A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment

Author(s):  
Thomas Welsh
Author(s):  
Marco Avvenuti ◽  
Alessio Vecchio

The growing ubiquity and usability of smart mobile phones can be exploited to develop popular and realistic pervasive computing applications. Adding image processing capabilities to a mobile phone equipped with a built-in camera makes it an easy-to-use device for linking physical objects to a networked computing environment. This chapter describes an extensible and portable programming platform that, using bi-dimensional visual tags, turns mass-market camera-phones into a system able to capture digital information from real objects, use such information to download specific application code, and act as a GUI for interacting with object-dependent computational services. The system includes a module for on-phone extraction of visual coded information and supports the dynamic download of mobile applications.


2017 ◽  
Vol 23 (4) ◽  
pp. 163-167
Author(s):  
Jason Vaughan

The networked computing environment is a vital resource for academic libraries. Ever-increasing use dictates the prudence of having a comprehensive computer-use policy in force. Universities often have an overarching policy or policies governing the general use of computing technology that helps to safeguard the university equipment, software, and network against inappropriate use. Libraries often benefit from having an adjunct policy that works to emphasize the existence and important points of higher-level policies, while also providing a local context for systems and policies pertinent to the library in particular. Having computer-use policies at the university and library level Helps provide a comprehensive, encompassing guide for the effective and appropriate use of this vital resource.


2019 ◽  
Vol 13 ◽  
pp. 57-79
Author(s):  
Tetsuro KAKESHITA ◽  
Mika OHTSUKI

We conducted the first national survey of computing education at Japanese universities in 2016. In this paper, we report the survey result of the computing education at non-IT departments and faculties whose major subject is not computing. The survey covers various aspects of computing education including program organization, quality and quantity of educational achievement, students, teaching staff and computing environment. We collected 994 answers through the survey. At least 87,000 non-ICT students are taking computing education in Japan. Although computing education is carried out at every major academic discipline, teaching effort greatly differs depending on the academic discipline. We also find shortage of teaching staff for computing education. The analysis result will be an essential input to develop reasonable curriculum guidelines and accreditation criteria to improve computing education at non-IT departments.


Sign in / Sign up

Export Citation Format

Share Document