Search results
1 – 10 of 457Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L. and S.V. Akilandeeswari
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Abstract
Purpose
This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
Design/methodology/approach
In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.
Findings
By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.
Originality/value
By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.
Details
Keywords
CHINA: Vodafone backdoors worsen Huawei’s PR problem
Details
DOI: 10.1108/OXAN-ES243570
ISSN: 2633-304X
Keywords
Geographic
Topical
Technology firms warn that building such a ‘backdoor’ would weaken encryption and security for all users and erode privacy.
Details
DOI: 10.1108/OXAN-DB253293
ISSN: 2633-304X
Keywords
Geographic
Topical
The purpose of this paper is to ascertain the major characteristics of contemporary migrant workers in Japan. In order to illustrate their actual situations in relation to the…
Abstract
Purpose
The purpose of this paper is to ascertain the major characteristics of contemporary migrant workers in Japan. In order to illustrate their actual situations in relation to the socio-economic conditions and government policies, data have been gathered from relevant government sources and several surveys conducted by Japanese researchers.
Design/methodology/approach
The paper discusses social background, socio-economic factors and the public response to migrant workers in Japan. The focus is placed upon Japanese policy context and recent trend which demonstrates an increase in foreign workers. The main method is statistical analyses of the government macro data. In addition, some data from the relevant research outcomes are systematised.
Findings
The inflow of migrant workers has consistently augmented, and this has fostered the public debate. Some observers indicate that government deceitfully accepts migrant workers through the “backdoor” and the “side doors”. There has been some criticism, relating to the fact that increasing numbers of foreign employees include many workers with no formal qualifications, such as technical internships and international students who take on part-time jobs.
Originality/value
This article provides some factors for certain migration patterns, featuring contemporary Japan's migration issues. In conclusion, some uniqueness of contemporary migrant workers in Japanese community has been depicted, and the implications of these findings can contribute to prospective research, Japan's policy and practice in this field.
Details
Keywords
Huawei's 5G kit and cybersecurity
Details
DOI: 10.1108/OXAN-DB240970
ISSN: 2633-304X
Keywords
Geographic
Topical
We recently published (July/August) an article on the problems of shop‐lifting which dealt to a large degree with the culpability of the customer. This paper, given by Chris Baker…
Abstract
We recently published (July/August) an article on the problems of shop‐lifting which dealt to a large degree with the culpability of the customer. This paper, given by Chris Baker to a recent meeting of the South Eastern branch of the Institute of Grocery Distribution, highlights the problems of back door security.
FACED WITH A RISING TIDE of price increases made by major suppliers of goods and materials, my company, along with a lot of others, decided in December that it would have to raise…
Abstract
FACED WITH A RISING TIDE of price increases made by major suppliers of goods and materials, my company, along with a lot of others, decided in December that it would have to raise its prices once again on January 1 this year.
Sharon A. Simmons and Jeffrey S. Hornsby
We conjecture that there are five stages to academic entrepreneurship: motivation, governance, selection, competition, and performance. The process of academic entrepreneurship…
Abstract
We conjecture that there are five stages to academic entrepreneurship: motivation, governance, selection, competition, and performance. The process of academic entrepreneurship originates with the motivation of faculty, universities, industry, and government to commercialize knowledge that originates within the university setting. The model conceptualizes that the governance and competitiveness of the commercialized knowledge moderate the mode selection and ultimately the performance of academic entrepreneurship. The conceptual and empirical support for the model are derived from a theory-driven synthesis of articles related to academic entrepreneurship.
Details
Keywords
Eileen M. Decker, Matthew Morin and Eric M. Rosner
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…
Abstract
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.
Details
Keywords
David J. Harper, Darren Ellis and Ian Tucker
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…
Abstract
This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.
Details