Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
13
result(s) for
"Data encryption (Computer science) Political aspects."
Sort by:
An Open-Source Face-Aware Capture System
by
Schuckers, Stephanie
,
Hossain, S. M. Safayet
,
Venkataswamy, Naveenkumar G.
in
Algorithms
,
Automation
,
Biometrics
2024
Poor-quality facial images pose challenges in biometric authentication, especially in passport photo acquisition and recognition. This study proposes a novel and open-source solution to address these issues by introducing a real-time facial image quality analysis utilizing computer vision technology on a low-power single-board computer. We present an open-source complete hardware solution that consists of a Jetson processor, a 16 MP autofocus RGB camera, a custom enclosure, and a touch sensor LCD for user interaction. To ensure the integrity and confidentiality of captured facial data, Advanced Encryption Standard (AES) is used for secure image storage. Using the pilot data collection, the system demonstrated its ability to capture high-quality images, achieving 98.98% accuracy in storing images of acceptable quality. This open-source, readily deployable, secure system offers promising potential for diverse real-time applications such as passport verification, security systems, etc.
Journal Article
Decrypting the Encryption Debate
by
Sciences, Division on Engineering and Physical
,
Board, Computer Science and Telecommunications
,
National Academies of Sciences, Engineering, and Medicine
in
Civil rights
,
Civil rights-United States
,
Computer networks
2018
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats
from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.
At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted \"end-to-end,\" intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by
investigators.
Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.
Surveillance or Security?
by
Landau, Susan
in
Communications & Telecommunications
,
Computer crimes
,
Computer crimes -- Risk assessment -- United States
2011,2013,2010
Digital communications are the lifeblood of modern society. We \"meet up\" online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance. But, as cybersecurity expert Susan Landau argues in Surveillance or Security?, the old surveillance paradigms do not easily fit the new technologies. By embedding eavesdropping mechanisms into communication technology itself, we are building tools that could be turned against us and opting for short-term security and creating dangerous long-term risks.How can we get communications security right? Landau offers a set of principles to govern wiretapping policy that will allow us to protect our national security as well as our freedom.
Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis
by
Ivanitskaya, Lana V
,
Zikos, Dimitrios
,
Erzikova, Elina
in
Alternative approaches
,
Artificial intelligence
,
Bibliometrics
2025
Fueled by innovations in technology and health interventions to promote, restore, and maintain health and safeguard well-being, the field of eHealth has yielded significant scholarly output over the past 25 years.
This study aims to offer a big picture of research developments and multidisciplinary contributions to eHealth that shaped this field up to 2024. To that end, we analyze evidence from 3 corpora: 10,022 OpenAlex documents with eHealth in the title, the 5000 most relevant eHealth articles according to the Web of Science (WoS) algorithm, and all available (n=1885) WoS eHealth reviews.
Using VOSviewer, we built co-occurrence networks for WoS keywords and OpenAlex concepts. We examined clusters, categorized terminology, and added custom overlays about eHealth technologies, stakeholders, and objectives. A cocitation map of sources referenced in WoS reviews helped identify scientific fields supporting eHealth. After synthesizing eHealth terminology, we proceeded to build a conceptual model of eHealth scholarship grounded in bibliometric evidence.
Several research directions emerged from bibliometric networks: eHealth studies on self-management and interventions, especially in mental health; telemedicine, telehealth, and technology acceptance; privacy, security, and design concerns; health information consumers' literacy; health promotion and prevention; mHealth and digital health; and HIV prevention. Conducted at the individual, health system, community, and society levels, eHealth studies focused on health and wellness across the human lifespan. Keywords such as internet (mean publication year 2017), telemedicine (2018), telehealth (2018), mHealth (2019), mobile health (2020), and digital health (2021) were strongly linked to literature indexed with eHealth (2019). Different types of eHealth apps were supported by research on infrastructures: networks, data exchange, computing technologies, information systems, and platforms. Researchers' concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. Review authors cited a wide range of medical sources and journals specific to eHealth technologies, as well as journals in psychology, psychiatry, public health, policy, education, health communication, and other fields. The Journal of Medical Internet Research stood out as the most cited source. The concept map showed a prominent role of political science and law, economics, nursing, business, and knowledge management. Our empirically derived conceptual model of eHealth scholarship incorporated commonly researched stakeholder groups, eHealth application types, supporting infrastructure, health analytics concepts, and outcomes.
Drawing upon contributions from many disciplines, the field of eHealth has evolved from early studies of internet-enabled communications, telemedicine, and telehealth to research on mobile health and emerging digital health technologies serving diverse stakeholders. Digital health has become a popular alternative term to eHealth. We offered practical implications and recommendations on future research directions, as well as guidance on study design and publication.
