scholarly journals Countering extremist organizations in the information domain

Author(s):  
Joseph Mroszczyk ◽  
Max Abrahms
Keyword(s):  
Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4873
Author(s):  
Biao Xu ◽  
Minyan Lu ◽  
Hong Zhang ◽  
Cong Pan

A wireless sensor network (WSN) is a group of sensors connected with a wireless communications infrastructure designed to monitor and send collected data to the primary server. The WSN is the cornerstone of the Internet of Things (IoT) and Industry 4.0. Robustness is an essential characteristic of WSN that enables reliable functionalities to end customers. However, existing approaches primarily focus on component reliability and malware propagation, while the robustness and security of cascading failures between the physical domain and the information domain are usually ignored. This paper proposes a cross-domain agent-based model to analyze the connectivity robustness of a system in the malware propagation process. The agent characteristics and transition rules are also described in detail. To verify the practicality of the model, three scenarios based on different network topologies are proposed. Finally, the robustness of the scenarios and the topologies are discussed.


2013 ◽  
Vol 178 (1-2) ◽  
pp. 67-75 ◽  
Author(s):  
Alberto Porta ◽  
Paolo Castiglioni ◽  
Marco Di Rienzo ◽  
Vlasta Bari ◽  
Tito Bassani ◽  
...  

2018 ◽  
Vol 8 (3) ◽  
pp. 71-74
Author(s):  
B. Vasantha ◽  
B. M. Meera ◽  
M. Dhanamjaya

Tremendous advancement in Information and Communication Technology has its impact on all walks of life. The advent of Internet and the World Wide Web has particularly impacted Library and Information domain. Library and Information Centers today play an important role in enhancing the quality of academic environment and influence basic and core activity of the research centers. They help the users to identify and access the variety knowledge resources in different formats such as electronic information resources in academic institutions. The purpose of this paper to it understands the usage pattern of electronic information resources in an academic institute by the research scholars. A survey method is adopted to know the frequency of use, level of satisfaction with different resources, and the problems encountered while using electronic information resources at REVA University, Bengaluru.


2019 ◽  
Vol 9 (3) ◽  
pp. 116-133
Author(s):  
Joe Burton

AbstractThis article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts to intimidate through cyberspace, and the concept of ‘cyber swaggering’. The article moves on to explore how cyber-attacks have been used to undermine electoral process, to erode free and fair media reporting, and how manipulation of social media can constitute a ‘virtual infiltration’ and ‘virtual occupation’ of the information domain. The article then explores how cyber-attacks conducted during the conflict in Ukraine have limited or otherwise affected freedom of expression. I argue that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations.


Author(s):  
Michael F. Mohageg

Hypertext systems parse documents into components connected by machine-supported links. This study investigated several usability issues relating to linking configurations in an information retrieval application. A HyperCardTM-based geography data base was used as the information domain. Linear, hierarchical, network, and combination hierarchical/network linking were of particular interest. In addition, the number of required links (two, four, or six links to reach the answer) and task type were the task variables studied. Task type refers to expert programmers' judgments as to whether a task is best suited to a hierarchical or network linking configuration. The intention was to identify the task situations under which each linking structure excels. Results indicated that users of the hierarchical linking structure performed significantly better than those using network linking (on average requiring 49 s less per task). Subjects using the combination condition performed no worse than those using the hierarchical condition, yet the combination condition provided no consistent advantages. Hence, for novice users of a system, no performance gain results from the inclusion of network links (in isolation or in combination with hierarchical).


Sign in / Sign up

Export Citation Format

Share Document