114 results on '"Carnivore (software)"'
Search Results
2. Reconsidering the role of the built environment in human–wildlife interactions
- Author
-
Christopher Serenari
- Subjects
Carnivore (software) ,business.industry ,carnivore ,Environmental resource management ,Wildlife ,human–wildlife interaction ,infrastructure ,built environment ,Geography ,lcsh:QH540-549.5 ,Wildlife management ,lcsh:Ecology ,lcsh:Human ecology. Anthropogeography ,lcsh:GF1-900 ,business ,social–ecological system ,Ecology, Evolution, Behavior and Systematics ,Built environment ,Wildlife conservation - Abstract
In facing our greatest challenges, researchers have questioned where the ‘wild things’ will reside in the future, and large carnivores have been a primary focal area. The built environment plays a critical role in the propagation of countless species including carnivores; however, contemporary conceptualizations of human–nature relations do not satisfactorily attend to where the built environment should be placed within existing human–nature relation frameworks or how it impacts our ability to find space for carnivores. This paper fills this information gap by investigating the role of the built environment in social–ecological systems (SES), specifically wildlife and carnivore conservation. The paper unfolds in four stages: The first reviews empirical efforts to capture the relationship between human–natural–wildlife systems and the built environment. Second, using insights from the built environment literature, I argue that moving away from a common pool resource focus, decoupling wildlife and natural systems, investigating all infrastructure types and their interactions across systems, and considering the notion of hybrid systems offer pathways forward. Third, an explanation of the built environment's linkages to human and carnivore systems is undertaken to illustrate how the built environment facilitates the material and symbolic interactions through a blending of properties from human, wildlife and natural systems. Lastly, the argument is made that attending to the role of the built environment in human–wildlife relations can stimulate new research that reveals unhelpful habitual behaviour, feedbacks and barriers, and may also help explain unintended or unexplained consequences impacting human–carnivore relations not fully considered under existing frameworks. A free Plain Language Summary can be found within the Supporting Information of this article.
- Published
- 2021
3. Threat analysis for more effective lion conservation
- Author
-
Alayne Oriol-Cotterill, Hans Bauer, Claudio Sillero-Zubiri, Guillaume Chapron, Luke T. B. Hunter, David W. Macdonald, Samantha K. Nicholson, Peter A. Lindsey, and Amy Dickman
- Subjects
0106 biological sciences ,Matching (statistics) ,education.field_of_study ,Carnivore (software) ,Ecology ,010604 marine biology & hydrobiology ,Section (typography) ,Population ,Armed conflict ,computer.file_format ,010603 evolutionary biology ,01 natural sciences ,Geography ,Table (database) ,Ethnology ,education ,computer ,Ecology, Evolution, Behavior and Systematics ,Comma-Separated Values ,Nature and Landscape Conservation - Abstract
We use comparable 2005 and 2018 population data to assess threats driving the decline of lion Panthera leo populations, and review information on threats structured by problem tree and root cause analysis. We define 11 threats and rank their severity and prevalence. Two threats emerged as affecting both the number of lion populations and numbers within them: livestock depredation leading to retaliatory killing of lions, and bushmeat poaching leading to prey depletion. Our data do not allow determination of whether any specific threat drives declines faster than others. Of 20 local extirpations, most were associated with armed conflicts as a driver of proximate threats. We discuss the prevalence and severity of proximate threats and their drivers, to identify priorities for more effective conservation of lions, other carnivores and their prey.
- Published
- 2022
4. Impact of human disturbance on temporal partitioning within carnivore communities
- Author
-
José Vicente López-Bao, Richard W. Yarnell, Anthony Sévêque, LK Gentle, and Antonio Uzal
- Subjects
Competition (economics) ,Scholarship ,Carnivore (software) ,Disturbance (geology) ,Geography ,Economy ,Bursary ,Animal Science and Zoology ,Christian ministry ,Agricultural and Biological Sciences (miscellaneous) ,Ecology, Evolution, Behavior and Systematics - Abstract
1. Interspecific competition is an important evolutionary force, influencing interactions between species and shaping the composition of communities. In mammalian carnivores, to reduce the risks of negative encounters between competitors, species can employ a strategy of temporal partitioning, adapting activity patterns to limit synchronous activity. This strategy of non-human competitor avoidance, however, may be influenced by the expansion of human activities, which has driven wildlife towards nocturnality.\ud \ud 2. Therefore, it could be hypothesised that the disruption of temporal niche partitioning by humans and their activities could increase temporal overlap between carnivores, enhancing interspecific competition.\ud \ud 3. We reviewed the published literature systematically, and employed generalized linear models to quantitatively evaluate the relative influence of a range of human, meteorological and ecological variables on the coefficients of temporal overlap within carnivore communities on a global scale.\ud \ud 4. None of the models investigated showed evidence of an impact of humans on temporal partitioning between carnivores on a global scale. This illustrates that temporal avoidance of humans and competitors does not always follow a consistent pattern, and that its strength may be context-dependent and relative to other dimensions of niche partitioning (spatial and trophic).\ud \ud 5. Similarly, the regulation of activity patterns may be under strong site-specificity, and be influenced by a combination of biotic and abiotic characteristics. Temporal avoidance of both humans and competitors may be regulated by short, reactive responses that do not impact activity patterns in the longer term.\ud \ud 6. Although we did not detect a global disruption of temporal partitioning due to human disturbance, carnivore communities may still experience an increase in interspecific competition in other niche dimensions. Further research would benefit from using controlled experimental designs and investigating multiple dimensions of niche partitioning simultaneously. Finally, we recommend complementing the coefficient of temporal overlap with other metrics of fine-scale spatiotemporal interactions.
- Published
- 2021
5. Responses of carnivore assemblages to decentralized conservation approaches in a South African landscape
- Author
-
Chris Sutherland, Lourens Swanepoel, Wendy Maphefo Sekgota Nemphagane, Margarida Santos-Reis, Gonçalo Curveira-Santos, University of St Andrews. Statistics, and Repositório da Universidade de Lisboa
- Subjects
Hierarchical Bayesian models ,Carnivore (software) ,QH301 Biology ,Natural resource management ,Community occupancy model ,QH301 ,Agency (sociology) ,Camera-trap ,QA Mathematics ,Conservation planning ,QA ,SDG 15 - Life on Land ,Ecology ,business.industry ,Environmental resource management ,Multi-species modelling ,DAS ,SDG 8 - Decent Work and Economic Growth ,Protected areas ,Geography ,Camera trap ,Conservation ecology ,business ,Predator - Abstract
Funding: African Institute for Conservation Ecology; Fundação para a Ciência e a Tecnologia. Grant Numbers: PD/BD/114037/2015, UID/BIA/00329/2019; National Geographic Society. Grant Number: EC-314R-18; Wild Tomorrow Fund; South African Agency for Science and Technology Advancement. Grant Number: UID: 107099&115040. 1 Conservation efforts in South Africa play out across multi-use landscapes where formal protected areas coexist with private wildlife business (ecotourism and/or hunting) in a human-dominated matrix. Despite the persistence of highly diverse carnivore guilds, management idiosyncrasies are often orientated towards charismatic large predators and assemblage-level patterns remain largely unexplored. 2. We conducted an extensive camera-trap survey in a natural quasi-experimental setting in KwaZulu-Natal, South Africa. We sampled across a protection gradient characterized by a provincial protected area (highest and formal protection status), a private ecotourism reserve, game ranches and traditional communal areas (lowest protected status). We evaluated assemblage-level and species-specific responses of free-ranging carnivores to the varying management contexts and associated environmental gradients. 3. Despite similar assemblage composition between management contexts, site-scale carnivore richness and occupancy rates were greater in the formal protected area than adjacent private reserve and game ranches. Carnivore occupancy was more similar between these private wildlife areas, although putative problem species were more common in the private reserve, and contrasted with depauperate assemblages in least protected communal lands. Variation in carnivore occupancy probabilities was largely driven by land use contexts, that is, the level and nature of protection, relative to underlying fine-scale landscape attributes (e.g. distance to conservation fences) or apex predator populations. 4. Synthesis and applications. Our findings provide convincing empirical support for the added value of multi-tenure conservation estates augmenting and connecting South Africa's protected areas. However, our emphasis on free-ranging carnivores exemplifies the importance of maintaining areas under long-term formal protection and the risks with viewing lucrative wildlife business as a conservation panacea. We suggest that unmanaged carnivore species be the formal components of carnivore reintroduction and recovery programmes to better gauge the complementary conservation role of South Africa's private land. Postprint
- Published
- 2021
6. Trust in researchers and researchers' statements in large carnivore conservation
- Author
-
Kim Magnus Bærum, Kristin E. Mathiesen, Maria Johansson, and Magnus Barmoen
- Subjects
human–wildlife interactions ,Carnivore (software) ,Ecology ,business.industry ,Environmental resource management ,VDP::Zoologiske og botaniske fag: 480 ,new environmental paradigm ,GF1-900 ,Geography ,Human ecology. Anthropogeography ,large carnivores ,human dimensions ,VDP::Zoology and botany: 480 ,geographically stratified survey ,business ,trust in research ,QH540-549.5 ,Ecology, Evolution, Behavior and Systematics - Abstract
Human–wildlife interactions occur when humans and wildlife overlap in the same landscapes. Due to the growing human population, the number of interactions will continue to increase, and in some cases, develop further into social conflicts. Conflicts may occur between people disagreeing about wildlife conservation or arguing over which wildlife management measures should be taken. Social conflicts between humans are based on different attitudes, values and land‐use aspirations. The success of solving these social conflicts strongly depends on building trust between the public, stakeholders, authorities and researchers, as trust is fundamental to all communication and dialogue. Here we have examined how trust in large carnivore research differs within a geographically stratified sample of the Norwegian population. The comprehensive survey, including 2,110 respondents, allows us to explore how people perceive factual statements about large carnivores depending on the source of these statements. Specifically, the respondents were given multiple statements and asked to judge them in terms of meaning and authenticity depending on whether the statements were made by a politician, the Norwegian farmers' association, the Norwegian Fish and Game association or a large carnivore researcher. Based on the variations in perceptions, we inferred that trust in large carnivore researchers and their research results varied with people's attitudes, values and direct experience of large carnivores. In general, respondents perceived 60% of the statements to be genuine when given no information of who had made them. Although this increased to 75% when informed that the statements were made by a large carnivore researcher, there was still a 25% probability that the statement was perceived as manipulative or political. Age, environmental values and negative experiences of carnivores increased the probability of perceiving research statements as manipulative or political. People living in areas with high proportions of hunters showed particularly polarized views, either more strongly perceiving the statements as political, or in contrast as research. This study provides a novel perspective in understanding the role trust plays in social conflicts related to human–wildlife interactions. A free Plain Language Summary can be found within the Supporting Information of this article.
- Published
- 2021
7. The CMS-CITES African Carnivore Initiative as an Illustration of Synergies Between MEAs
- Author
-
Elke Hellinx
- Subjects
Carnivore (software) ,Ecology ,CITES ,CMS ,conservation ,international treaties ,lcsh:Evolution ,International law ,Economy ,Political science ,large carnivores ,lcsh:QH540-549.5 ,lcsh:QH359-425 ,lcsh:Ecology ,international law ,Ecology, Evolution, Behavior and Systematics - Abstract
ispartof: Frontiers In Ecology And Evolution vol:8 issue:10 status: published
- Published
- 2020
8. Governing dual objectives within single policy mixes : an empirical analysis of large carnivore policies in six European countries
- Author
-
Camilla Risvoll, Katrina Rønningen, Agnese Marino, Inger Hansen, Ugo Arbieu, Geir-Harald Strand, Camilla Sandström, Auvikki de Boon, Mari Pohja-Mykrä, Lisa Lehnen, Ruralia Institute, Seinäjoki, Helsinki Institute of Sustainability Science (HELSUS), and Ruralia Institute
- Subjects
WOLF ,Carnivore (software) ,Public economics ,policy instruments ,Large carnivore management ,Political Science ,Statsvetenskap ,CONSERVATION ,0211 other engineering and technologies ,human-carnivore conflict ,021107 urban & regional planning ,02 engineering and technology ,010501 environmental sciences ,Management, Monitoring, Policy and Law ,01 natural sciences ,Dual (category theory) ,WOLVES ,MANAGEMENT ,5171 Political Science ,Business ,institutional and systemic failure ,1172 Environmental sciences ,0105 earth and related environmental sciences - Abstract
Policy mixes (i.e. the total structure of policy processes, strategies, and instruments) are complex constructs that can quickly become incoherent, inconsistent, and incomprehensive. This is amplified when the policy mix strives to meet multiple objectives simultaneously, such as in the case of large carnivore policy mixes. Building on Rogge and Reichardt's analytical framework for the analysis of policy mixes, we compare the policy mixes of Norway, Sweden, Finland, the Netherlands, Germany (specifically Saxony and Bavaria), and Spain (specifically Castilla y Leon). The study shows that the large carnivore policy mixes in the case countries show signs of lacking vertical and horizontal coherence in the design of policy processes, weak consistency between objectives and designated policy instruments, and, as a consequence, lacking comprehensiveness. We conclude that creating consistent, coherent, and comprehensive policy mixes that build on multiple objectives requires stepping away from sectorized policy development, toward a holistic, systemic approach, strong collaborative structures across policy boundaries and regions, the inclusion of diverse stakeholders, and constant care and attention to address all objectives simultaneously rather than in isolation.
