Submit Search
Upload
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
•
1 like
•
395 views
Tech and Law Center
Follow
Report
Share
Report
Share
1 of 8
Download now
Download to read offline
Recommended
The presentation addresses both topics of the legitimacy of predictive crime prevention and data protection. The analysis focuses on the potential influence that the E.U. reform on data protection may have on the future of social suerveillance. http://www.techandlaw.net/
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Tech and Law Center
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Tech and Law Center
Per concludere...
Per concludere...
Armando Martin
Wearable Technologies
Tecnologie Indossabili per l'Automazione
Tecnologie Indossabili per l'Automazione
Armando Martin
Presented on 6.11.2015 during the Tech and Law Center event (ITA) Intercettazioni: tutto quello che non avreste voluto sapere http://www.techandlaw.net/news/intercettazioni-tutto-quello-che-non-avreste-voluto-sapere.html
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution
Tech and Law Center
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
Tech and Law Center
Overview of Microsoft .Net Remoting technology for inter-object communication. .Net remoting is a .Net-based distributed object technology for accessing .Net objects that reside in a different application domain (different process on the same machine or different process on another machine). .Net shares concepts with DCOM (Distributed Component Object Model), but simplifies the communication with regard to transport ports and programmatic model. Microsoft's newer WCF (Windows Communication Foundation) provides a unified communication and programming model thus replacing older technologies like .Net remoting and DCOM in many applications.
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
Peter R. Egli
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
Tech and Law Center
Recommended
The presentation addresses both topics of the legitimacy of predictive crime prevention and data protection. The analysis focuses on the potential influence that the E.U. reform on data protection may have on the future of social suerveillance. http://www.techandlaw.net/
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Tech and Law Center
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Tech and Law Center
Per concludere...
Per concludere...
Armando Martin
Wearable Technologies
Tecnologie Indossabili per l'Automazione
Tecnologie Indossabili per l'Automazione
Armando Martin
Presented on 6.11.2015 during the Tech and Law Center event (ITA) Intercettazioni: tutto quello che non avreste voluto sapere http://www.techandlaw.net/news/intercettazioni-tutto-quello-che-non-avreste-voluto-sapere.html
2015.11.06. Luca Melette_Mobile threats evolution
2015.11.06. Luca Melette_Mobile threats evolution
Tech and Law Center
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
Tech and Law Center
Overview of Microsoft .Net Remoting technology for inter-object communication. .Net remoting is a .Net-based distributed object technology for accessing .Net objects that reside in a different application domain (different process on the same machine or different process on another machine). .Net shares concepts with DCOM (Distributed Component Object Model), but simplifies the communication with regard to transport ports and programmatic model. Microsoft's newer WCF (Windows Communication Foundation) provides a unified communication and programming model thus replacing older technologies like .Net remoting and DCOM in many applications.
Overview of Microsoft .Net Remoting technology
Overview of Microsoft .Net Remoting technology
Peter R. Egli
INTERNET OF (EVERY)THING & SMART AGRICULTURE 10 Settembre 2015 EXPO, Milano The interaction between physical objects and sensors connected to Internet makes it possible to exchange information in a manner which has never previously been possible anywhere in the world and to render smart objects inanimate in order to provide functionality and services which have not yet been fully explored. Internet of (Every)Thing (IoE) entails various levels: from the smart home to the production of goods, among which food, and to the management of natural resources, like water. The IoE can therefore vary from examples of “consumer” oriented interconnected devices to more “enterprise” driven business cases, raising the interest of Governments and public administrations as well. One of the most interesting field for our State’s future is the “smart agriculture”, monitoring micro- climate parameters supporting agriculture to improve products’ quality, to reduce risks coming from unpredictable weather phenomenon, to rationalize resources and to reduce the environmental impact. If on one hand the IoE will make the world a better place to live, on the other hand it will be paramount to prevent and impede possible future abuses and violations. The goal of the meeting is to gather international technical and legal experts to discuss opportunities and risks of IoE world. http://www.technandlaw.net
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
Tech and Law Center
Networking is a term that subsumes various technologies and protocols for transferring data from one place to another by means of a transmission network. While every technology like TCP/IP, Ethernet, SDH, GSM, VSAT etc. has its own zoo of terms and acronyms, there are more fundamental concepts and terms common to the different technologies and protocols. The goal of this document is to explain the gist of the these more common networking terms and concepts. These explanations complement typical glossaries with illustrations.
