Search results: Found 7

Listing 1 - 7 of 7
Sort by
Security and Privacy in Wireless and Mobile Networks

Authors: --- ---
ISBN: 9783038427797 9783038427803 Year: Pages: VIII, 164 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Computer Science
Added to DOAB on : 2018-04-13 14:25:58
License:

Loading...
Export citation

Choose an application

Abstract

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed.To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges.

Keywords

Security --- privacy --- mobile --- wireless --- threat --- attack --- vulnerability --- defense --- intrusion --- anonymity --- IoT

Social Cognition, Motivation, and Interaction How Do People Respond to Threats in Social Interactions?

Authors: ---
Book Series: Frontiers Research Topics ISSN: 16648714 ISBN: 9782889453740 Year: Pages: 227 DOI: 10.3389/978-2-88945-374-0 Language: English
Publisher: Frontiers Media SA
Subject: Science (General) --- Psychology
Added to DOAB on : 2018-11-16 17:17:57
License:

Loading...
Export citation

Choose an application

Abstract

f we want to understand people’s responses to threats in social interactions we can distinguish between three levels of analysis:On a social level of analysis we can describe people’s interpersonal behavior, on a cognitive level we can identify corresponding information processing mechanisms, and on a neural level we can specify neural systems, which underlie these processes.In this Research Topic we want to present research connecting these three levels of analysis and propose their functional interconnection in social interaction.We propose that threats in social interactions activate basic motivational processes, which manifest in neural processes related to behavioral inhibition vs. activation in a social situation. This shapes our attention to new information, and affects our cognitions about social identities, belief systems and worldviews. These changes in social cognition in turn affect people’s behavior in social interactions and lead to corresponding reactions on behalf of the interaction partner. Thus, we assume that people’s reactions to threat in interactions can be described as sequences of broader attentional processes resulting from basic motivational tendencies leading to specific social cognitions and subsequent behavior within social interactions. We can analyze this sequence in order to contribute to a better understanding of social interactions.The three levels of analyses (social, cognitive, neural) shed light on social interactions from different angles:On the social level we can analyze how the behaviors of the interaction partners mutually affect each other and how this is accompanied by specific cognitive, emotional and motivational processes. On the cognitive level we can analyze people’s perception of a social situation leading to attentional and reasoning processes with regard to their interaction partner/s, which may be accompanied by certain emotional and motivational processes and determines the behavior towards the partner/s. Finally, we can focus on the neural mechanisms underlying cognitive, emotional, and motivational processes in social interactions.

Neuroscience perspectives on Security: Technology, Detection, and Decision Making

Authors: --- ---
Book Series: Frontiers Research Topics ISSN: 16648714 ISBN: 9782889196005 Year: Pages: 108 DOI: 10.3389/978-2-88919-600-5 Language: English
Publisher: Frontiers Media SA
Subject: Neurology --- Science (General)
Added to DOAB on : 2016-03-10 08:14:32
License:

Loading...
Export citation

Choose an application

Abstract

In security science, efficient operation depends typically on the interaction between technology, human and machine detection and human and machine decision making. A perfect example of this interplay is ‘gatekeeping’, which is aimed to prevent the passage of people and objects that represent known threats from one end to the other end of an access point. Gatekeeping is most often achieved via visual inspections, mass screening, random sample probing and/or more targeted controls on attempted passages at points of entry. Points of entry may be physical (e.g. national borders) or virtual (e.g. connection log-ons). Who and what are defined as security threats and the resources available to gatekeepers determine the type of checks and technologies that are put in place to ensure appropriate access control. More often than not, the net performance of technology-aided screening and authentication systems ultimately depends on the characteristics of human operators. Assessing cognitive, affective, behavioural, perceptual and brain processes that may affect gatekeepers while undertaking this task is fundamental. On the other hand, assessing the same processes in those individuals who try to breach access to secure systems (e.g. hackers), and try to cheat controls (e.g. smugglers) is equally fundamental and challenging. From a security standpoint it is vital to be able to anticipate, focus on and correctly interpret the signals connected with such attempts to breach access and/or elude controls, in order to be proactive and to enact appropriate responses. Knowing cognitive, behavioral, social and neural constraints that may affect the security enterprise will undoubtedly result in a more effective deployment of existing human and technological resources. Studying how inter-observer variability, human factors and biology may affect the security agenda, and the usability of existing security technologies, is of great economic and policy interest. In addition, brain sciences may suggest the possibility of novel methods of surveillance and intelligence gathering. This is just one example of a typical security issue that may be fruitfully tackled from a neuroscientific and interdisciplinary perspective. The objective of our Research Topic was to document across relevant disciplines some of the most recent developments, ideas, methods and empirical findings that have the potential to expand our knowledge of the human factors involved in the security process. To this end we welcomed empirical contributions using different methodologies such as those applied in human cognitive neuroscience, biometrics and ethology. We also accepted original theoretical contributions, in the form of review articles, perspectives or opinion papers on this topic. The submissions brought together researchers from different backgrounds to discuss topics which have scientific, applicative and social relevance.