- Published
- 2020
9. 15th North American Caribou Workshop, 12-16 May 2014, Whitehorse, Canada
- Author
-
Birgitta Åhman, Eva Wiklund, Troy Hegel, and Fiona K. A. Schmiegelow
- Subjects
First nation ,Carnivore (software) ,media_common.quotation_subject ,Forest management ,Land-use planning ,General Medicine ,Public administration ,Geography ,State (polity) ,Environmental protection ,Structured decision making ,lcsh:Animal culture ,media_common ,lcsh:SF1-1100 - Abstract
The 15th North American Caribou Workshop (NACW) was held from 12-16 May 2014, in the traditional territories of the Kwanlin Dün First Nation and the Ta’an Kwäch’än Council, in Whitehorse, Yukon, Canada. This biennial meeting is the largest technical conference of its kind dealing specifically with caribou biology and management. The first NACW was held in Whitehorse over three decades ago in 1983, and 13 subsequent workshops have been held across North America until now. With nearly 400 delegates from Canada, the United States, Norway, and Greenland attending the 2014 conference, it is evident that this “North American” gathering has truly become an international event. Furthermore, delegates attending this 15th NACW represented federal, provincial, territorial, state and First Nation governments, academia, non-governmental organizations, co-management boards and councils, private consultants, and industry, creating a relatively unique conference setting bringing together a variety of perspectives and concerns. The breadth of the participants in terms of geography, expertise and affiliation resulted in a rich base of human capacity to discuss issues related to caribou conservation and management.Given that it had been nearly three decades since the inception of this workshop, and with its return to the location of the first NACW, the organizing committee felt it was a fitting opportunity to look back and assess what had been achieved with respect to caribou conservation and management. As such, the theme of the 15th NACW was “Caribou Conservation and Management: What’s Working?” The opening session of the conference focussed on invited presentations explicitly addressing this question, and included topics on structured decision making, forest management, harvest monitoring, carnivore management, regional land use planning and management, and aboriginal perspectives on a long-term collaborative caribou recovery program in the southwest Yukon. We challenged our speakers to share what was working and why, and the information provided was valuable and timely, prompting many questions and discussion throughout the conference.
- Published
- 2015
10. Linking noninvasive genetic sampling and traditional monitoring to aid management of a trans-border carnivore population
- Author
-
Jon E. Swenson and Richard Bischof
- Subjects
Aging ,Utilization distribution ,Carnivore (software) ,Population ,Animal Identification Systems ,Wildlife ,Models, Biological ,Animals ,Ursus ,education ,Demography ,Population Density ,Sweden ,education.field_of_study ,Discounting ,Ecology ,biology ,Norway ,Reproduction ,Reproducibility of Results ,Sampling (statistics) ,DNA ,Census ,biology.organism_classification ,Geography ,Female ,Ursidae - Abstract
Noninvasive genetic sampling has been embraced by wildlife managers and ecologists, especially those charged with monitoring rare and elusive species over large areas. Challenges arise when desired population measures are not directly attainable from genetic data and when monitoring targets trans-border populations. Norwegian management authorities count individual brown bears (Ursus arctos) using noninvasive genetic sampling but express management goals in the annual number of bear reproductions (females that produce cubs), a measure that is not directly available from genetic data. We combine noninvasive genetic sampling data with information obtained from a long-term intensive monitoring study in neighboring Sweden to estimate the number of annual reproductions by females detected within Norway. Most female brown bears in Norway occur near the border with neighboring countries (Sweden, Finland, and Russia) and their potential reproduction can therefore only partially be credited to Norway. Our model includes a simulation-based method that corrects census data to account for this. We estimated that 4.3 and 5.7 reproductions can be credited to females detected with noninvasive genetic sampling in Norway in 2008 and 2009, respectively. These numbers fall substantially short of the national target (15 annual reproductions). Ignoring the potential for home ranges to extend beyond Norway's borders leads to an increase in the estimate of the number of reproductions by ;30%. Our study shows that combining noninvasive genetic sampling with information obtained from traditional intensive/invasive monitoring can help answer contemporary management questions in the currency desired by managers and policy makers. Furthermore, combining methodologies and thereby accounting for space use increases the accuracy of the information on which decisions are based. It is important that the information derived from multiple approaches is applicable to the same focal population and that predictions are cross- validated. When monitoring and management are constrained to administrative units, census data should be adjusted by discounting portions of individual space utilization that extend beyond the focal jurisdiction. Our simulation-based approach for making such an adjustment may be useful in other situations where management authorities target portions of trans- border populations.
- Published
- 2012
11. Institutional stakeholders’ views on jaguar conservation issues in central Brazil
- Author
-
Natália Mundim Tôrres, Jon E. Swenson, Leandro Silveira, Anah Tereza de Almeida Jácomo, Yenne Katarina Bredin, and John D. C. Linnell
- Subjects
Carnivore (software) ,Ecology ,Jaguar ,biology ,Conflict ,business.industry ,Environmental resource management ,Stakeholder ,Fundamental rights ,Distribution (economics) ,Panthera onca ,Conservation ,Q methodology ,Politics ,Geography ,biology.animal ,lcsh:QH540-549.5 ,Stakeholder analysis ,lcsh:Ecology ,business ,Ecology, Evolution, Behavior and Systematics ,Nature and Landscape Conservation - Abstract
Large carnivore management is typically a source of heated controversy worldwide and, in the Americas, jaguars (Panthera onca) are at the centre of many human–wildlife conflicts. Although findings suggest that social, rather than economic, factors are important reasons for why humans kill jaguars, few studies focus on stakeholder attitudes towards jaguar conservation beyond quantifying livestock depredation. Yet insights from other large carnivore conflicts demonstrate the importance of the political landscape and stakeholder attitudes in carnivore conservation. To explore the extent to which stakeholder views about jaguar conservation aligned with institutional arrangements, we conducted a stakeholder analysis among personnel working for key institutions in central Brazil. Using Q methodology, we identified three stakeholder perspectives focusing on: A) jaguars’ intrinsic right to exist; B) wider ecocentric values; and C) contesting jaguar-focused conservation. The three institutional stakeholder groups all accepted the jaguar’s fundamental right to exist and agreed that it was important to establish protected areas for jaguars. Yet, institutional stakeholder views diverged regarding the desired distribution of jaguars in Brazil, hunting policies, and the effects of hunting and development projects on jaguar conservation. These differences and their underlying motivations are important to consider for successful jaguar conservation strategies in Brazil.
