Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Databases and Information Systems (4)
- Business (2)
- Defense and Security Studies (2)
- Engineering (2)
- International Relations (2)
-
- Management Information Systems (2)
- Military and Veterans Studies (2)
- OS and Networks (2)
- Organizational Behavior and Theory (2)
- Other Political Science (2)
- Peace and Conflict Studies (2)
- Policy Design, Analysis, and Evaluation (2)
- Political Science (2)
- Political Theory (2)
- Public Affairs (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Policy (2)
- Risk Analysis (2)
- Social and Behavioral Sciences (2)
- Systems Architecture (2)
- Artificial Intelligence and Robotics (1)
- Programming Languages and Compilers (1)
- Software Engineering (1)
- Keyword
-
- Austerity (2)
- Authority (2)
- Computer Security (2)
- Government (2)
- Legitimacy (2)
-
- Open Government (2)
- Open government (2)
- Context-Aware (1)
- Context-aware computing (1)
- Cryptography (1)
- Diversity (1)
- Dwight waldo (1)
- Hacking (1)
- IPv6 (1)
- Information hiding (1)
- Location-based services (1)
- Metamorphism (1)
- Mobile computing (1)
- Moving target (1)
- Network security (1)
- Obfuscation (1)
- Open source (1)
- Political scince (1)
- Proximity measurement (1)
- Public administration (1)
- Public affairs (1)
- Security theory (1)
- Steganography (1)
- Transparency (1)
- Wi-Fi (1)
Articles 1 - 5 of 5
Full-Text Articles in Other Computer Sciences
Effective Security By Obscurity, John Christian Smith
Effective Security By Obscurity, John Christian Smith
John Christian Smith
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 2, Jan Kallberg
Jan Kallberg
Waldo’s predictions about the future for public administration describe five areas that would be problematic in the future: legitimacy, authority, knowledge, control, and confidence. Legitimacy includes not only that the government is legally legitimized but capable and focused on an intention to deliver the “good society.” Authority, according to Waldo, is the ability to implement policy with the acceptance of the people based on rationalism, expectations of public good, ethics, superior knowledge, and institutional contexts. Knowledge is institutional knowledge, the ability to arrange and utilize knowledge within the bureaucracy since coordination is the major challenge in knowledge management. Government has …
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Waldo In The Light Of Austerity And Federal Debt Crisis, Part 1, Jan Kallberg
Jan Kallberg
Dwight Waldo wrote The Enterprise of Public Administration in 1979 looking back on a long and fruitful academic career, but also as a reflection about the future for public administration. Can a 30 year old book still be relevant? You bet. Today, the public sector is increasingly facing fiscal challenges. Federal, state, and local governments throughout the country have major budget deficits followed by austerity measures that undermine the ability to deliver the good life of the future. In this day and age rereading Dwight Waldo’s The Enterprise of Public Administration is an intellectual exercise worth pursuing. Several of Dwight …
Ipv6 Security Basics, John Christian Smith
Ipv6 Security Basics, John Christian Smith
John Christian Smith
Overview of security considerations in adopting IPv6
Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa
Enhanced Indoor Locationing In A Congested Wi-Fi Environment, Hsiuping Lin, Ying Zhang, Martin Griss, Ilya Landa
Martin L Griss
Many context-aware mobile applications require a reasonably accurate and stable estimate of a user’s location. While the Global Positioning System (GPS) works quite well world-wide outside of buildings and urban canyons, locating an indoor user in a real-world environment is much more problematic. Several different approaches and technologies have been explored, some involving specialized sensors and appliances, and others using increasingly ubiquitous Wi- Fi and Bluetooth radios. In this project, we want to leverage existing Wi-Fi access points (AP) and seek efficient approaches to gain usefully high room-level accuracy of the indoor location prediction of a mobile user. The Redpin …