Journal Article
A Quantitative Study on the Factors Influencing Implementation of Cybersecurity Laws and Regulations in Pakistan
2023
The phenomenon of law implementation has received limited attention, despite the clear evidence that it is influenced by various factors prevalent in the country, and these factors can have an impact on and obstruct the effective implementation of legislation. The primary objective of this study was to analyze the critical factors that impact the implementation of cybersecurity laws in developing nations, such as Pakistan. The prevalence of corruption, a major hindrance to the implementation of cybersecurity laws and regulations, emerged as the most influential factor in Pakistan. Additionally, factors such as discrimination, illicit conduct, expertise, ambiguity, and public confidence significantly influenced the implementation of cybersecurity laws in Pakistan. A survey was conducted among managers from banking and IT firms to collect data samples on the factors that could potentially impact the implementation of the law. The findings from a sample of 172 respondents revealed that corruption, discrimination, illicit conduct, and ambiguity appeared to have a significant negative influence on cybersecurity law implementation, whereas expertise and public confidence emerged to have a significant positive influence on the implementation of cybersecurity laws in Pakistan. This study suggests that the government of Pakistan should consider various measures such as providing training, improving capacity building, fostering institutional cooperation, strengthening legislative conviction, and promoting global collaborations to enhance the implementation of cybersecurity.
Journal Article
Government Hacking
2018
The United States government hacks computer systems for law enforcement purposes. As encryption and anonymization tools become more prevalent, the government will foreseeably increase its resort to malware. Law enforcement hacking poses novel puzzles for criminal procedure. Courts are just beginning to piece through the doctrine, and scholarship is scant. This Article provides the first comprehensive examination of how federal law regulates government malware. Part I of the Article considers whether the Fourth Amendment regulates law enforcement hacking. This issue has sharply divided district courts because, unlike a conventional computer search, hacking usually does not involve physical contact with a suspect's property. The Article provides a technical framework for analyzing government malware, then argues that a faithful application of Fourth Amendment principles compels the conclusion that government hacking is inherently a search. Part II analyzes the positive law that governs law enforcement hacking, answering fundamental criminal procedure questions about initiating a search, establishing probable cause and particularity, venue, search duration, and notice. A review of unsealed court filings demonstrates that the government has a spotty compliance record with these procedural requirements. The Article also argues for reinvigorating super-warrant procedures and applying them to law enforcement hacking. Finally, Part III uses government malware to illuminate longstanding scholarly debates about Fourth Amendment law and the structure of surveillance regulation. Law enforcement hacking sheds new light on the interbranch dynamics of surveillance, equilibrium adjustment theories for calibrating Fourth Amendment law, and the interplay between statutory and constitutional privacy protections.
Journal Article
ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION
2015
Freedom and prosperity of mankind greatly depend on an innovative, safe andreliable Internet that, of course, will keep evolving. Cyber space must be protectedfrom incidents, misuse and abuse. Handling the increasing number of threats tocyber security is a challenge that national security and the trend in the internationalenvironment face. This makes taking fast and adequate measures at national,European and international level a must. Changing national security strategies andadopting new cyber security strategies are a part of these measures.
Journal Article
Ubiquitous Participation Platform for POLicy Makings (UbiPOL): A Research Note
2010
The purpose of UbiPOL project is to develop a ubiquitous platform that allows citizens be involved in Policy Making Processes (PMPs) regardless of their current locations and time. However, literature highlights one of the foremost reasons that make citizens de-motivated in engaging themselves in policy making—the ignorance of germane policies and PMPs within the government organizations. It is highly suggested that while more citizens find connections between their everyday life activities and pertinent government policies, the more they become pro-active or motivated to be involved in PMPs. For this reason, UbiPOL aims to provide ‘context aware knowledge’ provision with regards to policy making, i.e. through UbiPOL enabling citizens in identifying any relevant policies along with other citizens’ opinion ‘whenever they want’ ‘wherever they are’ according to their everyday life pattern. As a result of this platform, citizens are anticipated to be more acquainted with the newest relevant policies and PMPs for their participation during their routine life activities. Moreover, this platform is also anticipated to provide policy tracking functionality through a ‘workflow engine’ and ‘opinion tag’ concept to improve the transparency of PMPs. As a final point, the platform intends to facilitate policy makers to collect citizen opinions more efficiently as the opinions are collected as soon as they are created in the middle of citizen’s everyday life. UbiPOL provides security and identity management facility to ensure only authorized citizens can have access to relevant policies according to their roles in PMPs. The delivery of the opinion and policy data over the wireless network is secure as the platform use leading edge encryption algorithm in its communication kernels. UbiPOL is a scalable platform ensuring at least 100,000 citizens can use the system at the same time (e.g., for e-Voting applications) through its well proven automatic load balancing mechanisms. The privacy ensuring opinion mining engine prevents unwanted revealing of citizen identities and the mining engine prevents any unrelated commercial advertisements are included in the opinion base to minimize the misuse of the system.
Journal Article