- Full Text
- View/download PDF
12. KEEPING AN EYE ON THINGS.
- Author
-
Cohen, Adam
- Subjects
- *
EMAIL systems , *PRIVACY - Abstract
Reports on the electronic mail privacy strategy of the U.S. Federal Bureau of Investigation (FBI) to track terrorists. Installation of the Carnivore software at Internet service provider Earthlink; Overview of Carnivore software program on electronic mail spying; Deal of Earthlink and FBI on electronic mail spying. INSET: PRIVACY UNDER FIRE.
- Published
- 2001
13. Governmentality and the War on Terror: FBI Project Carnivore and the Diffusion of Disciplinary Power.
- Author
-
Ventura, Holly, Miller, J., and Deflem, Mathieu
- Subjects
WAR on Terrorism, 2001-2009 ,MILITARY surveillance ,TERRORISM ,SOCIAL control ,GOVERNMENTALITY ,GOVERNMENT policy - Abstract
Social control capabilities have increased significantly over the past several decades, particularly because of an increased utilization of technologically advanced surveillance methods. Following the tragic events of September 11,2001, U.S. Congress and the present Administration have granted law enforcement considerable new powers in the enforcement and prevention of terrorism-related crime. Collectively labeled under the heading of the so-called ‘‘war on terror’’ , the scope of such laws, policies and directives are challenged by civil rights organizations and numerous legislators for lack of definitional precision, arbitrary application of sanctions, and violation of privacy laws. One of federal law enforcement’s surveillance tools is ‘‘Project Carnivore,’’ a Justice Department Internet surveillance program that is administered by the Federal Bureau of Investigation (FBI) to access information flowing to and from a central processing unit on a network connection. While, theoretically relying on Michel Foucault’s theory of discipline and governmentality, as well as related insights in the social control literature, this paper examines Project Carnivore relative to the larger context of state rationality and related privacy issues. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
14. Going for the throat: Carnivore in an ECHELON world - Part II
- Author
-
Nabbali, Talitha and Perry, Mark
- Subjects
- *
ELECTRONIC surveillance , *SECURITY systems , *INTERNET service providers , *COMPUTER network security , *COMPUTER security , *INTERNET - Abstract
Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider''s (ISP) network. The Carnivore software system is used together with a tap on the ISP''s network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI''s own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, provides an overview of the FBI''s Carnivore electronic surveillance system. [Copyright &y& Elsevier]
- Published
- 2004
- Full Text
- View/download PDF
15. Going for the throat: Carnivore in an Echelon World1<fn id="fn1"><no>1</no>An earlier version of this article was presented at the Law Commission of Canada hosted conference In Search of Security: An International Conference on Policing & Security Montre´al, Que´bec, Canada, February, 2003, under the title Going for the Throat: Techniques in Crime Control or Denial of Privacy.</fn> — Part I
- Author
-
Nabbali, Talitha and Perry, Mark
- Subjects
- *
ELECTRONIC surveillance , *COMPUTER software , *INTERNET service providers , *REMOTE sensing , *SECURITY systems - Abstract
Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider’s (ISP) network. The Carnivore software system is used together with a tap on the ISP’s network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI’s own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, will provide an overview of the FBI’s Carnivore electronic surveillance system. The Carnivore software’s evolution, its ‘prey’ and the system’s relationship with Internet Service Providers will be the focus of the study. (Although the FBI’s Carnivore surveillance system is now officially called DCS1000, as the surveillance system is more commonly referred to as “Carnivore”, that term will be used throughout). Also addressed in the article are misconceptions about Carnivore, publicly available sniffer programs, Carnivore’s functionality, methods to counter Carnivore as well as the software’s limitations. In addition, the pertinent American law allowing for wiretapping and electronic surveillance as well as programs and policies outside the United States regarding electronic surveillance are surveyed, and an overview of ECHELON, the global interception and relay system, is provided. The aim is to provide the paper’s readers with a better understanding of these surveillance systems: naturally, only through an in-depth knowledge can the benefits and dangers they present for the public (government), private (individual communications users) and technical industry (ISPs) be understood. [Copyright &y& Elsevier]
- Published
- 2003
- Full Text
- View/download PDF
16. SEEKING THE SOURCE: CRIMINAL DEFENDANTS' CONSTITUTIONAL RIGHT TO SOURCE CODE.
- Author
-
BELLOVIN, STEVEN M., BLAZE, MATT, LANDAU, SUSAN, and OWSLEY, BRIAN
- Subjects
CRIMINAL defendants ,CIVIL rights ,FAIR trial ,COMPUTER software ,SOFTWARE failures ,FORENSIC genetics - Abstract
The right to a fair trial is fundamental to American jurisprudence. The Fifth Amendment of the Bill of Rights guarantees "due process," while the Sixth provides the accused with the right to be "confronted with the witnesses against him." But "time works changes, brings into existence new conditions and purposes." So it is with software. From the smartphones we access multiple times a day to more exotic tools--the software "genies" of Amazon Echo and Google Home--software is increasingly embedded in day-to-day life. It does glorious things, such as flying planes and creating CAT scans, but it also has problems: software errors. Software has also found its way into trials. Software's errors have meant that defendants are often denied their fundamental rights. In this Article, we focus on "evidentiary software"--computer software used for producing evidence--that is routinely introduced in modern courtrooms. Whether from breathalyzers, computer forensic analysis, data taps, or even FitBits, computer code increasingly provides crucialtrial evidence. Yet despite the central role software plays in convictions, computer code is often unavailable to examination by the defense. This may be for proprietary reasons--the vendor wishes to protect its confidential software--or it may result from a decision by the government to withhold the code for security reasons. Because computer software is far from infallible--software programs can create incorrect information, erase details, vary data depending on when and how they are accessed--or fail in a myriad of other ways--the only way that the accused can properly and fully defend himself is to have an ability to access the software that produced the evidence. Yet often the defendants are denied such critical access. In this Article, we do an in-depth examination of the problem. Then, providing a variety of examples of software failure and discussing the limitations of technologists' ability to prove software programs correct, we suggest potential processes for disclosing software that enable fair trials while nonetheless preventing wide release of the code. [ABSTRACT FROM AUTHOR]
- Published
- 2021
17. Dark Web: A Web of Crimes.
- Author
-
Kaur, Shubhdeep and Randhawa, Sukhchandan
- Subjects
DARKNETS (File sharing) ,CRIME ,ACCESS to information ,INTERNET - Abstract
Internet plays an important role in our day to day life. It has become an integrated part of all daily activities or lifestyle. Dark Web is like an untraceable hidden layer of the Internet which is commonly used to store and access the confidential information. But there are number of incidents which reported the misuse of this platform for conducting the criminal and illegal activities in a hidden manner. In this paper, an overview of dark web and various browsers which are used to access dark web are presented. An insight into various aspects of Dark Web such as features, advantages, disadvantages and browsers are discussed. An overview of the different types of attacks, exploits and malwares is also presented. There are different types of criminal activities and incidents which take place over the Dark Web are discussed so that reader can become aware of such types of activities and can take appropriate preventive measures for these activities. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