Perspectives on theology of religions

Author:
Book Series: HTS Theological Studies/Teologiese Studies ISBN: 9781928396369 Year: Pages: 263 DOI: 10.4102/aosis.2017.hts12 Language: English
Publisher: AOSIS Grant: University of Pretoria
Subject: Religion
Added to DOAB on : 2017-11-30 11:02:29
License:

Loading...
Export citation

Choose an application

Abstract

In the public theology discourse, the concept ‘public square’ has become significant. In today’s multicultural and globalised world it is inevitable that people with different religious affiliations will encounter one another in the public square. ‘Public theology’ cannot but become ‘theology of religions’. Scholars in the field of religion studies are compelled to reflect theologically on the relevance of religiosity in the postmodern secular world. The term ‘theology of religions’ refers to the academic inquiry into the relationship between religions. The collected essays constitute such an inquiry. In the end, it is not so much about the encounter of religions, but rather of people. Religion is no longer regarded as a monolithic body of beliefs and practices. The authors concede that the concept ‘religion’ is too fluid to be delineated precisely. The book’s approach to the relationship between religions, i.e. ‘theology of religions’, reflects how the authors understand the origin and nature of religion (a ‘theology of religion’ in the singular). This book focuses more on ‘theology of religions’ (plural) than on ‘theology of religion’ (singular). The main objective of the book is to present a variety of perspectives on how theology of religions manifested in different contexts. This includes historical (i.e. Luther’s theology of religions and the Roman Catholic position on other religions as taken by Vatican II) as well as cultural and religious perspectives. In the first chapter, the editor gives a brief overview of the development of the discipline of theology of religions. The postmodern era is characterised by an almost non-foundational approach. The second chapter traces the development of the discipline in the Roman Catholic tradition in particular. This contribution is based on the insights of P.J. van der Merwe (1944–2014), who as researcher and Head of the Department of Science of Religion and Missiology at the University of Pretoria, developed a specific theological position on non-Christian religions. A whole generation of theologians was trained in this school of thought. He passed away in 2014 and this publication pays tribute to his life’s work on religions and their relations. The contributions that follow are the culmination of the research of postgraduate students at the University of Pretoria. The third chapter presents a perspective on the Reformation, with a particular focus on Martin Luther. In this year of the quincentenary anniversary of the Reformation the legacy of Reformed belief is highlighted. The fourth chapter describes the relationship between Christianity and Islam from the perspective of a willingness to embrace. The fifth chapter analyses the relation between Christianity, Judaism and Islam from the perspective of intergroup threat theory. A model for theology of religions in a South African context is developed in the sixth and final chapter. This scholarly book pays tribute to the academic contribution of P.J. van der Merwe, mentor of the authors of these multifaceted reflections on theology of religions. The target audience is specialists in the field of religion studies. The distinctive contribution of the book is the innovative perspectives on the relationship between Islam and Christianity in both the Roman Catholic and Protestant contexts.

Biodiversity and Protected Areas

Authors: ---
ISBN: 9783038977322 9783038977339 Year: Pages: 196 DOI: 10.3390/books978-3-03897-733-9 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Science (General) --- Environmental Sciences
Added to DOAB on : 2019-04-25 16:37:17
License:

Loading...
Export citation

Choose an application

Abstract

Biodiversity and Protected Areas assembles twelve topics from around the world, illustrating the complexities and promise of addressing the biodiversity crisis. Authors from Mongolia, Africa, India, Canada, Iraq, and the United States dwell on particular aspects and challenges relevant to those regions. Lessons and approaches from interesting localities, coupled with global analyses give the reader a synthetic view of emerging problems. The opportunities for understanding common issues across different geographies abound, such as comparing local conservation in sub-Saharan Africa with a distribution of very small protected areas in Massachusetts. Several topics will be of immediate interest to policymakers. The book is illustrated with numerous color maps and figures and the authors strove for clear, uncomplicated writing. The editors provide an overview of chapters, placing them in the context of other biodiversity and protected area literature. Students and conservationists attempting to broaden their views of biodiversity and protected areas should find this collection to be interesting.