Data Networking Concepts
Data Networking Concepts
Peter R. Egli
Oggi l’Internet delle cose è un paradigma tecnologico in cui la comunicazione è estesa all’interazione tra uomini, dispositivi e sottosistemi. L’Internet delle cose è un insieme di tecnologie digitali che vanno dai tag RFId alle reti di sensori, dalle superfici touch alla realtà aumentata, dai sistemi logistici integrati alle infrastrutture in chiave di sostenibilità
Internet of Things: mercato, tecnologie, applicazioni e competenze
Internet of Things: mercato, tecnologie, applicazioni e competenze
Armando Martin
Overview of JMS messaging API. JMS (Java Messaging Service) is an API for asynchronous message based communication between Java based applications. JMS implementations (instances that implement the JMS API) are called JMS providers. JMS defines two messaging domains. Point-to-point queues are typically used between one or multiple message senders and a single message receiver. Topics are multi-point queues where messages are distributed to multiple receivers. As such topics resemble a black board. Like many other message oriented middleware technologies, JMS provides advanced functions like persistent message delivery mode or different message acknowledgment modes. Additionally, messages can be sent and received in a transacted mode thus ensuring that either all or no messages are sent and received. JMS integrates into EJB (Enterprise Java Beans) through message driven beans.
JMS - Java Messaging Service
JMS - Java Messaging Service
Peter R. Egli
Digitisation-of-Wealth-Management-Final
Digitisation-of-Wealth-Management-Final
Shannon Aw
Overview of CORBA (Common Object Request Broker Architecture) object technology. CORBA is a distributed object technology (DOT) that extends the remote procedure call semantics to distributed objects. Object interfaces are described in a formal language called IDL (Interface Description Language) that allows generating stubs and skeletons through an IDL compiler.
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
Peter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport). MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications. Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications. Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
Peter R. Egli
Overview of Enterprise Application Integration Technologies. Enterprise Application Integration, or EAI in short, aims at integrating different applications into an IT application landscape. Traditionally, EAI was understood as using the same communication infrastructure by all applications without service-orientation in mind. This meant that the benefits of a shared infrastructure were limited while driving up costs through additional integration platforms. Service Oriented Architectures (SOA) brought a new paradigm by decomposing applications into reusable and shareable services. Service orientation requires careful design of services. A hierarchic scheme of services may help to define a suitable service decomposition. While SOA is technically based on big web service technologies, namely SOAP, WSDL and BPEL, WOA or Web Oriented Architecture stands for the lightweight service paradigm. WOA makes use of REST-based technologies like JSON and HTTP. In many cases, an Enterprise Service Bus (ESB) is used as an infrastructure element to achieve the technical integration of the services. The ESB core functions like message routing, filtering and transformation provide the mediation services required to integrate heterogeneous application landscapes.
Enterprise Application Integration Technologies
Enterprise Application Integration Technologies
Peter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT. Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
Peter R. Egli
This paper is concerned with the study of predictive policing as a tool for surveillance. With regard to the European legal framework, this research studies the influence of the predictive policing model primarily on the principle of presumption of innocence (Article 6.2 ECHR) and on reasonable suspicion. The goal is to identify if predictive policing might be used ‘preventively’ against potential perpetrators of a criminal offence, or more precisely, whether it represents an allowed policing practice given the presumption of innocence as enshrined in Article 6.2 ECHR (European Convention on Human Rights).
One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
Tech and Law Center
Smart intelligence
Smart intelligence
Tech and Law Center
This work is a brief reflection on the ‘ambiguous nature of harms in Cyberspace’. It seeks to evaluate how harm is coded in cyber-regulations paying particular attention to the political momentum around the UK’s Computer Misuse Act (CMA) and the US’s Computer Fraud and Abuse Act (CFAA). Its intention is to inject an element of zemiology into political discourse and advance a codification of cybercrime that can maximize cyber-prosecutorial effectives and enhance the rule of law through transparency and coherence. © by Tech and Law Center – www.techandlaw.net
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Tech and Law Center
Questa indagine ha un duplice obiettivo: da un lato l'attenzione si è concentrata sulla consapevolezza e conoscenza degli studenti universitari per cercare di capire qual è la loro percezione di sicurezza rispetto alla loro conoscenza effettiva, dall'altro si è cercato di delineare il panorama dei possibili rischi sulla base delle loro abitudini, dal modo in cui usano i dispositivi mobili, dal tipo di dati che salvano e dalle funzioni che eseguono
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
Tech and Law Center
The project sets out to study the level of awareness and perception of IT security amongst university students, paying particular attention to the world of mobile devices. The report analyses the answers given by 1012 students from over 15 Italian universities to a multiple-choice questionnaire. The analysis shows that students’ perception of their knowledge is generally wrong and that they are unaware of the risks arising from their behaviour. In view of these risks, a proposal has been made to implement technical and legal measures to reduce future problems deriving from faulty or lax adoption of security measures on their mobile devices.