18. Exploring topics related to data mining on Wikipedia.
- Author
-
Wang, Yanyan and Zhang, Jin
- Abstract
Purpose Data mining has been a popular research area in the past decades. Many researchers study data-mining theories, methods, applications and trends; however, there are very few studies on data-mining-related topics in social media. This paper aims to explore the topics related to data mining based on the data collected from Wikipedia.Design/methodology/approach In total, 402 data-mining-related articles were obtained from Wikipedia. These articles were manually classified into several categories by the coding method. Each category formed an article-term matrix. These matrices were analysed and visualized by the self-organizing map approach. Several clusters were observed in each category. Finally, the topics of these clusters were extracted by content analysis.Findings The articles obtained were classified into six categories: applications, foundation and concepts, methodologies, organizations, related fields and topics and technology support. Business, biology and security were the three prominent topics of the applications category. The technologies supporting data mining were software, systems, databases, programming languages and so forth. The general public was more interested in data-mining organizations than the researchers. They also focused on the applications of data mining in business more than in other fields.Originality/value This study will help researchers gain insight into the general public’s perceptions of data mining and discover the gap between the general public and themselves. It will assist researchers in finding new techniques and methods which will potentially provide them with new data-mining methods and research topics. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
19. Computer Attacks.
- Published
- 2012
- Full Text
- View/download PDF
20. Index.
- Published
- 2012
- Full Text
- View/download PDF
21. NEO Thinks EBO - a way to Shape Perceptions.
- Author
-
Perry, Nuno and Nunes, Paulo
- Abstract
The concept is not new. In fact we've learned from Sun Tzu that "Those skilled in war subdue the enemy's army without battle." However Effects Based Operations definition, development and operationalization has been subjected to disparate analyses, doctrines, interpretations and became a controversial issue. This paper addresses Effects-Based Operations (EBO) and Effects-Based Approach to Operations (EBAO) conceptualization and applicability to the full spectrum of human interactions, focused on the economic and information domains in a synchronized whole-of-government/coalition approach. It intends to answer to the question: How can EBO/EBAO be addressed in the information age? A comprehensive analysis of existing doctrine, scientific papers and thesis concur to the foundations of a theoretical background. Due to its relevancy, the memorandum for U.S. Joint Forces Command, signed by General J. N. Mattis on the 14
th of August 2008 subjected to the assessment of EBO and the respective rationale (but not only this document) is assessed against that theoretical background. Along its argumentation this paper also aims to demonstrate that the conflictual interactions on the geopolitical and geoeconomic domains of cyberspace reinforce the evidences for the use of non-attrition operations to succeed in an environment of adaptive and complex systems of systems. The intensive use of internet, created networked dependencies and subsequent networked vulnerabilities that can and are exploited in an Information Warfare context, targeting not only military objectives but also national critical infrastructures, logistical networks, strategic industries and of course leaderships. Recent cyberattacks to Estonia and Georgia are symptomatic of coordinated actions on the information domain. Classic attrition instruments of combat are inefficient in this environment. Achieving information superiority is the ultimate goal for a strategic decision maker. Dealing with a humanitarian crisis, a disaster relief effort, a military conflict, combating terrorism or any other asymmetric actor, resolving a severe diplomatic incident, conducting a hostile company takeover, facing a global financial crises or any other human endeavour requests more the direct physical intervention. Information superiority empowers the decision maker with the knowledge to achieve better results deploying information operations that will support the strategy and this demands the intensive use of Intelligence supported by invasive information systems like the Echelon or the Carnivore in ways that goes beyond their original purpose namely for economic interests. To shape the perception of our adversaries, allies and neutrals, affecting their cognitive sphere thus their decision capacity, is the most efficient way to our desired outcomes. This shape of perception is doable through a comprehensive and network centric approach to operations. One can not propose a methodology or a process because it is neither of those but rather a way of thinking operations. [ABSTRACT FROM AUTHOR]- Published
- 2010
22. Cybercrime and Society.
- Author
-
Yar, Majid
- Published
- 2006
- Full Text
- View/download PDF
23. Terrorism and technology: policy challenges and current responses.
- Published
- 2005
- Full Text
- View/download PDF
24. Teaching and Learning Guide for: New Media, Web 2.0 and Surveillance.
- Author
-
Fuchs, Christian
- Subjects
WEB 2.0 ,INTERNET ,MICROBLOGS ,ONLINE social networks ,PRIVACY - Abstract
This guide accompanies the following article: Christian Fuchs, 'New Media, Web 2.0 and Surveillance', Sociology Compass 5/2 (2011): 134-147, [DOI]. Introduction The Internet has become part of our everyday lives. Many of us use it for work, hobbies, entertainment, politics, staying in touch with friends and family, learning to know new people and other cultures, for getting all kind of information, etc. In the past 10 years, we have seen the emergence of platforms like Facebook and Myspace (social networking sites), Wordpress and Blogger (blogging) Twitter (social networking, microblogging), YouTube (video sharing), Wikipedia (wiki-based encyclopaedia), or the Pirate Bay (filesharing index site). The notions of 'web 2.0' and 'social media' have been used by some scholars to describe features of such sites such as community-building and maintenance, continuous communication, user-generated content production and diffusion, collaborative authoring, and distributed content classifications (the latter mechanism is also called folksonomy). Most web 2.0 platforms collect, store, and share a lot of personal user data and data about usage behaviour. Therefore, questions about privacy violations and online surveillance have arisen in public discussions, especially concerning Google (for example the discussions about Google targeted advertising, Google Street View, Google Buzz, etc.) and Facebook (for example the discussions concerning Facebook targeted advertising, Facebook beacon, the Facebook privacy policy, Facebook places, etc.). The field of web 2.0 surveillance studies critically asks questions about the data protection aspects and power dimensions of the contemporary Internet. It is crucial for students and scholars, who are interested in the contemporary media landscape, and who study in fields such as media/communication studies, cultural studies, political science, law, computer science, social informatics, information science, sociology, business studies, advertising, marketing and public relations, philosophy, ethics, science and technology studies etc., to also engage with web 2.0 surveillance studies. Recommended readings Fuchs, Christian. 2010. 