Search results

1 – 10 of 457
Article
Publication date: 14 July 2022

Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L. and S.V. Akilandeeswari

This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.

Abstract

Purpose

This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.

Design/methodology/approach

In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.

Findings

By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.

Originality/value

By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Executive summary
Publication date: 30 April 2019

CHINA: Vodafone backdoors worsen Huawei’s PR problem

Details

DOI: 10.1108/OXAN-ES243570

ISSN: 2633-304X

Keywords

Geographic
Topical
Expert briefing
Publication date: 16 June 2020

Technology firms warn that building such a ‘backdoor’ would weaken encryption and security for all users and erode privacy.

Article
Publication date: 25 February 2020

Nobuko Hosogaya

The purpose of this paper is to ascertain the major characteristics of contemporary migrant workers in Japan. In order to illustrate their actual situations in relation to the…

Abstract

Purpose

The purpose of this paper is to ascertain the major characteristics of contemporary migrant workers in Japan. In order to illustrate their actual situations in relation to the socio-economic conditions and government policies, data have been gathered from relevant government sources and several surveys conducted by Japanese researchers.

Design/methodology/approach

The paper discusses social background, socio-economic factors and the public response to migrant workers in Japan. The focus is placed upon Japanese policy context and recent trend which demonstrates an increase in foreign workers. The main method is statistical analyses of the government macro data. In addition, some data from the relevant research outcomes are systematised.

Findings

The inflow of migrant workers has consistently augmented, and this has fostered the public debate. Some observers indicate that government deceitfully accepts migrant workers through the “backdoor” and the “side doors”. There has been some criticism, relating to the fact that increasing numbers of foreign employees include many workers with no formal qualifications, such as technical internships and international students who take on part-time jobs.

Originality/value

This article provides some factors for certain migration patterns, featuring contemporary Japan's migration issues. In conclusion, some uniqueness of contemporary migrant workers in Japanese community has been depicted, and the implications of these findings can contribute to prospective research, Japan's policy and practice in this field.

Details

Asian Education and Development Studies, vol. 10 no. 1
Type: Research Article
ISSN: 2046-3162

Keywords

Expert briefing
Publication date: 4 January 2019

Huawei's 5G kit and cybersecurity

Article
Publication date: 1 January 1978

Chris Baker

We recently published (July/August) an article on the problems of shop‐lifting which dealt to a large degree with the culpability of the customer. This paper, given by Chris Baker…

Abstract

We recently published (July/August) an article on the problems of shop‐lifting which dealt to a large degree with the culpability of the customer. This paper, given by Chris Baker to a recent meeting of the South Eastern branch of the Institute of Grocery Distribution, highlights the problems of back door security.

Details

Retail and Distribution Management, vol. 6 no. 1
Type: Research Article
ISSN: 0307-2363

Article
Publication date: 1 March 1971

FACED WITH A RISING TIDE of price increases made by major suppliers of goods and materials, my company, along with a lot of others, decided in December that it would have to raise…

Abstract

FACED WITH A RISING TIDE of price increases made by major suppliers of goods and materials, my company, along with a lot of others, decided in December that it would have to raise its prices once again on January 1 this year.

Details

Industrial Management, vol. 71 no. 3/4
Type: Research Article
ISSN: 0007-6929

Book part
Publication date: 13 August 2014

Sharon A. Simmons and Jeffrey S. Hornsby

We conjecture that there are five stages to academic entrepreneurship: motivation, governance, selection, competition, and performance. The process of academic entrepreneurship…

Abstract

We conjecture that there are five stages to academic entrepreneurship: motivation, governance, selection, competition, and performance. The process of academic entrepreneurship originates with the motivation of faculty, universities, industry, and government to commercialize knowledge that originates within the university setting. The model conceptualizes that the governance and competitiveness of the commercialized knowledge moderate the mode selection and ultimately the performance of academic entrepreneurship. The conceptual and empirical support for the model are derived from a theory-driven synthesis of articles related to academic entrepreneurship.

Details

Academic Entrepreneurship: Creating an Entrepreneurial Ecosystem
Type: Book
ISBN: 978-1-78350-984-3

Keywords

Book part
Publication date: 6 September 2021

Eileen M. Decker, Matthew Morin and Eric M. Rosner

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…

Abstract

Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.

Details

The Role of Law Enforcement in Emergency Management and Homeland Security
Type: Book
ISBN: 978-1-78769-336-4

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

1 – 10 of 457