Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Communication (2)
- Computer and Systems Architecture (2)
- Digital Communications and Networking (2)
- Science and Technology Studies (2)
-
- Social Media (2)
- Social and Behavioral Sciences (2)
- Technology and Innovation (2)
- Business Intelligence (1)
- Communication Technology and New Media (1)
- Data Storage Systems (1)
- Defense and Security Studies (1)
- E-Commerce (1)
- Information Literacy (1)
- Law (1)
- Library and Information Science (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Operational Research (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Engineering (1)
- Public Affairs, Public Policy and Public Administration (1)
- Science and Technology Law (1)
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Internet Of Things Security Case Studies And Internet Of Things Core Service Comparions, Jaseong Koo
Internet Of Things Security Case Studies And Internet Of Things Core Service Comparions, Jaseong Koo
Electronic Theses, Projects, and Dissertations
This culminating project conducted an analysis of IoT security breach case studies. The analysis identified numerous vulnerable points: software failure, node tampering attack, eavesdropping, code injection, unauthorized access, social engineering attack, hardware exploitation, and node insertion. It therefor seems that even with the proper tests conducted on vulnerabilities to discover solutions, regular end users are unable to apply patches or other technical solutions to protect themselves. This project solely focuses on analyzing of comprehensive IoT security services that come with devices connected to home network. The devices are those provided by the big three: Amazon, Google, and Microsoft, on the …
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Journal of International Technology and Information Management
The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …