Understanding Computer Security

Author(s):  
Steve Brown

During the last several years a great deal has been written in academic and trade journals that has focused on security. There are several different terms often used, but the following—information security (InfoSec), computer security, and information assurance—are typically meant to be the same, that is, the protection of data, although information assurance is also expanded to include aspects such as personnel, plant, and equipment. While one main theme that has been written has been to improve the effectiveness and understanding of security, apply the various security concepts learned and understand the technologies developed, it is important to recognize that computer security may take on different meanings, dependent on the context that it is being discussed. Computer security is a very large field, and one that is often misunderstood. When we discuss computer security, are we discussing our personal computer at work or home? Are we discussing portable devices, such as mobile devices like Blackberries, PDAs, or laptops? Are we discussing security laws and regulations that might impact the safeguard of personal information, or could we be discussing, designing, and implementing, a risk-based security plan for an organization? It is therefore difficult to discuss computer security unless it is discussed in a frame of reference. Therefore, this paper will discuss some of the issues and concerns of computer security in different frames of reference, and the importance of teaching security with that focus in mind.

2020 ◽  
Vol 41 (1) ◽  
pp. 5-42
Author(s):  
Eleonora Lima

This article examines the cultural impact of personal computers in Italian literature in the first decade of their mass diffusion (from the mid-1980s to the second half of the 1990s) through the analysis of four texts written by some of the most respected writers of the time: Primo Levi’s article “Personal Golem” (1985), Umberto Eco’s novel Il pendolo di Foucault (1988), Francesco Leonetti’s novel Piedi in cerca di cibo (1995), and Daniele Del Giudice’s story “Evil Live” (1997). More than simply addressing the advent of personal computers, what these texts have in common is the use of religious images and metaphors in order to make sense of the new technology. This study aims at showing how this frame of reference served the four writers in expressing the contradictions inherent to the machine. Bulky and tangible because of its hardware, but animated by an elusive and mysterious software, the personal computer was perceived at the same time as a dull office appliance and a threatening virtual entity. Finally, by showing how timely and well-informed these literary works on the impact of PCs are, this article wants to make the case for considering the role of literature in shaping computer culture.


2021 ◽  
Vol 20 ◽  
pp. 15-24
Author(s):  
Taha Ahmadi ◽  
Hernández Cristian ◽  
Cubillos Neil

This article presents a review of the most relevant manual techniques and technologies developed from the field of artificial vision aimed at identifying biomechanical alterations. The purpose is to describe the most important aspects of each technology, focused on the description of each of its stages and experimental results, which suggest the integration of mobile devices with artificial vision techniques, in addition to the different computer programs used for such end. Finally, the results showed that the identification of the crook index for alterations in posture turns out to be a technique currently used by most specialists. The great challenge is to develop portable devices through mobile applications that allow the detection of the corvo index and the barometric analysis, as well as for other types of applications that depend on visual analysis by experts.


2020 ◽  
pp. 188-204
Author(s):  
M. I. Kiose ◽  

The research explores the perspective construal techniques applied in predicate indirect noun groups in Russian. In this case, the discourse perspective is construed with a highly salient ob-ject of perspective in the construed frame of reference. To achieve this effect, the speaker / narrator chooses a particular type of predicate indirect noun groups, such as predicate con-structions with the verbs of fictive motion, appearance, and being (existence) or comparative constructions. Each of these construction types demonstrates its own linguistic and cognitive features, which are used to apply various perspectivization techniques to ensure that its inter-pretation will proceed successfully. To detect these techniques, a complex procedure is applied. Hand-selected fragments analysis followed by corpus statistic and correlation analysis help define the parameters and values in predicate indirect noun group constructions. These parameters are referential (bodily modus type, referent type, referent focus type), lexical (first / repeated lexeme use, type of attribute in pre-position, intensifier type in pre-position), syntactic (sentence initial / final position, position before a clause, co-reference distance in words and propositions) and textual ones (textual role, new microevent introduction). Vari-ance analysis has revealed a group of parameters typical for the studied construction types of predicate indirect noun groups. Parametric results allow describe the typical techniques of object mental scanning, object construal, frames of reference (coordinate system) construal. These include the techniques of mental path shortening / prolongation, embodiment con- strual alleviation / constraining, animated / non-animated object construal, stability / instabil-ity of frames of reference, etc.


Author(s):  
Artemis D. Avgerou ◽  
Despina A. Karayanni ◽  
Yannis C. Stamatiou

Smart City infrastructures connect people with their devices through wireless communications networks while they offer sensor-based information about the city's status and needs. Connecting people carrying mobile devices equipped with sensors through such an infrastructure leads to the “collective intelligence” or “crowdsourcing” paradigm. This paradigm has been deployed in numerous contexts such as performing large-scale experiments (e.g., monitoring the pollution levels or analyzing mobility patterns of people to derive useful information about rush hours in cities) or gathering and sharing user collected experiences in efforts to increase privacy awareness and personal information protection levels. In this chapter, we will focus on employing this paradigm in the mMarketing/mCommerce domain and discuss how crowdsourcing can create new opportunities for commercial activities as well as expansion of existing ones.