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
Tech and Law Center
Android Malware: Overview, Status and Dilemmas
Android malware overview, status and dilemmas
Android malware overview, status and dilemmas
Tech and Law Center
www.techandlaw.net
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
Even if the term “digital native” have been debated for years by several esteemed scholars, this article aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental, in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve the future by paying the utmost attention to the new generations. What balance of interests must we achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression in a world of internet which is increasingly regulated by Moore’s Law, rather than by state legislation? The purpose is to analyze the current tension between privacy and other fundamental rights from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethical viewpoint.
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Tech and Law Center
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
Tech and Law Center
www.techandlaw.net
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Tech and Law Center
More Related Content
Viewers also liked
Networking is a term that subsumes various technologies and protocols for transferring data from one place to another by means of a transmission network. While every technology like TCP/IP, Ethernet, SDH, GSM, VSAT etc. has its own zoo of terms and acronyms, there are more fundamental concepts and terms common to the different technologies and protocols. The goal of this document is to explain the gist of the these more common networking terms and concepts. These explanations complement typical glossaries with illustrations.
Data Networking Concepts
Data Networking Concepts
Peter R. Egli
Oggi l’Internet delle cose è un paradigma tecnologico in cui la comunicazione è estesa all’interazione tra uomini, dispositivi e sottosistemi. L’Internet delle cose è un insieme di tecnologie digitali che vanno dai tag RFId alle reti di sensori, dalle superfici touch alla realtà aumentata, dai sistemi logistici integrati alle infrastrutture in chiave di sostenibilità
Internet of Things: mercato, tecnologie, applicazioni e competenze
Internet of Things: mercato, tecnologie, applicazioni e competenze
Armando Martin
Overview of JMS messaging API. JMS (Java Messaging Service) is an API for asynchronous message based communication between Java based applications. JMS implementations (instances that implement the JMS API) are called JMS providers. JMS defines two messaging domains. Point-to-point queues are typically used between one or multiple message senders and a single message receiver. Topics are multi-point queues where messages are distributed to multiple receivers. As such topics resemble a black board. Like many other message oriented middleware technologies, JMS provides advanced functions like persistent message delivery mode or different message acknowledgment modes. Additionally, messages can be sent and received in a transacted mode thus ensuring that either all or no messages are sent and received. JMS integrates into EJB (Enterprise Java Beans) through message driven beans.
JMS - Java Messaging Service
JMS - Java Messaging Service
Peter R. Egli
Digitisation-of-Wealth-Management-Final
Digitisation-of-Wealth-Management-Final
Shannon Aw
Overview of CORBA (Common Object Request Broker Architecture) object technology. CORBA is a distributed object technology (DOT) that extends the remote procedure call semantics to distributed objects. Object interfaces are described in a formal language called IDL (Interface Description Language) that allows generating stubs and skeletons through an IDL compiler.
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
Peter R. Egli
Description of message queueing (MQ) protocol for the transport of telemetry data (MQTT - MQ Telemetry Transport). MQTT is a protocol designed to fit the needs of Internet of Things scenarios. It is lightweight and efficient, but still affords all the features required for reliable messaging between wireless sensor / actor nodes and applications. MQTT decouples producer and consumer of data (sensors, actors and applications) through message brokers with publish / subscribe message queues called topics. MQTT supports different levels of quality of service thus providing the flexibility to adapt to the different needs of applications. Further features like will and retain messages make MQTT well suited for sensor network scenarios as well as for lightweight enterprise messaging applications. Open source implementations like Eclipse paho provide ample code for integrating MQTT in your own applications.
