Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Network Architecture (3)
- Bandwidth (2)
- COVID-19 (2)
- Acceptance and assimilation of new technological policy measures (1)
- Application Design (1)
-
- Apps (1)
- Audits (1)
- Barbara van Schewick (1)
- Book Review (1)
- Broadband Capacity (1)
- COVID (1)
- Cellular phones (1)
- Civil remedy (1)
- Cloud Computing (1)
- Collection of data (1)
- Computer Engineering (1)
- Computer I (1)
- Computer II (1)
- Computers (1)
- Computing inquiries (1)
- Conflict between the public interest and individual rights (1)
- Contact-tracing methods (1)
- Criminal liability (1)
- Critical Access (1)
- Cybersecurity (1)
- DTA implementation (1)
- DTA-based policy (1)
- DTAs (1)
- Data collection (1)
- Data point (1)
- Publication
Articles 1 - 12 of 12
Full-Text Articles in Computer Engineering
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet
Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet
Markets, Globalization & Development Review
In the past few years, big Social Media networks like Facebook, Twitter, and YouTube have received intense scrutiny from the intellectual classes. This article critiques the dominant strain of criticism, the neo-Brandeisian School of antitrust, for its narrow focus on “regulated competition” as an appropriate means to “fix social media”. This essay calls for a socialist alternative: a democratic social media commons based on free and open source technology, decentralization, and democratic socialist legal solutions. It reviews how existing solutions like the Fediverse and LibreSocial work, and how they may provide answers for a better way forward.
The Fcc And The “Pre-Internet”, John Blevins
The Fcc And The “Pre-Internet”, John Blevins
Indiana Law Journal
Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.
This Article, however, argues that …
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub
Federal Communications Law Journal
Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
Policy debates about the evolution of the Internet show varying degrees of understanding about the underlying technology. A fundamental principle of the design of the Internet, from the early 1980s, is the so-called "end-to-end argument" articulated in a seminal technical paper. Intended to provide guidance for what kind of capability is built into a network as opposed to the devices that use the network, the end-to-end argument has been invoked in …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
The Changing Patterns Of Internet Usage, Christopher S. Yoo
The Changing Patterns Of Internet Usage, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
The Challenge Of Increasing Broadband Capacity, Dale N. Hatfield
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
The University of New Hampshire Law Review
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …