Articoli di riviste sul tema "Internet des objets – Protection"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Internet des objets – Protection.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Internet des objets – Protection".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Haza, Marion. "Objets culturels dystopiques et adolescence". Topique 160, n. 1 (1 gennaio 2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Après avoir redéfini utopie et dystopie, cet article déploie l’analogie entre processus pubertaire et scénario dystopique. L’adolescent est bien une figure de héros de sa propre histoire, résistant au tourment pubertaire pour s’inscrire dans la société en tant que futur adulte, parfois dans un sacrifice psychopathologique. Les objets culturels adolescents servent de portage et de protection face à ce parcours dystopique : les fictions dystopiques des adolescents contemporains (livres, manga, jeux vidéo, etc.) figurent leurs conflictualités internes, rendent possible des indentifications ou contre-identifications, et leur permettent de les partager avec d’autres, que ce soient leurs pairs, mais aussi, les adultes comme les thérapeutes.
2

Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management". Sécurité et stratégie 32, n. 4 (19 marzo 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Titulaire d’un doctorat en Informatique et Intelligence artificielle (systèmes industriels), obtenu à ISAE-Supaéro, Yannick Meiller est professeur à ESCP Europe . Ses travaux de recherche et ses enseignements portent pour l’essentiel sur le numérique et les domaines associés (traitements de l’information, Internet des objets, protection des données à caractère personnel, sécurité, systèmes d’information…), ainsi que sur le management de projets innovants . Il nous explique ici pourquoi la sécurité de l’information est un sujet à enseigner dans les écoles de management .
3

WANG, Haixiang, Jingyi CAO e Zhe LIU. "Energy Internet and Its Trusted Protection Architecture". Wuhan University Journal of Natural Sciences 27, n. 2 (aprile 2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Through the combination of new energy and Internet technology, the Energy Internet deeply integrates various complex network systems such as power, transportation and natural gas, aiming to change the energy utilization model and promote the sustainable development of economy and society. The Energy Internet takes the power grid as the "Backbone Network" , integrating the autonomous units of distributed energy, and integrating information and energy through the open-peer information and energy integration architecture. Information interaction scenarios of the Energy Internet information interaction scenarios include "human-object" , "human-human" and "object-object" . In this new interconnection mechanism environment, the lack of any security defenses may leave the Energy Internet exposed to the risk of information leakage, theft and loss, resulting in immeasurable losses. From "human-object" , "object-object" and "human-human" interaction scenarios, the paper puts forward fine-grained access control mechanism, trusted computing environment building in IoT devices and trusted communication channel construction, and designs a trusted protection architecture for the Energy Internet to ensure the data security throughout its life cycle. We verify that the proposed architecture can provide trusted environment for the Energy Internet.
4

Samahalska, Y. "Personal data protection in the Internet". Uzhhorod National University Herald. Series: Law 2, n. 82 (10 giugno 2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
A personal daily communication is connected with giving and receiving a large amount of information. A common visit to a website can provide its owner with information about its users (cookies). A registration will provide the owner with a confidential information. In this view, it became necessary to protect a person and to regulate a separate subtype of such information called “personal data”. The concept of “personal data” is not new for Ukraine. The Law “On Protection of Personal Data” was adopted in 2010, however, the practice of its realization shows that the subjects of relations related to personal data interpret it quite superficially. Thus, the owners and managers of personal data formally, without specifying the purpose and method of processing, notify the subject of personal data that his personal data will be processed. And the subjects of personal data give such consent without reading the procedure for personal data processing or the privacy policy. The probability that the personal database will be deleted after the termination of the legal relationship by the owner or manager is quite small. Due to inappropriate protection and control personal database are constant objects of leaks and thefts, which turn to other crimes, especially on the Internet. The article pays special attention to the research about the collection of personal data on the websites of Ukrainian political parties, because such personal data are sensitive and their processing should be carried out especially carefully. The leakage of personal data supporters of a certain political force may pose a physical danger to them in martial law conditions. The author concludes it is necessary to bring the national legislation on protection of personal data to the requirements of the General Data Protection Regulation and to strengthen the control over its compliance by increasing responsibility for violations of the legislation on the protection of personal data.
5

Logvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Logvynenko, M. I., I. V. Karikh e A. V. Dykovets. "Problems of protection of copyright objects in the network Internet". Legal Horizons 15, n. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Moskalenko, I. A. "Registration of works as a tool to protect copyright in cross-border relations (Internet)". Actual Problems of Russian Law, n. 3 (4 maggio 2019): 142–50. http://dx.doi.org/10.17803/1994-1471.2019.100.3.142-150.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The paper analyzes copyright registration systems in the Russian Federation and abroad. The fact of creation of a work gives rise to the author a number of rights and obligations without performing any formalities, including registration of the work. There are three systems in which registration of a work creates for the copyright holder additional protection of the rights of the author, does not create negative consequences for non-compliance with the registration procedure or is provided by law only for specific copyright objects. Deposit is considered as an element of the procedure for registration of works, including as an indirect confirmation of the fact of the creation of a digital work for the lex loci originis collision binding states (the law of the state of origin of the work), and for the lex loci protectionis targeting states (the law of the state where protection is claimed), the deposit does not confirm the fact of the creation of the work, but helps to preserve the copyright object.
8

Kurniawan Sihombing, Agung, Rika Ratna Permata e Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States". PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, n. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming sites on the internet. Unfortunately, it also raises a new question: how digital copyright-objects can be protected in this kind of service. Without physical form, copyright object can be distributed easily on the internet, and it may lead to right violations. To answer this problem, the authors aim to describe the digital copyright protection on OTT Streaming Content Media in Indonesia and compare them to the 1998 Digital Millennium Copyright Act (DMCA) of the United States of America using a descriptive-analytical approach. This study employed a normative juridical approach with secondary data. The results of this study indicate that digital copyright protection in Indonesia is still centered on conventional copyright objects, and a sui generis law is needed to provide better protection for digital copyright objects.
9

Idrisov, Hussein V. "Certain issues of legal regulation of the placement of intellectual property objects on the Internet: problematic aspects and search for solutions". Current Issues of the State and Law, n. 4 (2022): 556–66. http://dx.doi.org/10.20310/2587-9340-2022-6-4-556-566.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
We provide a legal description of the problems that arise as a result of the placement of intellectual property objects on the Internet, mediated violations of the rights of legitimate copyright holders. The purpose of the study: to conduct a legal analysis (legal characteristics and analysis of judicial practice) of problematic issues of regulating the placement of intellectual property objects on the Internet. We point out that the legal protection of intellectual property subjects is possible through the implementation of criminal law and civil law measures adapted to the existing objective realities in cyberspace. We carry out a characterization of the subject composition of copyright holders and subjects of responsibility, cases from judicial practice are given. In addition, we consider pre-trial ways to resolve disputes between authors of works and owners of Internet resources. The study is based on formal legal and comparative legal methods, which have found their application in the legal analysis of the problems of protecting audiovisual works on the Internet. As a conclusion, we express the need for more effective, efficient protection of this institution of law at the present stage of its development by optimizing the criminal law and civil law means of protecting the institution of intellectual property law and the legitimate interests of copyright holders.
10

Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n. 11 (10 maggio 2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Internet of Things (IoT) is a new emergent technology of the Internet. The Internet that we use today runs with human interposing. The Internet of Things which is the extended version of the internet which aims to offer the machine to machine communication or the device may be referred to as objects we call it object to object communication, which is without the involvement of the humans. With the growth of IOT in the market there are many considerable subjects relating to privacy, authentication, data confidentiality, data protection and other problems where solutions to these issues to be derived. This paper works on providing Mutual authentication and data security. A light weight Approach has been employed by generating Hybrid MAC ID for mutual authentication and using Elliptical Curve for secure data transfer which provides authentication and data confidentiality in the IoT Network.
11

Utama, Andrew Shandy, Sandra Dewi e Bagio Kadaryanto. "PERLINDUNGAN HUKUM TERHADAP PELANGGARAN HAK CIPTA MELALUI MEDIA INTERNET BERDASARKAN UNDANG-UNDANG NOMOR 28 TAHUN 2014 TENTANG HAK CIPTA". Jurnal Ilmu Hukum 7, n. 2 (5 agosto 2018): 209. http://dx.doi.org/10.30652/jih.v7i2.5652.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Initially the scope of copyright protection only focused on conventional objects of creation. However, along with technological developments and advances, the object of copyright protection is expanding on the forms of creation in the form of science, art, and literature are digitized. Copyright Laws that are currently still experiencing some problems in order to provide protection to the creative works expressed through the internet media. Therefore, it is interesting to examine the legal protection against copyright infringement through internet media based on Law Number 28 Year 2014. The method used in this research is normative legal research. Sources of data used in this research are secondary data, namely data obtained from legislation, scientific journals, and legal literature. Data collection techniques used in this research is literature study. Data analysis technique used in this research is qualitative analysis. The results of this research indicate that the development and advancement of technology increasingly facilitate the occurrence of violations of Copyright through the internet media are hijacked, copied, and traded in the midst of society. Although in Law Number 28 Year 2014 has been set about bans and strict criminal sanctions, but due to weak regulation and lack of legal awareness of the public make law enforcement of Copyright is not running optimally.
12

Filinovych, Valeriia. "VIOLATION OF COPYRIGHT AND RELATED RIGHTS ON THE INTERNET: HOW TO PROTECT YOURSELF AND YOUR CREATION". Scientific works of National Aviation University. Series: Law Journal "Air and Space Law" 4, n. 61 (30 dicembre 2021): 144–50. http://dx.doi.org/10.18372/2307-9061.61.16362.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Purpose: the purpose of the research paper is to analyze reasons for the most frequent violations in the field of copyright and related rights to objects posted on the Internet, to study ways of their protection, and to provide for preventive methods of dealing with the violations of rights and freedoms of rightsholders. The methodological basis of the study comprises general scientific, philosophical, ideological, method of analysis and special methods. Results: the protection of copyright and related rights on the Internet is a complicated task because of the need to ensure a balance between the mentioned rights and the freedom to disseminate and receive information. The author gives her recommendations on how to prevent the infringement of copyright and related rights on the Internet and how to protect them using out-of-court (extrajudicial) and judicial procedures. Discussion: learning the essence of copyright and related rights, clarifying the essence of their normative regulation, description of the works that most often become the object of violation of rights, searching for methods and procedures to protect violated intellectual property rights on the Internet.
13

Sidi Ahmed, Sidi Mohamed, e Sonny Zulhuda. "DATA PROTECTION CHALLENGES IN THE INTERNET OF THINGS ERA: AN ASSESSMENT OF PROTECTION OFFERED BY PDPA 2010". International Journal of Law, Government and Communication 4, n. 17 (15 dicembre 2019): 01–12. http://dx.doi.org/10.35631/ijlgc.417001.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) is an emerging technology of the 21st century. It is described as the first real evolution of the Internet that could positively or negatively affect all aspects of life. The basic idea of the IoT revolves around connecting things and objects (persons, animals, cars, trees, etc.) to the Internet and enabling them to communicate and then process (generate, receive, send, etc.) data about themselves and the environment surrounding them. Without a doubt, the IoT will bring countless benefits and provide timely-data and information about places and objects. However, the IoT, like other technologies, has disadvantages especially in terms of privacy and security of data. Particularly, the IoT might challenge personal data protection law and misgive its ability to effectively stand in the rapid successive technology waves. As the most important law relating to the protection of personal data in Malaysia, the Personal Data Protection Act (PDPA) 2010 could be used as a benchmark for assessing the adequacy of data protection law in the country. Thus, this paper attempts to shed light on data protection challenges in the IoT era and then assess the adequacy of this Act in dealing with those challenges. The paper employs a legal doctrinal method to analyze the legal frameworks relevant to personal data protection. It may also use a comparative method to compare the PDPA with its counterparts in other countries. A study such as this is arguably useful and timely as Malaysia is already embarked in the IoT caravan with the vision of being “the Premier Regional IoT Development Hub.”
14

Kharchenko, Olesia, Olha Kronda, Inha Kryvosheyina e Kostiantyn Zerov. "Protection of intellectual property rights on the Internet: new challenges". Revista Amazonia Investiga 10, n. 41 (29 giugno 2021): 224–36. http://dx.doi.org/10.34069/ai/2021.41.05.22.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Given the steady growth in demand for Internet resources (due to specific benefits for users) a significant issue is the governing regulation of relations that develop during the interaction of subjects of legal relations on this sphere. Intellectual property law expands the scope of regulation of legal relations via the Internet. In this regard, there is an essential need for a comprehensive study of theoretical and practical aspects of the protection of intellectual property rights on the Internet. During the study, a number of general scientific methods were used: method of observation, method of comparison, method of experiment, method of convergence from abstract to concrete, method of formalization, axiomatic method, method of analysis, and historical method. As a result of the study, the peculiarities of legal regulation of relations arising in the process of using objects of intellectual property rights on the Internet, which are caused by the difficulty in identifying the infringer of intellectual property rights, determining the place of the crime, the speed of spread of intellectual property on the Internet, low level of legal culture of the population. The ways to improve the system of protection of intellectual property rights on the Internet are the following were suggested.
15

E.B. Arzymatova. "PROBLEMS OF COPYRIGHT VIOLATIONS ON INTERNET". Herald of KSUCTA n a N Isanov, n. 4 (16 dicembre 2019): 614–17. http://dx.doi.org/10.35803/1694-5298.2019.4.614-617.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The brief analysis of current situation in the sphere of copyright on the Internet is examined and existing problems of law regulations are defined. Indisputable influence of principles and international copyright law regulations on relationship arising from the usage of copyright law objects on Internet are defined in this article.Solutions of the problems that allows creating a system of protection of copyright holders are given in this article.
16

Spasova, Ekaterina, Olha Kulinich, Svitlana Mazurenko, Andrii Ivanytskyi e Olesia Izbash. "Peculiarities of protection of personal non-property intellectual rights on the internet". Cuestiones Políticas 41, n. 78 (28 agosto 2023): 628–48. http://dx.doi.org/10.46398/cuestpol.4178.43.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Using a documentary analysis method, it examines the legal issues that exist in the field of application and protection of non-proprietary personal intellectual rights on the Internet. The first section examines the legal consequences of the active development of information technologies and their impact on relations in the field of intellectual property. It identifies some issues that arise when placing intellectual property objects on the Internet. The second section of the article provides an overview of approaches to the legal regulation of intellectual property relations under the legislation of Ukraine. The third section highlights the types and features of violations of non-proprietary personal intellectual rights on the Internet, as well as legislative and technical methods of their protection. It is noted that the main types of violations of non-proprietary personal intellectual rights on the Internet are piracy and plagiarism. It is concluded that, among the problems that hinder the adequate protection of intellectual property rights on the Internet, the main ones are the legal uncertainty of many key concepts or their insufficient development and the lack of effective mechanisms for the protection of personal non-property rights.
17

Teleshev, S. "Peculiarities of civil law protection of honor, dignity and business reputation on the internet as objects of the right of an individual to information regarding himself". Uzhhorod National University Herald. Series: Law 1, n. 78 (28 agosto 2023): 239–50. http://dx.doi.org/10.24144/2307-3322.2023.78.1.39.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article defines the concept of information about an individual as an object of civil rights. The author analyzes the state of legislative regulation of the relationship between the concepts of “personal information” and “personal data”. The basic principles of information relations are highlighted. The issues of the right to privacy in the context of technological progress and digitalization are outlined.The author examines and analyzes a whole range of controversial issues which arise for both civil theorists and practicing lawyers and attorneys-at-law (barristers) on the issues of protection of honor, dignity, and business reputation of individuals on the Internet, including the grounds for legal relations around protection of an individual’s honor, dignity, and business reputation. The article provides a general overview of the conceptual framework and theoretical foundations of the legal definition of honor, dignity, and business reputation of an individual. Particular attention is paid to the issue of defining negative and unreliable information, as well as the legal nature of the appearance and dissemination of such information on the Internet. Also, author research the conceptual foundations of the mechanism of protection of individual’s rights to honor, dignity, and business reputation. The author also pays attention to identifying the shortcomings of the legal regulation of the protection of these rights.The article highlights the specifics of practical issues arising for an individual who is trying to protect personal non-property rights to honor, dignity, and business reputation, which are violated because of posting information on the Internet which, in the individual’s opinion, is not unreliable. To this end, author has reviewed and analyzed several different court decisions (cases) of various instances (from local courts up to the Supreme Court and the European Court of Human Rights).The author makes a logical and consistent conclusion that such legal categories as honor, dignity and business reputation belong to the objects of the right of an individual to information regarding himself. The author offers general recommendations on the choice of legal instruments and methods for protecting an individual’s honor, dignity, and business reputation on the Internet.
18

Xu, De Gang, Lei Hua Qin e Jing Li Zhou. "Internet of Things: Security-Based Application Level Lookup Protocol". Applied Mechanics and Materials 411-414 (settembre 2013): 625–28. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.625.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In the emerging Internet of Things (IOT), lookup service or discovery service plays a critical role, however, current lookup services and discovery services of IoT have not been widely adopted due to some drawbacks or bottlenecks, as well as the item-level lookup service is still missing, moreover, enhancing security and privacy protection does not get enough attention. Therefore, based on the object discovery service architecture (ODSA) a distributed serial number level object discovery service architecture using Chord for the IOT, a security-based application level lookup protocol was provided to enhance the overall security and privacy protection for ODSA. Additionally, some analysis and discussion were given to validate and evaluate our solution. The results show that our solution is available.
19

Vasiljević, Ivana, Ratko Obradović, Isidora Đurić, Branislav Popkonstantinović, Igor Budak, Luka Kulić e Zoran Milojević. "Copyright Protection of 3D Digitized Artistic Sculptures by Adding Unique Local Inconspicuous Errors by Sculptors". Applied Sciences 11, n. 16 (14 agosto 2021): 7481. http://dx.doi.org/10.3390/app11167481.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In recent years, digitization of cultural heritage objects, for the purpose of creating virtual museums, is becoming increasingly popular. Moreover, cultural institutions use modern digitization methods to create three-dimensional (3D) models of objects of historical significance to form digital libraries and archives. This research aims to suggest a method for protecting these 3D models from abuse while making them available on the Internet. The proposed method was applied to a sculpture, an object of cultural heritage. It is based on the digitization of the sculpture altered by adding local clay details proposed by the sculptor and on sharing on the Internet a 3D model obtained by digitizing the sculpture with a built-in error. The clay details embedded in the sculpture are asymmetrical and discreet to be unnoticeable to an average observer. The original sculpture was also digitized and its 3D model created. The obtained 3D models were compared and the geometry deviation was measured to determine that the embedded error was invisible to an average observer and that the watermark can be extracted. The proposed method simultaneously protects the digitized image of the artwork while preserving its visual experience. Other methods cannot guarantee this.
20

Kivalov, Serhii. "Human Rights on the Internet under quarantine (on the example of E-Commerce): problematic aspects". Dixi 25, n. 1 (1 dicembre 2022): 1–21. http://dx.doi.org/10.16925/2357-5891.2023.01.07.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
As a result of the introduction of quarantine measures on the territory of Ukraine and abroad, almost all spheres of social life underwent particular changes. This led to certain restrictions on human rights, as a result of which legal science faced the task of finalizing and adapting legal regulation in the field of protection of subjective rights on the Internet to the realities caused by the coronavirus crisis. The purpose of the study is to characte-rize the legal regulation regarding restrictions and protection of consumer rights on the Internet in quarantine conditions. The object of the study is public relations in the spheres of electronic commerce, protection of consumer rights, and human rights on the Internet in general. The subject of the study is social relations that arise during the protection of civil rights on the Internet under quarantine conditions. The research methods were general scientific and special scientific methods such as dialectical, systemic, structural, historical-le-gal, comparative-legal, formal-legal; methods of induction, deduction, analysis, and synthesis. As a result of the research work, a multi-disciplinary review of publications on the subject of study and the conclusions of scholars was carried out; a description of the theoretical and legal framework for regulating the protection of civil rights on the Internet in quarantine conditions is provided; examples of judicial practice are given; issues related to the taxation of activities in the field of Internet trade were analyzed; specific solutions for improving legal regulation are proposed.
21

Lin, Qingxin, Kuai Xu, Yikun Huang, Feng Yu e Xiaoding Wang. "Privacy-Enhanced Data Fusion for Federated Learning Empowered Internet of Things". Mobile Information Systems 2022 (3 ottobre 2022): 1–8. http://dx.doi.org/10.1155/2022/3850246.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
IoT sensors have already penetrated into extremely broad fields such as industrial production, smart home, environmental protection, medical diagnosis, and bioengineering. Although efficient data fusion helps improve the quality of intelligent services provided by the Internet of things, because the perceived data carry the sensitive information of the perceived object, the data fusion process is prone to the risk of privacy leakage. To this end, in this paper, we proposed a privacy-enhanced federated learning data fusion strategy. This strategy adds Gaussian noise at different stages of federated learning to achieve privacy protection in the data fusion process. Experimental results show that this strategy provides better privacy protection while achieving high-precision IoT data fusion.
22

Natalia V., Buzova, e Karelina Marina M. "Some Issues of Judicial Protection of Intellectual Rights with Internet-Technologies". Rossijskoe pravosudie, n. 5 (25 aprile 2022): 50–59. http://dx.doi.org/10.37399/issn2072-909x.2022.5.50-59.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The judicial protection of intellectual property rights contributes to the development of the economy and culture in society. Ensuring citizens’ access to justice is one of the most important tasks of any state. Digital technologies, including information and telecommunications networks, are beginning to be used both in Russia and abroad to improve access to justice. Currently, technologies already allow to carry out some procedural actions in the digital environment. However, the digitization of objects, including intellectual property, and the presentation of evidence through information and telecommunications networks may have a certain impact, for example, on the conclusions of experts or specialists, and ultimately on the results of the consideration of cases. The article analyzes Russian and foreign legal acts providing for the use of digital technologies, including in judicial activity. Some problematic issues and approaches of the Russian courts concerning the consideration of cases related to infringement of intellectual property rights used in the digital environment are also outlined.
23

Wong, Kok-Seng, e Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the respondents might refuse to contribute their personal data or submit inaccurate data. In this paper, we study a self-awareness data collection protocol to raise the confidence of the respondents when submitting their personal data to the data collector. Our self-awareness protocol requires each respondent to help others in preserving his privacy. The communication (respondents and data collector) and collaboration (among respondents) in our solution will be performed automatically.
24

Long, Rong, Xiaohui Fan, Kai Wei, Junxuan Bai e Shanpeng Xiao. "Internet-of-Things object model". Digital Twin 2 (12 aprile 2022): 5. http://dx.doi.org/10.12688/digitaltwin.17562.1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background: With the advancement of communication technology and advanced sensors, there are massive demands for Internet-of-Things (IoT) applications in buildings, communities, factories, parks, etc. Accessing IoT devices provides convenience for scene management and monitoring, ameliorating production and life intelligently. However, due to the lack of a unified model for IoT devices, data is often skipped over IoT platforms and transmitted to applications directly. This leads to the fact that each manufacturer needs to produce its devices and develop its customized software, which hugely increases the development cycle. On the other hand, it is difficult to convey information between different systems, limiting cross- system control. Moreover, digital twin relies on large amounts of heterogeneous data, and it is impracticable to provide enough data without a unified model for device description. Methods: First, we illustrate the motivation, design goals, and design principles for creating the Internet-of-Things Object Model (IoT-OM). Then we propose a unified description to define IoT devices. The proposed concept has been accepted by several companies, and we analyse one platform that adopts the model. To demonstrate the effectiveness of the model, we introduce two projects based on the platform. One project is an intelligent fire protection system, and another project is an intelligent air quality monitoring system. Results: We measured the time taken by five companies when developing IoT devices and their applications, including the development cycle duration without utilizing the proposed model and the duration using the model at China Mobile’s OneNET platform. The results prove that the proposed model can significantly shorten the development cycle. Conclusions: This paper proposes a model for IoT devices, which helps to unify heterogeneous data among different manufacturers and helps to shorten the development cycles for developers.
25

Sun, Lei, Hong Mei Xing e Shu Yan Zhang. "The Present Botnet Protection Situation of the Data Center". Advanced Materials Research 1044-1045 (ottobre 2014): 1411–13. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1411.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Protection object of data center is Botnet according to IRC (Internet Relay Chat) [2] protocol to spread. However, in order to be more covert and stronger, the design architecture and communication methods of Botnet are also constantly upgrading and innovating.
26

Kovalenko, I. "Some types of works posted on the internet, and the peculiarities of their protection by Ukrainian copyright compared to US law". Uzhhorod National University Herald. Series: Law, n. 70 (18 giugno 2022): 181–85. http://dx.doi.org/10.24144/2307-3322.2022.70.26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article deals with the peculiarities of protection against plagiarism of works posted on the Internet and the peculiarities of their protection by Ukrainian copyright compared with US legislation. The ratio of features of the computer program as an object of copyright protection is analyzed. After all, the program derived from the algorithm and is in a sense, its equivalent. This means that some basic features of algorithms are inherent in programs. The program can also be considered as a means of implementing an algorithm, and as such, characterized by certain distinct features from which for the purposes of the program research as an object of copyright protection can be distinguished: unlike the algorithm, which is a sequence of logical-mathematical Transformation operations, the program contains a sequence of commands that describe the process of implementing an algorithm and provide control of this process. The objective form of expression of the program is its recording formalized language of simultaneous computers. It is determined that the protection of computer programs by copyright norms, is a great theoretical and practical curiosity as the simplest and economical. The jurisdictional and non-legal forms of protection of patent law are characterized, the main ways of protecting intellectual property rights are clarified. The emphasis on the judicial prohibition as a way of protecting intellectual property rights is analyzed by the international index of property rights, in particular the level of protection of intellectual property rights in Ukraine and in the United States. The fact of a low indicator of protection of intellectual property rights in our country is established compared to European countries. The main issues of protection of intellectual property rights in Ukraine are highlighted. It is emphasized the need to adapt national legislation to the legal system of the European Union. There are a number of international treaties regulating intellectual property relations at the international level. The European integration course of Ukraine indicates its desire to adapt their legal system to European standards, and therefore, concluding an Association Agreement with the EU, Ukraine has undertaken to harmonize its intellectual property legislation with European legislation. The provisions of a number of European legal acts regulating the issue of protecting intellectual property rights are given. Problems of collecting evidence base for violation of intellectual property rights remains open issues as a national judicial practice on this issue. It is necessary to create a specialized judiciary that would consider cases of violation of intellectual property rights, including on the Internet. It is necessary to enhance legal responsibility for violations in the field of intellectual property, in particular regarding the distribution of pirate products.
27

Ulitina, Olha. "Features of copyright protection of some specific works of contemporary art". Theory and Practice of Intellectual Property, n. 5 (11 giugno 2021): 36–42. http://dx.doi.org/10.33731/52020.233731.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Ulitina O. Features of copyright protection of some specific works of contemporary art. The article is devoted to the legal protection issues of the atypical objects of copyright, which belong to modern arts. The place and role of such objects in the system of copyright objects are defined. Based on the study of doctrinal provisionson such atypical objects, their differences from traditional objects of copyright are determined. In article it is also indicated how the place of such objects in the system of contemporary art influences it.An analysis of the Ukrainian legislation and the foreign countries legislation in this area was made, and it allowed to identify such atypical objects in the system of modern art works and in the system of copyright objects.Contemporary art is interesting and complex phenomenon, which is characterized by the great influence of technology, rapid development and large profits. Today, as never before, we can say that creativity can benefit its creator, and art is becoming more accessible to anyone who wants to create something.New platforms for creativity often appear. Frequently they are free of charge, and help new authors to gain an audience and become popular. This process can be observed in almost all creative fields. That has given the impetus to the rapid development and rise of all manifestations of art.Of course, the Internet influences thisprocess the most. The Internet provides access to great opportunities for creating works and promoting them among content consumers. The Internet quickly makes talented people rich and popular, but it also quickly makes people forget about yesterday's idols.However, such processes are beneficial for the art development and modern culture strengthening. They lead to the new arts emergence and to the development of culture and creativity in general, as well as attract funds to the creative industries.This situation leads to the emergence of new atypical copyright objects, which remain outside the legal regulation, and sometimes are found on the verge of infringement of copyright and related rights.Due to the opportunities created by technological and technical development, creativity becomes more accessible, art becomes the prerogative not only of professional artists, but of ordinary talented people. This leads to the emergence of new interesting types of works, the legal status of which is sometimes quite difficult to determine. So the article is dedicated to the issues of legal regulating of this new atypical copyright objects.Key words: copyright, untypical objects, copyright protection
28

Arora, Yojna, Aarti Chugh e Charu Jain. "An Application Module of IOT for Environment Protection". ECS Transactions 107, n. 1 (24 aprile 2022): 5263–70. http://dx.doi.org/10.1149/10701.5263ecst.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Internet of Things is the connection of physical objects which are embedded with sensors and software for exchanging data with other devices over the internet. It is a collaboration of multiple technologies, such as machine learning, real time analytics, and embedded system. IOT has helped in dealing with various real world problems. One such application area is in the field of environment protection. Due to the enhanced levels of particles and toxic materials in the environment it has become essential to monitor the levels on continuous basis so that required notifications can be generated. The purpose of this paper is to develop an IOT module which can sense the amount of toxic particles in air using the MQ135 sensor which can be later displayed on Thingspeak server. However, when the toxicity in the air crosses the threshold value it will give the notification on twitter. This module can be installed anywhere and when pollution crosses the safe point some external devices can be triggered and send a notification using a WiFi module.
29

Salsabila, Adhek Inarania. "Legal Protection For Victims Of Crime Of Hacking". LIGAHUKUM 1, n. 2 (31 gennaio 2021): 148–57. http://dx.doi.org/10.33005/ligahukum.v1i2.26.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
AbstractCybercrime has become a threat to stability, so the government has difficulty to handle the crime that have been carried out with computer technology, especially the internet and internet networks. The Government issued Law Number 11 of 2008 concerning Information and Electronic Transactions which was later updated with Act Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Electronic Information and Technology, which is expected to be able to anticipate developments and problems, including the impact negative abuse of the Internet with various motivations that can cause victims such as material and non-material losses. The research method that I use is empirical juridical, namely research that examines the applicable legal provisions and what happens in reality in the community. The data source is taken from the results of field observations at the DITRESKRIMSUS SUBDIT V SIBER East Java Regional Police, applicable laws, legal journals, and Indonesian dictionaries and legal dictionaries. This study uses descriptive analytical research methods, the analysis data method is a qualitative approach to primary data and secondary data. Descriptive includes the content and structure of positive law, which is an activity carried out by the author to determine the content or meaning of the rule of law which is used as a reference in solving legal issues that are the object of study. Keywords : legal protection, hacking
30

Yuldashov, Abdumumin. "LEGAL NORMS ON THE PROTECTION OF COPYRIGHT AND RELATED RIGHTS IN THE DIGITAL ENVIRONMENT IN THE LEGISLATION OF UZBEKISTAN AND INTERNATIONAL TREATIES". Jurisprudence 3, n. 2 (29 aprile 2023): 47–54. http://dx.doi.org/10.51788/tsul.jurisprudence.3.2./qfxg5673.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article deals with the problems associated with ensuring the legal protection of objects of copyright since the last quarter of the twentieth century and related rights in information and communication networks and, in turn, issues related to the constant maintenance of a balance between authors (right holders) and users are discussed. It is known that in 1996 the World Intellectual Property Organization adopted 2 important documents - “Internet Treaties” - to ensure the legal protection of copyright and related rights on the Internet. It was the adoption of these documents that had a serious impact on the countries of the world, making the necessary changes to their national copyright laws. At the same time, in the last 20-30 years, the rules for ensuring the copyright protection and related rights in the digital environment have taken place among other international and regional documents related to the field. It should be noted that the national copyright legislation of Uzbekistan also reflects the norms of the legal protection of works on the Internet and telecommunication networks. The article discusses these aspects and the problems of applying existing norms in practice. Theoretical and comparative analyzes were also carried out based on the norms of international conventions (“Bern Convention”, “Rome Convention”) and agreements (“WIPO Internet treaties”, TRIPS Agreement) and doctrinal sources. The article also discusses the analysis of such concepts as “the digital environment”, “digital technologies”, “multimedia”, and “cyber environment” and their essence. As a result of discussions, conclusions are drawn about the need to ensure the protection of copyright and related rights in the digital environment in Uzbekistan, legal mechanisms, issues of the practical application of the norms of “Internet contracts”, and the role of organizations managing property rights on a collective basis.
31

Koos, Stefan. "THE INDIVIDUAL AND THE PROPERTY IN VIRTUAL WORLDS". Veritas et Justitia 8, n. 2 (26 dicembre 2022): 267–86. http://dx.doi.org/10.25123/vej.v8i2.5627.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Virtual reality and augmented reality have the potential to change the economy and society as much as the internet once did. In AR, virtual objects mix with real environments and objects. In virtual reality environments, people will move around using avatars and using virtual objects and individualise their virtual spaces with virtual artworks. However, the integration of humans into virtual and semi-virtual environments also leads to an intensification of problems connected with the relationship of the individual to technology and powerful platforms. The person integrated into virtual worlds will be under far closer observation and influence by platform operators than today's internet user. This must have consequences for the legal protection of personality. In addition, questions arise about the extension of personality rights to the virtual existence of the individual and to the question of the legal protection of objects used by the individual in his or her virtual environment. The article discusses some aspects from the perspective of the German law.
32

Nan, Gong. "Protection of personal data in China: Legislation in the digital age". Vestnik of Saint Petersburg University. Law 14, n. 1 (2023): 159–72. http://dx.doi.org/10.21638/spbu14.2023.110.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In the development of China’s Internet industry and digital economy, great importance is attached to the protection of personal data and seriously protects the legitimate rights and interests of citizens’ personal data. Generally speaking, with the development of technology and industry, China’s personal data protection has gone from “indirect protection” to “direct protection” and then to “comprehensive protection”. In the early years of China’s Internet industry, the indirect protection of personal data was mainly achieved through the protection of the “rights to privacy” of citizens. Since the Internet industry of the People’s Republic of China has entered a stage of rapid development, the state began to directly protect personal data in accordance with the provisions of the Chapter “Network Information Security” established in the “Cyber Security Law” of 2016, establishes several principles for the collection and use of personal data, protection requirements information security. Until November 1, 2021, the “Personal Data Protection Law of the People’s Republic of China” (PPD) was adopted to comprehensively protect personal data, reflecting the ideology of development focused on bringing the people to the center, meeting the new needs and aspirations of the people in the new era, and also proposing the creation international digital legal order “Chinese version”. The PPD further expands the scope of the object of personal data protection, comprehensively establishes the rights of individuals to process data, strengthens the obligations to protect personal data processors, creates strict rules for the protection of sensitive personal data and regulates the processing of personal data by public authorities, as well as improving the means of legal protection of personal data, all of which are important points in the legislation. The law incorporates advanced foreign experience, while emphasizing Chinese wisdom, the spirit of the times, and practicality in accordance with the reality of China.
33

Tan, Hua Shan, e Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption". Advanced Materials Research 756-759 (settembre 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
34

Liu, Huan, e Yanling Wang. "Social Media Use and Privacy Concerns: How do College Students view Internet Privacy and Information Protection". European Journal of Humanities and Social Sciences 3, n. 2 (10 aprile 2023): 93–102. http://dx.doi.org/10.24018/ejsocial.2023.3.2.429.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The study is to prove the intermediary effect of privacy concerns, explore the attitude toward online privacy on social media, and summarize the privacy protection strategies adopted by college students on China's mainland. We used the questionnaire to collect the data from college students. The questionnaire was conducted online and offline, and students at Hebei University were randomly selected as the questionnaire object (n = 304). The results show: (1)Privacy concerns fail to mediate the effect of perceived risks on information protection. (2)Affected by perceived risks, most students are worried about online privacy. (3)The current situation of college students' privacy protection is not optimistic. Finally, the paper summarised some privacy protection strategies for college students.
35

Dudykevych, V., H. Mykytyn, L. Bortnik e T. Stosyk. "SECURITY METHODOLOGY OF CYBER-PHYSICAL SYSTEMS AND THE INTERNET OF THINGS IN INTELLECTUALIZATION OF INFRASTRUCTURE OBJECTS". Computer systems and network 6, n. 1 (giugno 2024): 44–53. http://dx.doi.org/10.23939/csn2024.01.044.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
A multi-level structure of safe intellectualization of society's infrastructure 'objects - cyber-physical systems' in the functional space 'selection - exchange of information - processing - management' is proposed according to the profiles - confidentiality integrity availability for 'smart environmental monitoring' 'smart education' 'smart energy' 'intelligent transport system' and other subject areas. The multi-level structure 'objects - cyber-physical systems' of safe intellectualization is revealed by the paradigm 'multi-level cyber-physical system - multi-level information security' which is the basis for building complex security systems of technologies of physical space communication environment and cyberspace. A hierarchical model of Internet of Things security is built based on a three-layer architecture and the concept of 'object - threat - protection'. The complex security model of the wireless communication environment of cyber-physical systems for segments of the intellectualization of society's infrastructure is analysed. The presented methodology of safe processes of intellectualization allows the implementation of complex security systems of technologies for the functioning of society's infrastructure objects. Key words: intellectualization information security objects cyber-physical system multi-level structure security paradigm Internet of Things hierarchical model complex model.
36

Lisitsa, Valeriy. "Intellectual property statute in Private International Law". Gosudarstvo i pravo, n. 7 (2023): 139. http://dx.doi.org/10.31857/s102694520026811-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article highlights the comparative analysis of the conflict-of-laws regulation of intellectual property rights in international, European and Russian law. It is concluded that lex loci protectionis as the main conflict-of laws rule in this area has an ambiguous interpretation, cannot be recognized as lex fori – the law of the country where the competent court is seated, but should be generally understood as the law of the country where the legal protection of the relevant intellectual property object is provided. In addition, in some cases it seems reasonable to apply lex loci originis, lex loci actus and lex loci delicti, as well as lex voluntatis and lex loci solutionis – to contractual relations. In the case of non-contractual infringement of intellectual property rights granted and protected on the territory of several states, including on the Internet, the key issue is to establish the closest connection of the civil legal relationship with a particular state, taking into account various factors (the place of origin or registration of an intellectual property object, the place of committing infringement, the place of occurrence of negative consequences for the intellectual right holder, the orientation of a website to a specific state, the location of a competent court, etc.). It is also argued to enshrine the provisions on the intellectual property statute in Section VI “Private International Law” of the Civil Code of the Russian Federation, including the following issues of its scope: a) authorship; b) types of protected intellectual property objects; c) requirements for the legal protection of intellectual property objects, including registration issues and other formalities to be executed; d) the types, content and effect of intellectual rights arising in relation to intellectual property objects, including the restrictions provided by law and the duration of legal protection; e) the emergence, exercise and termination of intellectual rights, including permissible ways of disposing of them; f) non-contractual protection of intellectual rights.
37

BAKAI, Yuliia, e Yuliia HUDZENKO. "Copyright in private international law: protection, objects, types". Economics. Finances. Law 10/1, n. - (28 ottobre 2022): 18–21. http://dx.doi.org/10.37634/efp.2022.10(1).4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The paper presents a study of the problem of protection and protection of copyright rights in international private law. It is noted that the issue of protection and protection of copyright in the modern world is very relevant and currently not fully resolved. An analysis of international treaties, to which Ukraine is a party, has been carried out. In particular, the norms of the Berne Convention, the World Geneva Convention on Copyright of 1952, the Treaty of the World Intellectual Property Organization on Copyright (BOIB Treaty), the Agreement on Trade Aspects of Intellectual Property Rights (TRIPS Agreement) were studied. The main attention in this paper is devoted to copyright objects. It was determined that the objects of copyright include international treaties to which Ukraine is a party. It was also analyzed what differences exist in the basic conventions regarding the list of objects of copyright protection. The following criteria for the classification of copyright objects were studied: by scope of protection; by the level of accessibility for the public; by the degree of detail of their legal regulation; according to the term of legal protection. It is indicated that they are protected, unprotected, and limited copyright objects. The requirements that must be fulfilled in order for the work to receive the status of being released to the world have been studied. It has been analyzed which general and special terms of legal protection of copyright objects are established. Problems related to regulation, protection and proof of copyright infringement on the Internet have been identified. It is noted that authors have property and non-property copyrights, as well as that these rights include international treaties. Conclusions and prospects for the development of copyright protection and protection are given.
38

Shi, Mengyi. "ANALYSIS OF THE APPLICATION OF NON-COMPETE FOR INTERNET MARKETERS". Socio Economy and Policy Studies 3, n. 2 (13 giugno 2023): 77–79. http://dx.doi.org/10.26480/seps.02.2023.77.79.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Internet marketer as a new form of employment occupation, rapid growth in the short term. At present, the competitiveness of enterprises and Internet marketers are closely tied, to which enterprises often protect business interests through agreements non-compete. For the new social relationship established by enterprises and Internet marketers, only according to China’s current “Company Law” and “Labor Contract Law” and other legal provisions involving non-competition, in the subject identification, protection object, applicable standards and other content are applicable dilemma. Because the enterprise competition is different, the principle of non-competition should be in line with the development of the market, break through the restriction of obligation subject to the narrow determination of workers, the protection object cannot be limited to trade secrets. However, after all, the non-competition restriction serves to maintain the market order, in order to avoid the conflict of rights to destroy the competition ecology, it is necessary to coordinate the interests of the subject as the premise of the application of the non-competition restriction, to coordinate the results for the purpose of restriction, and to innovate the restriction system in the applicable conditions.
39

Veeraiah, Duggineni, Rajanikanta Mohanty, Shakti Kundu, Dharmesh Dhabliya, Mohit Tiwari, Sajjad Shaukat Jamal e Awal Halifa. "Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques". Computational Intelligence and Neuroscience 2022 (5 settembre 2022): 1–9. http://dx.doi.org/10.1155/2022/4003403.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things, sometimes known as IoT, is a relatively new kind of Internet connectivity that connects physical objects to the Internet in a way that was not possible in the past. The Internet of Things is another name for this concept (IoT). The Internet of Things has a larger attack surface as a result of its hyperconnectivity and heterogeneity, both of which are characteristics of the IoT. In addition, since the Internet of Things devices are deployed in managed and uncontrolled contexts, it is conceivable for malicious actors to build new attacks that target these devices. As a result, the Internet of Things (IoT) requires self-protection security systems that are able to autonomously interpret attacks in IoT traffic and efficiently handle the attack scenario by triggering appropriate reactions at a pace that is faster than what is currently available. In order to fulfill this requirement, fog computing must be utilised. This type of computing has the capability of integrating an intelligent self-protection mechanism into the distributed fog nodes. This allows the IoT application to be protected with the least amount of human intervention while also allowing for faster management of attack scenarios. Implementing a self-protection mechanism at malicious fog nodes is the primary objective of this research work. This mechanism should be able to detect and predict known attacks based on predefined attack patterns, as well as predict novel attacks based on no predefined attack patterns, and then choose the most appropriate response to neutralise the identified attack. In the environment of the IoT, a distributed Gaussian process regression is used at fog nodes to anticipate attack patterns that have not been established in the past. This allows for the prediction of new cyberattacks in the environment. It predicts attacks in an uncertain IoT setting at a speedier rate and with greater precision than prior techniques. It is able to effectively anticipate both low-rate and high-rate assaults in a more timely manner within the dispersed fog nodes, which enables it to mount a more accurate defence. In conclusion, a fog computing-based self-protection system is developed to choose the most appropriate reaction using fuzzy logic for detected or anticipated assaults using the suggested detection and prediction mechanisms. This is accomplished by utilising a self-protection system that is based on the development of a self-protection system that utilises the suggested detection and prediction mechanisms. The findings of the experimental investigation indicate that the proposed system identifies threats, lowers bandwidth usage, and thwarts assaults at a rate that is twenty-five percent faster than the cloud-based system implementation.
40

Sehnálek, David. "Sharenting and Children’s Privacy Protection in International, EU, and Czech Law". Central European Journal of Comparative Law 4, n. 1 (14 giugno 2023): 111–32. http://dx.doi.org/10.47078/2023.1.111-132.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The digitalization of social relations has brought some new and hitherto unknown phenomena. Real life has been extended, into the world of cyberspace. This world is often referred to as the virtual world, but in reality, by its consequences for our lives and the legal sphere, it is no less real than the physical world. A significant part of family life has been affected by this phenomenon. Photos, videos and other information that used to be available only to immediate family members are now shared publicly on the internet through social networks. Young children are particularly affected, with parents publicly sharing information from their private lives. This practice is referred to as sharenting. As a result of sharenting, children in the Internet environment often effectively lose their status as subjects and become mere objects. This object is then handled by the child’s closest relatives – parents, i.e. the people who should naturally look after and defend the child’s best interests. The problem is that parents are not aware of both the legal framework and the possible factual negative consequences that sharenting can have for a child’s life and childhood. The key question that I seek to answer in this article is to what extent the current legal framework can respond to sharenting. The aim is also to assess to what extent is such sharing information about children legal and where the boundaries of permissible or justifiable disclosure of information about a child on the Internet lie. Finally, the question is also how the child affected by sharing can defend him/herself against its negative consequences. Sharenting is addressed by the EU, international and national law. As far as national law is concerned, in my article I focus primarily on Czech civil and family law. Sharenting concerns the protection of privacy as a fundamental human right, but also freedom of expression, which is why the European Convention and the Convention on the Rights of the Child (international dimension), the EU Charter of Fundamental Rights (EU dimension) and the Czech Charter of Fundamental Rights and Freedoms (national constitutional dimension) are explored as well.
41

Jafary, Peyman, Antti Supponen e Sami Repo. "Network Architecture for IEC61850-90-5 Communication: Case Study of Evaluating R-GOOSE over 5G for Communication-Based Protection". Energies 15, n. 11 (25 maggio 2022): 3915. http://dx.doi.org/10.3390/en15113915.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The smart grid includes wide-area applications in which inter-substation communication is required to realize innovative monitoring, protection, and control solutions. Internet-based data exchange, i.e., communication over Internet Protocol (IP), is regarded as the latest trend for inter-substation communication. Interoperability can be achieved via the use of standardized IEC 61850-90-5 messages communicating over IP. Wide-area applications can obtain benefits from IP-multicast technologies and use a one-to-many communication model among substations communicating across a communication network. Cellular Internet is being considered as a potential cost-efficient solution which can be used for the IP-multicast communication. However, it requires knowledge of communicating uncommon IP-multicast traffic over the Internet. Moreover, it presents challenges in terms of cybersecurity and real-time requirements. These challenges must be overcome to realize authentic and correct operation of the wide-area applications. There is thus a need to examine communication security and to evaluate if the communication network characteristics satisfy the application real-time requirement. This paper investigates the secure communication of IEC61850-90-5 multicast messages over the public communication network and proposes two network architectures using the Generic Routing Encapsulation (GRE) tunnel and multipoint GRE (mGRE) within Dynamic Multipoint VPN (DMVPN). Additionally, this paper evaluates the feasibility of cellular (5G and 4G) Internet for the communication of multicast Routable Generic Object Oriented Substation Events (R-GOOSE) messages in wide-area protection applications. For this purpose, we introduce a lab setup to experiment the transmission of R-GOOSE messages within the proposed network architectures. The lab setup contains both software and hardware components. A software application is developed to publish multicast R-GOOSE with a fresh timestamp acquired from time synchronization equipment. These messages are transmitted over the Internet by computer networking devices that support cellular communication. The communication latency of the transmitted messages is measured and analyzed statistically. The statistical analysis results are discussed to evaluate performance of R-GOOSE over cellular Internet for two communication-based protection applications: Logic Selectivity and Loss-of-Main protection schemes.
42

Bindu, Gottumukkala Hima, Chinta Anuradha e Patnala S. R. Chandra Murthy. "A Survey on Multimedia Content Protection Mechanisms". International Journal of Electrical and Computer Engineering (IJECE) 8, n. 6 (1 dicembre 2018): 4204. http://dx.doi.org/10.11591/ijece.v8i6.pp4204-4211.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
43

Abdulghani, Hezam Akram, Niels Alexander Nijdam, Anastasija Collen e Dimitri Konstantas. "A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective". Symmetry 11, n. 6 (10 giugno 2019): 774. http://dx.doi.org/10.3390/sym11060774.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) makes our lives much easier, more valuable, and less stressful due to the development of many applications around us including smart cities, smart cars, and smart grids, offering endless services and solutions. Protecting IoT data of such applications at rest either on the objects or in the cloud is an indispensable requirement for achieving a symmetry in the handling and protection of the IoT, as we do with data created by persons and applications. This is because unauthorised access to such data may lead to harmful consequences such as linkage attacks, loss of privacy, and data manipulation. Such undesired implications may jeopardise the existence of IoT applications if protection measures are not taken, and they stem from two main factors. One is that IoT objects have limited capabilities in terms of memory capacity, battery life, and computational power that hamper the direct implementation of conventional Internet security solutions without some modifications (e.g., traditional symmetric algorithms). Another factor is the absence of widely accepted IoT security and privacy guidelines for IoT data at rest and their appropriate countermeasures, which would help IoT stakeholders (e.g., developers, manufacturers) to develop secure IoT systems and therefore enhance IoT security and privacy by design. Toward this end, we first briefly describe the main IoT security goals and identify IoT stakeholders. Moreover, we briefly discuss the most well-known data protection frameworks (e.g., General Data Protection Regulation (GDPR), Health Insurance Portability (HIPAA)). Second, we highlight potential attacks and threats against data at rest and show their violated security goals (e.g., confidentiality and integrity). Third, we review a list of protection measures by which our proposed guidelines can be accomplished. Fourth, we propose a framework of security and privacy guidelines for IoT data at rest that can be utilised to enhance IoT security and privacy by design and establish a symmetry with the protection of user-created data. Our framework also presents the link between the suggested guidelines, mitigation techniques, and attacks. Moreover, we state those IoT stakeholders (e.g., manufacturers, developers) who will benefit most from these guidelines. Finally, we suggest several open issues requiring further investigation in the future, and we also discuss the limitations of our suggested framework.
44

Al-Hakeem, Mazin S., Wasan A. Al-Hamami e Alaa H. Al-Hamami. "Developing Smart City security through Upgrade Internet of Things Layers security". Journal Port Science Research 6, special (28 gennaio 2024): 39–44. http://dx.doi.org/10.36371/port.2023.special.6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Lot devices like connected sensors, lighting, and meters are used in smart cities to collect and analyze data. The cities utilize this information to enhance their infrastructure, public services, and more. A public/private infrastructure must be established in order to execute operations and supply the technologies necessary to protect and secure citizens in order to maintain a secure smart safe city. This contains the following three essential actions: 1) Shared intelligence, communications, and situational awareness. The Internet of Things (IoT) is essentially a network that connects electronic gadgets to the internet, enabling seamless network communication between them. Security is an important issue in the IoT environment, where the protection of data is an urgent process. Every object will be connected to the internet and these objects communicate between each other. Therefore, a new security and privacy problems will appear. This paper introduces several security concepts on each IoT layer. Additionally, illustrates the security goals, challenges and security methods in each layer. Finally, this paper will develop a secure Smart city through improving the IoT layers security.
45

Xiaolin Guo. "Intelligent Internet of Things and Privacy Protection Technology for IPE Data Analysis". Journal of Electrical Systems 20, n. 7s (4 maggio 2024): 75–83. http://dx.doi.org/10.52783/jes.3250.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In the process of shaping the personality and forming the ideal and belief of innovative talents, education plays a unique role that cannot be replaced by other forms of education. The application of an intelligent Internet of Things has been well developed in college teaching. AI is the reality of technological development in the training of higher talents in the new era, and it is the realistic demand for IPE in the training of higher talents, which requires political and ideological empowerment. Positioning the role of "educational assistant" in AI and then defining it as a "quasi-subjective object", is the basic positioning of the introduction of higher-talent IPE at this stage. 1) Build a model of teacher-student interaction supported by "human-computer cooperation"; 2) Construct intelligent learning and intelligent teaching modes supported by "algorithm databases"; 3) Establish the mechanism principle of "people-oriented" assessment and goal orientation, and further improve the quality of IPE in China's higher education personnel training. This paper aims to explore the use of artificial intelligence technology to build an ideal ideological and political education paradigm in the process of training higher-level talents in Chinese universities.
46

Mudrytska, Kateryna. "SPECIFICITY OF PROOF IN CASES OF INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS ON SITES ON THE INTERNET". ScienceRise, n. 5 (11 novembre 2020): 103–10. http://dx.doi.org/10.21303/2313-8416.2020.001494.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In recent years, the rapid development of both technical progress and activities on the Internet, including the economic one, could not but affect the improvement of existing and the emergence of new mechanisms for violating the rights of intellectual property subjects, gives rise to various disputes between participants in the relevant relations, and such disputes is no exception, since each category of court cases has its own peculiarities of consideration. However, analyzing the judicial practice, a number of procedural problems related to evidence and proving in the field of intellectual property rights protection on Internet sites were identified. – Object of Research: What is the key of proof? – Where? and Who? need to collect evidence? – What is meant by belonging and admissibility of evidence? – What are the ways of securing facts as means of proof on the Internet? Investigated problem: to give a legal assessment not only to the norms of national and international legislation, but also to the practical experience of using the institution of proof in the protection of intellectual property rights raised on sites on the Internet. The main scientific results: the procedural nuances of proving the violation of intellectual property rights on sites on the Internet are highlighted, problematic points are identified, and the proposed optimal ways to overcome them, both in pre-trial and in court. The area of practical use of the research results: fixation, preservation of the evidence itself, their assessment, both in pre-trial and in court. Innovative technological product: an algorithm (technical and legal) securing factual data from the Internet site for submitting them to court. Scope of application of the innovative technological product: the application of the algorithm for securing factual data from the Internet site when protecting intellectual property rights should be carried out in accordance with the rules of the current Economic Procedure Code of Ukraine, namely Chapter 5 "Evidence" of Section 1.
47

Koppula, Sumanth, e Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n. 3 (1 giugno 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
48

Koppula, Sumanth, e Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things". International Journal of Electrical and Computer Engineering (IJECE) 6, n. 3 (1 giugno 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
49

Tzafestas, Spyros. "Ethics and Law in the Internet of Things World". Smart Cities 1, n. 1 (12 ottobre 2018): 98–120. http://dx.doi.org/10.3390/smartcities1010006.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of ethics is to provide codes of ethics and conduct that help people to decide what is wrong, and how to act and behave. Laws provide a minimum set of standards for obtaining good human behavior. Ethics often provides standards that exceed the legal minimum. Therefore, for the best behavior, both law and ethics should be respected. The Internet of Things (IoT) involves a large number of objects and humans that are connected via the Internet ‘anytime’ and ‘anyplace’ to provide homogeneous communication and contextual services. Thus, it creates a new social, economic, political, and ethical landscape that needs new enhanced legal and ethical measures for privacy protection, data security, ownership protection, trust improvement, and the development of proper standards. This survey and opinion article is concerned with the ethics and legislation of the IoT and provides an overview of the following: definition and history of the IoT; general ethical principles and theories that are available for application in the IoT; the role of governments in the IoT; regulations in the European Union (EU) and United States for the IoT’ IoT characteristics that have the potential to create ethical problems; IoT ethical questions and principles; IoT security, privacy, and trust aspects; and the ethical culture of IoT-related companies.
50

Zulham. "A Critical Review of Consumer Protection Online Shopping, False Advertising, and Legal Protection". Journal of Law and Sustainable Development 11, n. 5 (28 agosto 2023): e740. http://dx.doi.org/10.55908/sdgs.v11i5.740.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Objective: The main objective of consumer legal protection is to increase awareness, ability and independence of consumers to protect themselves and create a sense of responsibility for business actors in running their business. Theoretical Framework: The problem and purpose of the study is to identify the possibilities of problem consumer protection online shopping, false advertising, and legal protection. This article explores the evolution of common law and legislation in response to fraudulent, dishonest, or misleading internet advertising, as well as the prevalence of such practices. Method: This research is a legal study that is descriptive qualitative. The data collection technique used in this research is documentation. The approach used in this study is a juridical approach. The data analysis technique used is Miles and Hiberman. The validity technique used in this study is source triangulation. Result and Conclusion: This paper describes the muslim consumer legal protection paradigm in online transactions and assesses Indonesia's regulatory environment. Researchers found in normative legal studies that the e-commerce agreement is separate from the core notion of the agreement provided in the UNCITRAL Model Law on e-Commerce and the UNCITRAL Model Law on e-Signature. Online commerce is similar to regular trade agreements, except it uses electronic media. We discovered that improving human resources—professional competence, academic competence, resilience, methods, and excellent attitudes and values—solves the legal protection against consumers issue. E-commerce contracts must follow fair trade practices and the law. We also note that the present rules and regulations on information and electronic transactions for consumer protection have failed to safeguard consumers because numerous infractions still result in consumer losses. Research Implications: Implementation of these goals necessitates updating the law of consumer legal protection. This implementation is important so that online buying and selling transactions are recognized as legal and accountable electronic transactions. the object of the transaction may not conflict with laws and regulations, decency and public order. Originality/value: It contributed to activation of the rule of law in the form of legal protection for consumers in buying and selling agreements via the internet.

Vai alla bibliografia