'Labour in Informational Capitalism and on the Internet'. The Information Society 26(3): 179-96. doi: Christian Fuchs discusses in this article the political economy of the contemporary Internet. He does so by giving first an introduction to Karl Marx's analysis of capitalism that is then applied for understanding aspects of the exploitation of the users of contemporary commercial Internet platforms like Facebook. Fuchs uses Dallas Smythe's notion of the audience commodity for critically discussing the business models of web 2.0. He coins the notion of Internet prosumer labour in this context. He concludes that on commercial web 2.0 platforms, user activity tends to become exploited and is unpaid labour. Surveillance is situated in the framework of this analysis. Andrejevic, Mark. 2002. 'The Work of Being Watched'. Critical Studies in Media Communication 19(2): 230-48. doi: Mark Andrejevic argues in this article that contemporary commercial forms of interactive media make use of surveillance for exploiting consumers. He introduces in this context the notion of 'the work of being watched'. This concept is based on Sut Jhally's concept of the work of watching. Andrejevic also introduces the notion of the digital enclosure and gives very good examples for online surveillance. Albrechtslund, Anders. 2008. 'Online Social Networking as Participatory Surveillance'. First Monday 13(3). [online]. Retrieved on 1 March 2011 from: . In this article, Anders Albrechtslund introduces the notion of participatory surveillance. Other than Fuchs and Andrejevic, Albrechtslund has a rather positive concept of surveillance, he focuses on the description of potentially empowering aspects of social networking sites and other web 2.0 technologies. Albrechtslund stresses the social dimension of web 2.0, its ability for enabling communication, sharing, and community-building. Mathiesen, Thomas. 2004. Silently Silenced. Essays on the Creation of Acquiescence in Modern Society. Winchester: Waterside Press. In this short 100 page book, Thomas Mathiesen discusses mechanisms and examples of how political opposition is silently silenced, that is ideologically forestalled. The work is a masterpiece of contemporary ideology critique. Mathiesen identifies mechanisms of how silent silencing works and gives many examples. In chapter 8, it is discussed how the corporate Internet works as system of silent silencing or what Mathiesen terms the synopticon. Mathiesen's work is influenced among others by Foucault and Frankfurt School ideology critique. Campbell, John E. and Matt, Carlson M. 2002. 'Panopticon.com: Online Surveillance and the Commodification of Privacy'. Journal of Broadcasting & Electronic Media 46(4): 586-606. doi: In this paper, Campbell and Carlson discuss the usefulness of Michel Foucault's notion of the panopticon as technology of surveillance for explaining how Internet advertising and marketing work. They employ a political economy framework and argue that Internet advertising and marketing commodify users' private data and their privacy. Online materials The following online journals are very good sources for further papers about critical internet studies, information society studies, surveillance studies, and privacy studies: [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
25. New Media, Web 2.0 and Surveillance.
- Author
-
Fuchs, Christian
- Subjects
WEB 2.0 ,WORLD Wide Web ,WEBSITES ,INTERNET - Abstract
This article outlines some basic foundations and academic controversies about Web 2.0 surveillance. Contemporary web platforms, such as Google or Facebook store, process, analyse, and sell large amounts of personal data and user behaviour data. This phenomenon makes studying Internet surveillance and web 2.0 surveillance important. Surveillance can either be defined in a neutral or a negative way. Depending on which surveillance concept one chooses, Internet/web 2.0 surveillance will be defined in different ways. Web 2.0 surveillance studies are in an early stage of development. The debate thus far suggests that one might distinguish between a cultural studies approach and a critical political economy approach in studying web 2.0 surveillance. Web 2.0 surveillance is a form of surveillance that exerts power and domination by making use specific qualities of the contemporary Internet, such as user-generated content and permanent dynamic communication flows. It can be characterized as a system of panoptic sorting, mass self-surveillance and personal mass dataveillance. Facebook is a prototypical example of web 2.0 surveillance that serves economic ends. The problems of Facebook surveillance in particular and web 2.0 surveillance in general include: the complexity of the terms of use and privacy policies, digital inequality, lack of democracy, the commercialization of the Internet, the advancement of market concentration, the attempted manipulation of needs, limitation of the freedom to choose, unpaid value creation of users and intransparency. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
26. An Interview with Paul DeMarinis.
- Author
-
Ouzounian, Gascia
- Subjects
MUSICIANS ,ELECTRONIC music ,MUSIC education - Abstract
An interview with electronic musician Paul DeMarinis is presented. He said that he came to music from classical music after studying it when he was still a teenager and became interested in media during his college years. He commented that his performance work always played with his installation work in terms of ideas, materials, and objects.
- Published
- 2010
- Full Text
- View/download PDF
27. ROUNDTABLE.
- Published
- 2002
28. Protecting the Common Good: Technology, Objectivity, and Privacy.
- Author
-
Nelson, Lisa
- Subjects
POLITICAL science ,GOVERNMENT policy ,POLITICAL planning ,PUBLIC administration ,RIGHT of privacy ,DEMOCRACY & science ,DEMOCRACY ,POLITICAL philosophy ,TERRORISM ,SEPTEMBER 11 Terrorist Attacks, 2001 - Abstract
The rhetoric of public policy after September 11 encourages us to believe that the preservation of freedom and the safety of the common good requires our universal acquiescence to technological invasions of privacy. The purpose of this article is simply to warn that the rhetoric of public policy solutions post-September 11 may be inconsistent with the philosophical and legal framework of American democracy. While serving as a solution today, this rhetoric may pose a devastating blow to the balance of individual privacy and common good that is essential to the preservation of freedom. [ABSTRACT FROM AUTHOR]
- Published
- 2002
- Full Text
- View/download PDF
29. The Costs of Fighting Terrorism.
- Author
-
Raeburn, Paul, France, Mike, and Green, Heather
- Subjects
COUNTERTERRORISM ,UNITED States politics & government - Abstract
Deals with the cost of the counter-terrorism effort of the United States. Suggestions of terrorist analysts on the needs of the country; Focus of the country's research initiatives after the September 11, 2001 terrorist attack; Significant role of technology; Information on the Carnivore software being used by the National Bureau of Investigation.
- Published
- 2001
30. Carnivore Takes A Bite Out Of The Fourth Amendment.
- Author
-
Frezza, Bill
- Subjects
- *
COMPUTER software , *COMPUTER network security - Abstract
Comments on the United States Federal Bureau of Investigation's Carnivore software, which the agency describes as a diagnostic tool that can intercept and collect Internet communications. Prospects for the eventual installation of a permanently embedded and systemwide surveillance capability into the fabric of the Internet; Internet service provider EarthLink's refusal to install Carnivore.
- Published
- 2000
31. Carnivore comes late to table, but it's still a beast.
- Author
-
Wirbel, Loring
- Subjects
- *
ELECTRONIC surveillance , *INTERNET service providers , *COMPUTER software - Abstract
Comments on the Carnivore software of the United States Federal Bureau of Investigation that analyzes packet flows at Internet service providers' points of presence. Privacy issue raised by the software program; Problem with the 1994 Communications Assistance to Law Enforcement Act.