Interventions to Reduce Bullying and Cyberbullying

Authors: --- ---
ISBN: 9783039213597 9783039213603 Year: Pages: 214 DOI: 10.3390/books978-3-03921-360-3 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Social Sciences --- Sociology
Added to DOAB on : 2019-12-09 11:49:15
License:

Loading...
Export citation

Choose an application

Abstract

This book, a Special Issue of the International Journal of Environmental Research and Public Health, has been curated by three leading international experts on the topic. Following their editorial, there are 14 contributions on the topic of interventions against bullying, including cyberbullying, and similar abusive behaviors such as dating violence. Some contributions also assess positive or protective factors such as well-being, self-efficacy, and school climate. Eight of the contributions directly assess the effects of an intervention, with pre/post test designs and experimental and control groups. The other contributions examine a range of relevant topics, such as teacher attitudes and pupils’ confidence in intervening rather than being passive bystanders. Ten countries are represented among the authors. Most of the articles are about secondary schools (pupils, or teachers), but there are also contributions on early childhood, primary school, and university. This book will be of interest and relevance not only to researchers but also to teachers and educational practitioners concerned with pupil safety and well-being in school, and provides practical ways to reduce bullying and its harmful effects.

Keywords

bullying --- intervention --- pre-service teachers --- special education needs students --- cyberbullying --- cybervictimization --- prevention program --- tabby intervention program --- risk factors --- threat assessment --- ecological system theory --- bullying --- intervention --- willingness to intervene --- verbal bullying --- relational bullying --- aggression --- school --- classroom climate --- classroom cohesion --- self-efficacy --- bullying --- martial arts --- mental health --- resilience --- self-efficacy --- wellbeing --- effectiveness --- moderators --- temperament --- anti-bullying --- subgroup analyses --- dating violence --- bullying --- prevention program --- Dat-e Adolescence --- Asegúrate program --- cyberbullying --- cyber-victim --- cyber-aggressor --- bullying --- cyberbullying --- prevention program --- Prev@cib --- adolescents --- bullying --- cyberbullying --- school climate --- intervention program --- cyberbullying --- intervention --- school --- minors --- families --- teachers --- successful educational action --- Bullying --- intervention --- young children --- South Korea --- hakkyo-pokryuk --- prevention --- cyberbullying --- coping strategies --- teacher based-intervention --- adolescents --- traditional victimization --- cyber victimization --- bullying --- teacher styles --- authoritative leadership --- warmth --- control --- class teacher --- cyberbullying --- peer support --- bystanders --- moral disengagement --- cyberbullying and the law --- mental health --- social environment --- cyberbullying interventions --- educational lifespan --- n/a

Sustainable Built Environment and Urban Growth Management

Author:
ISBN: 9783039281862 9783039281879 Year: Pages: 242 DOI: 10.3390/books978-3-03928-187-9 Language: English
Publisher: MDPI - Multidisciplinary Digital Publishing Institute
Subject: Technology (General) --- General and Civil Engineering
Added to DOAB on : 2020-04-07 23:07:08
License:

Loading...
Export citation

Choose an application

Abstract

Nowadays, the sustainable built environment planning in most cities has come to a turning point as the growth in traffic and population has become a serious concern and put tremendous pressure on both the environment and people in these cities. It is therefore important to find new ways or lifestyles—such as compact city, transit-oriented development (TOD) formulations—that are more flexible, inclusive, and sustainable. Furthermore, for the sustainable built environment and urban growth management, not only should the growth management principles—which include smart growth, sustainable growth, and inclusive growth—be taken into account but innovative/smart planning strategies—such as mixed use design, green transport, and new urbanism—are also utilized in planning sustainable built environments in order to prevent the urban sprawl development that has occurred.

Keywords

construction materials --- green supply chain --- integrated carbon policy --- interactive strategy --- low carbon --- CO2 emissions --- transport --- urban block --- urban design --- ecological well-being changes --- rural-urban land conversion --- transformation factors --- urban residents --- rural residents --- China --- renovation extent --- energy retrofitting --- rent affordability --- tenure --- energy performance certificate --- decision support --- embodied environmental impact --- apartment building --- major building material --- life-cycle assessment --- place attachment --- commercial types --- commercial activities --- social bonding --- physical activities --- resilience quantification --- resilience engineering --- multiple threat assessment --- urban form --- Maximum Likelihood Classification --- Support Vector Machines --- Artificial Neural Networks --- significant transitions --- urban growth --- Nayarit (Mexico) --- behavior --- built environment --- green tourism --- intention --- sustainability --- environmentally responsible interior design --- sustainable interior design --- environmental activation of interior elements --- indoor environment quality --- resource use --- energy use --- interior space utilization --- buildings --- sharing --- digitalization --- social performance --- social performance evaluation --- fuzzy analytical hierarchy process --- empirical study --- driving factors --- farmland price-value distortion --- GIS --- price:value ratio --- quantile regression --- spatial spectrum --- green belt --- urban growth --- land cover --- urban living environment --- climate change --- surface temperature --- air quality --- atmospheric concentration --- conservation --- sustainable use --- urban growth management --- sustainable built environment --- quality of life (QoL) --- smart city &amp --- big data

Listing 1 - 7 of 7
Sort by
Narrow your search