1995 ◽  
Vol 7 (2) ◽  
pp. 182-195 ◽  
Author(s):  
Martha Flanders ◽  
John F. Soechting

In reaching and grasping movements, information about object location and object orientation is used to specify the appropriate proximal arm posture and the appropriate positions for the wrist and fingers. Since object orientation is ideally defined in a frame of reference fixed in space, this study tested whether the neural control of hand orientation is also best described as being in this spatial reference frame. With the proximal arm in various postures, human subjects used a handheld rod to approximate verbally defined spatial orientations. Subjects did quite well at indicating spatial vertical and spatial horizontal but made consistent errors in estimating 45° spatial slants. The errors were related to the proximal arm posture in a way that indicated that oblique hand orientations may be specified as a compromise between a reference frame fixed in space and a reference frame fixed to the arm. In another experiment, where subjects were explicitly requested to use a reference frame fixed to the arm, the performance was consistently biased toward a spatial reference frame. The results suggest that reaching and grasping movements may be implemented as an amalgam of two frames of reference, both neurally and behaviorally.


2012 ◽  
Vol 21 (01) ◽  
pp. 2-3
Author(s):  
C. A. Kulikowski ◽  
A. Geissbuhler

SummaryTo provide an editorial introduction to the 2012 IMIA Yearbook of Medical Informatics with an overview of its contents and contributors.A brief overview of the main theme, and an outline of the purposes, contents, format, and acknowledgment of contributions for the 2012 IMIA Yearbook.This 2012 issue of the IMIA Yearbook highlights important developments in personal health informatics, impacting the activities in research, education and practice in this interdisciplinary field.There has been steady progress towards introducing individualization or personalization into informatics systems by taking advantage of the increasing amounts of personal information that is relevant to medical decisions and application in clinical practice. At the same time, there are serious issues about the limits of existing systems being able to effectively personalize information within both practical and ethical constraints so critical to the practice of medicine. Recent literature bearing on these questions includes the selected papers published during the past 12 months, and articles reported by IMIA Working Groups on these topics.Surveys of the main research sub-fields in biomedical informatics in the Yearbook provide an overview of progress and current challenges across the spectrum of the discipline, focusing on the challenges and opportunities involved in personal health informatics.


Perception ◽  
10.1068/p5529 ◽  
2007 ◽  
Vol 36 (7) ◽  
pp. 1049-1056 ◽  
Author(s):  
Hirokazu Yoshimura ◽  
Tatsuo Tabata

The mirror puzzle related to the perception of mirror images as left–right reversed can be more fully understood by considering an extended problem that includes also the perception of mirror images that are not left–right reversed. The purpose of the present study is to clarify the physical aspect of this extended problem logically and parsimoniously. Separate use of the intrinsic frame of reference that belongs to the object and one that belongs to its mirror image always leads to the perception of left–right reversal when the object has left–right asymmetry; on the other hand, the perception of left–right nonreversal is always due to the application of a common frame of reference to the object and its mirror image.


Author(s):  
Cristina Rivera ◽  
Caroline G.L. Cao

This work is an examination of barriers to communication between the attending and assisting surgeons during laparoscopic surgery, where the same image of the surgical site is viewed from different vantage points with respect to the patient. Part of the problem lies with the multiple frames of reference each surgeon holds, and the mental rotations each must perform to construct a common frame of reference for communication and collaborative work. An experiment was conducted to demonstrate the effects of display-control incongruency on the performance of an aiming task in a simulated laparoscopic environment. Aiming performance was best when the camera was oriented at 0° perspective and worsened as the angle of deviation from 0° increased. Performance was affected to a greater degree by viewing perspectives from the left of the subject than viewing perspectives from the right. Results also suggest that when surgeons are facing each other, as is the case in many laparoscopic surgeries, one surgeon's performance will be worse than the other's. The mismatched display-control perspectives are compounded by ambiguous spatial references in verbal communication. From these findings, a case can be made for the importance of vocabulary that forces a common frame of reference during laparoscopic surgery.


2011 ◽  
Vol 145 ◽  
pp. 267-271
Author(s):  
Gun Il Ma ◽  
Kyung Whan Park ◽  
Jeong Hyun Yi ◽  
Seung Hun Jin

Smartphones provide portability and convenience to users by means of personal information profiles. However, when the phones are lost or stolen, security threats may cause personal information to be exposed. To resolve these problems, the network operator must provide users with remote-locking or wiping-out functions so that malicious users cannot use the mobile devices. In this paper, we propose a smartphone remote lock and data wipe scheme using password-based message authentication. The proposed scheme provides users with a mechanism for verifying the integrity of command messages so that malicious users cannot attack the device by intentionally transmitting lock or wipe commands. In addition, we show that the system is designed to fit in the standard SMS PDU, and we test the performance in terms of memory usage, authentication time, and bandwidth usage by implementing it on Android smartphones.


Sign in / Sign up

Export Citation Format

Share Document