- Published
- 2000
32. Privacy Under Attack: Are tougher laws needed to protect citizens?
- Author
-
Marshall, Patrick
- Subjects
ELECTRONIC commerce ,INTERNET service providers ,MEDICAL records ,SELF regulation ,CIVIL rights - Abstract
Privacy advocates warn that emerging technologies — including powerful surveillance equipment and software that can monitor consumers' Internet activity — are eroding Americans' right to privacy. In addition, disclosure of individuals' medical records and genetic information raises the possibility of employment and insurance discrimination. A number of laws protect citizens from unwarranted intrusions by the government, but relatively few offer protection from intrusions by other individuals or employers. Several bills pending in Congress would provide increased privacy protection for citizens, but opponents of privacy legislation say self-regulation can better protect consumers, especially those making purchases over the Internet. [ABSTRACT FROM AUTHOR]
- Published
- 2001
33. Policing Consumer Privacy: Congress Prepares to Opt In.
- Author
-
Bettelheim, Adriel
- Subjects
PRIVACY ,INTERNET - Abstract
Focuses on the legislative bills in the 107th United States Congress that address Internet privacy issues. Convenience and privacy; Discussion on customer location privacy; Issues about the possible conflict between federal and state laws; Discussion on liability concerns. INSET: Key Areas for Privacy Legislation.
- Published
- 2001
34. MORE EYES ON YOU.
- Author
-
Lacayo, Richard and Goldstein, Andrew
- Subjects
COUNTERTERRORISM ,UNITED States politics & government, 2001-2009 ,WIRETAPPING - Abstract
Focuses on the role of United States Attorney General John Ashcroft in the war against terrorism. His requests for expanded governmental power; Background on previous antiterrorism proposals; Issues of wiretapping and detention of immigrant suspects; Worries of civil libertarians over deportation legislation; View that his less controversial requests will face easier passage. INSET: No More Entry?, by Andrew Goldstein and Jodie Morse.
- Published
- 2001
35. Surveillance: Playing Catchup.
- Author
-
Bettelheim, Adriel
- Subjects
ELECTRONIC surveillance ,TELECOMMUNICATION - Abstract
Discusses the surveillance technology of federal agencies in the United States. Problems faced by the Congress on surveillance laws; Discussion on surveillance through electronic information; Debates on the government's surveillance power on domestic telecommunication systems.
- Published
- 2001
36. Study by FBI Is Confident In 'Carnivore.'.
- Author
-
Bridis, Ted
- Subjects
- *
COMPUTER software , *ELECTRONIC surveillance software - Abstract
Reports on the findings of a draft review of the United States Federal Bureau of Investigation's Carnivore Internet surveillance system released on November 21, 2000 by the Justice Department. Implications of the draft's findings; Information on the Carnivore software; Details on the action taken by the review panels. INSET: Carnivore Reviewed.
- Published
- 2000
37. FBI Gets Web Guru Cerf's Support for Carnivore.
- Author
-
Bridis, Ted
- Subjects
- *
INTERNET , *RIGHT of privacy - Abstract
Reports that the United States Federal Bureau of Investigation has gained the support of Vinton Cerf, senior vice president at WorldCom Inc., regarding the use of its Carnivore Internet surveillance system, in a Senate hearing on Internet privacy. Contribution of Cerf to the development of the Internet; Comments from Cerf; Information on the Carnivore software.
- Published
- 2000
38. PRIVACY VS. SECURITY: TREAD CAREFULLY.
- Subjects
PRIVACY ,TERRORISM ,INTERNATIONAL crimes ,SOCIAL conditions in the United States, 1980- - Abstract
Editorial. Discusses the debate about privacy in the fight against terrorism in the United States. Statement that the government is relying on technology to combat terrorism; Willingness of Americans in allowing the government to invade privacy; Trust of Americans in the government.
- Published
- 2001
39. AT DEADLINE.
- Subjects
- *
COMPUTER industry , *COMPUTER software , *CORPORATE profits - Abstract
Presents news briefs on the computer industry in the United States (U.S.) as of November 27, 2000. Privacy risk posted by the Carnivore software of the U.S. Federal Bureau of Investigation (FBI); Revenue posted by Novell Inc. for the fourth quarter.
- Published
- 2000
40. At Deadline Briefs
- Subjects
Wireless telecommunications service ,Company financing ,Software quality ,Company acquisition/merger ,Privacy issue ,ATand T Wireless Group -- Mergers, acquisitions and divestments ,Novell Inc. -- Finance -- Mergers, acquisitions and divestments ,NTT DoCoMo Inc. -- Mergers, acquisitions and divestments -- Finance ,United States. Federal Bureau of Investigation -- Science and technology policy ,Computer software industry -- Finance -- Mergers, acquisitions and divestments ,Software ,Cellular telephone services industry -- Mergers, acquisitions and divestments ,Privacy - Abstract
Report Confirms Carnivore Risk An edited version of an independent study of the FBI's Carnivore software, released last week by the Department of Justice, confirmed fears that the tool can […]
- Published
- 2000
41. TERROR ON THE INTERNET: THE NEW ARENA, THE NEW CHALLENGES.
- Author
-
Hannabuss, Stuart
- Subjects
CYBERTERRORISM ,NONFICTION - Abstract
A review is presented of the book "Terror on the Internet: The New Arena, the New Challenges," by Gabriel Weimann.
- Published
- 2008
- Full Text
- View/download PDF
42. Limits Voted On Tracking Of E-Mail.
- Author
-
Fagan, Amy
- Subjects
EMAIL laws ,LAW enforcement - Abstract
Reports on the legislation that would limit law enforcement agencies' powers to track and obtain electronic communications approved by the United States House Judiciary Committee on September 26, 2000. Scope of the measure; Controversies raised in relation to the bill's approval; Provisions under the legislation.
- Published
- 2000
43. Understanding Homeland Security
- Author
-
Gus Martin and Gus Martin
- Subjects
- National security--United States--Textbooks, Emergency management--United States--Textbooks, Terrorism--United States--Textbooks, Civil defense--United States--Textbooks
- Abstract
Gus Martin′s Understanding Homeland Security, 4th edition offers much-needed insight into the complex nature of issues surrounding modern homeland security. This comprehensive textbook examines the theories, agency missions, laws, and regulations governing the homeland security enterprise through the lens of threat scenarios and countermeasures related to terrorism, natural disasters, emergency management, cyber security, and much more. Martin′s pedagogical approach is designed to stimulate critical thinking in readers, allowing them to not only comprehend the fundamentals, but to analyze and respond to various threat environments. The Fourth Edition introduces readers to homeland security in the modern era, focusing particularly on the post - September 11, 2001 world. Exploring cutting-edge topics, this book keeps readers on the forefront of homeland security.
