silenced or erased. All of the music and musicians associated with jazz deserve to be fully embraced and recognized.


Sign in / Sign up

Export Citation Format

Share Document