- Published
- 2024
44. Digital Transformation on Manufacturing, Infrastructure & Service : DTMIS 2022
- Author
-
Igor Ilin, Mariana Mateeva Petrova, Tatiana Kudryavtseva, Igor Ilin, Mariana Mateeva Petrova, and Tatiana Kudryavtseva
- Subjects
- Engineering—Data processing, Manufactures, Computational intelligence
- Abstract
This book contains theoretical, econometric, experimental, and policy-oriented contributions of the DTMIS conference participants. Every year the DTMIS conference brings together experts from academia and industry to uncover the challenges and solutions to ensuring digital transformation on manufacturing, infrastructure, and service. The DTMIS proceedings is distinguished by the fact that it contains works not only by scientists, but also by practitioners in the industry, and, of course, their collaboration works are of particular and undeniable value.This book is useful for experienced scientists and practitioners who seek to find something new for themselves and apply it in their work, as well as for students at the beginning of their scientific activity.
- Published
- 2023
45. Gale Encyclopedia of American Law, 4th Ed
- Author
-
Gale and Gale
- Abstract
Provides diverse content covering the gamut of law subjects, including current information on nearly 5,000 legal topics.
- Published
- 2021
46. Understanding Homeland Security
- Author
-
Gus Martin and Gus Martin
- Subjects
- Civil defense--United States--Textbooks, Terrorism--United States--Textbooks, Emergency management--United States--Textbooks, National security--United States--Textbooks
- Abstract
Gus Martin's Understanding Homeland Security provides students with a comprehensive introduction to U.S. homeland security in the modern world, with a focus on the post-September 11, 2001 era. This insightful resource examines the theories, agency missions, laws, and regulations governing the homeland security enterprise through the lens of threat scenarios and countermeasures related to terrorism, natural disasters, emergency management, cyber security, and much more. The Third Edition keeps readers on the forefront of homeland security with coverage of cutting-edge topics, such as the role of FEMA and preparedness planning; the role of civil liberty and countering extremism through reform; and hackings during the 2016 and 2018 U.S. elections. Readers will gain much-needed insight into the complex nature of issues surrounding today's homeland security and learn to think critically to analyze and respond to various threat environments. INSTRUCTORS: Understanding Homeland Security is accompanied by SAGE edge for instructors and students, which includes access to SAGE Premium Video!
- Published
- 2020
47. Surveillance in America : An Encyclopedia of History, Politics, and the Law [2 Volumes]
- Author
-
Pam Dixon and Pam Dixon
- Subjects
- Electronic surveillance--Law and legislation--United States, Privacy, Right of--United States--History
- Abstract
An excellent resource for high school and college students, this book surveys the size, scope, and nature of government surveillance in 21st-century America, with a particular focus on technology-enabled surveillance and its impact on privacy and other civil liberties.The advent of online, cellular, and other digital networks has enabled today's government surveillance operations to become more extensive and far more thorough than any other programs before them. Where does the line between taking actions to help ensure the safety of the general population against terrorism and other threats and the privacy of individual citizens lie? Is there any such clearly defined line anymore? This two-volume set examines the key issues surrounding government surveillance and privacy in 21st-century America, covering topics ranging from the surveillance conducted during colonial days, which inspired the Fourth Amendment, to the new high-tech developments that pose unprecedented potential challenges to the privacy of millions of Americans. Readers will gain insight into the complex challenge of interpreting the Fourth Amendment protections against warrantless, unreasonable government searches and understand how changes in the methods by which the U.S. government carries out counterterrorism and law enforcement activities influence its relationship with American citizens and businesses.
- Published
- 2016
48. Collaboration with Cloud Computing : Security, Social Media, and Unified Communications
- Author
-
Ric Messier and Ric Messier
- Subjects
- Computer crimes--Prevention, Computer security, Cloud computing, Information technology--Management, Information technology--Security measures
- Abstract
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: - The evolving nature of information security - The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP - Social media and security risks in the enterprise - The risks and rewards of allowing remote connectivity and accessibility to the enterprise network - Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutions - Presents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studies - Explores the risks associated with the use of social media to the enterprise network - Covers the bring-your-own-device (BYOD) trend, including policy considerations and technical requirements
- Published
- 2014
49. @War : The Rise of the Military-Internet Complex
- Author
-
Shane Harris and Shane Harris
- Subjects
- Information warfare--United States, Cyberspace--Security measures--Government policy, Computer crimes--Prevention--Government policy, Cyberterrorism--Prevention--Government policy
- Abstract
An informative study of how corporations, governments, and individuals are perfecting the ability to monitor and sabotage Internet infrastructure.The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
- Published
- 2014
50. Drea De Matteo 61 Success Facts - Everything You Need to Know About Drea De Matteo
- Author
-
Stanley Larson and Stanley Larson
- Abstract
Get It ALL With this Extensive Drea de Matteo Biography. This book is your ultimate resource for Drea de Matteo. Here you will find the most up-to-date 61 Success Facts, Information, and much more.In easy to read chapters, with extensive references and links to get you to know all there is to know about Drea de Matteo's Early life, Career and Personal life right away. A quick look inside: Walker Payne - Cast, Fun Town - Guest Starring, Pilot (Sons of Anarchy) - Guest Starring, Dark Places (2014 film) - Cast, Loyola School (New York City) - Notable alumni, Desperate Housewives - Main cast, Everybody Hurts (The Sopranos) - Starring, The Good Life (2007 film) - Cast, Joey (TV series) - Main characters, Sons of Anarchy (season 1) - Recurring guest stars, Swordfish (film) - Plot, List of Sons of Anarchy characters - Wendy Case, Assault on Precinct 13 (2005 film) - Plot, Seeds (Sons of Anarchy) - Guest Starring, Desperate Housewives - Series synopses and episodes, Assault on Precinct 13 (2005 film) - Cast,'R Xmas - Cast, The Sopranos (season 6) - Recurring cast, Angie Bolen, The Mindy Project - Notable guest stars, Steve Berra - Directing, Adriana La Cerva, Deuces Wild - Cast, The Sopranos - Awards, The Sleep of Babies - Guest Starring, Prey for Rock and Roll - Cast, Drea de Matteo, Broken English (2007 film) - Cast, List of American television actresses - D, VH1 Divas - Presenters, Gabrielle Solis - Season Six, Broken English (2007 film) - Plot, Sons of Anarchy - Recurring guest stars, All Due Respect (The Sopranos) - Starring, Angie Bolen - Development and departure, Angie Bolen - Personality and characteristics, Sons of Anarchy (season 6) - Recurring guest stars, Golden Globe Award for Best Supporting Actress – Series, Miniseries or Television Film - 2000s, and much more...
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.