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
Peter R. Egli
Overview of Enterprise Application Integration Technologies. Enterprise Application Integration, or EAI in short, aims at integrating different applications into an IT application landscape. Traditionally, EAI was understood as using the same communication infrastructure by all applications without service-orientation in mind. This meant that the benefits of a shared infrastructure were limited while driving up costs through additional integration platforms. Service Oriented Architectures (SOA) brought a new paradigm by decomposing applications into reusable and shareable services. Service orientation requires careful design of services. A hierarchic scheme of services may help to define a suitable service decomposition. While SOA is technically based on big web service technologies, namely SOAP, WSDL and BPEL, WOA or Web Oriented Architecture stands for the lightweight service paradigm. WOA makes use of REST-based technologies like JSON and HTTP. In many cases, an Enterprise Service Bus (ESB) is used as an infrastructure element to achieve the technical integration of the services. The ESB core functions like message routing, filtering and transformation provide the mediation services required to integrate heterogeneous application landscapes.
Enterprise Application Integration Technologies
Enterprise Application Integration Technologies
Peter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT. Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
Peter R. Egli
Viewers also liked
(8)
Data Networking Concepts
Data Networking Concepts
Internet of Things: mercato, tecnologie, applicazioni e competenze
Internet of Things: mercato, tecnologie, applicazioni e competenze
JMS - Java Messaging Service
JMS - Java Messaging Service
Digitisation-of-Wealth-Management-Final
Digitisation-of-Wealth-Management-Final
Common Object Request Broker Architecture - CORBA
Common Object Request Broker Architecture - CORBA
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
Enterprise Application Integration Technologies
Enterprise Application Integration Technologies
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
LPWAN Technologies for Internet of Things (IoT) and M2M Scenarios
More from Tech and Law Center
This paper is concerned with the study of predictive policing as a tool for surveillance. With regard to the European legal framework, this research studies the influence of the predictive policing model primarily on the principle of presumption of innocence (Article 6.2 ECHR) and on reasonable suspicion. The goal is to identify if predictive policing might be used ‘preventively’ against potential perpetrators of a criminal offence, or more precisely, whether it represents an allowed policing practice given the presumption of innocence as enshrined in Article 6.2 ECHR (European Convention on Human Rights).
One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
Tech and Law Center
Smart intelligence
Smart intelligence
Tech and Law Center
This work is a brief reflection on the ‘ambiguous nature of harms in Cyberspace’. It seeks to evaluate how harm is coded in cyber-regulations paying particular attention to the political momentum around the UK’s Computer Misuse Act (CMA) and the US’s Computer Fraud and Abuse Act (CFAA). Its intention is to inject an element of zemiology into political discourse and advance a codification of cybercrime that can maximize cyber-prosecutorial effectives and enhance the rule of law through transparency and coherence. © by Tech and Law Center – www.techandlaw.net
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Tech and Law Center
Questa indagine ha un duplice obiettivo: da un lato l'attenzione si è concentrata sulla consapevolezza e conoscenza degli studenti universitari per cercare di capire qual è la loro percezione di sicurezza rispetto alla loro conoscenza effettiva, dall'altro si è cercato di delineare il panorama dei possibili rischi sulla base delle loro abitudini, dal modo in cui usano i dispositivi mobili, dal tipo di dati che salvano e dalle funzioni che eseguono
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
Tech and Law Center
The project sets out to study the level of awareness and perception of IT security amongst university students, paying particular attention to the world of mobile devices. The report analyses the answers given by 1012 students from over 15 Italian universities to a multiple-choice questionnaire. The analysis shows that students’ perception of their knowledge is generally wrong and that they are unaware of the risks arising from their behaviour. In view of these risks, a proposal has been made to implement technical and legal measures to reduce future problems deriving from faulty or lax adoption of security measures on their mobile devices.
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
Tech and Law Center
Android Malware: Overview, Status and Dilemmas
Android malware overview, status and dilemmas
Android malware overview, status and dilemmas
Tech and Law Center
www.techandlaw.net
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
Even if the term “digital native” have been debated for years by several esteemed scholars, this article aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental, in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve the future by paying the utmost attention to the new generations. What balance of interests must we achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression in a world of internet which is increasingly regulated by Moore’s Law, rather than by state legislation? The purpose is to analyze the current tension between privacy and other fundamental rights from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethical viewpoint.
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Tech and Law Center
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
Tech and Law Center
www.techandlaw.net
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Tech and Law Center
More from Tech and Law Center
(10)
One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
Smart intelligence
Smart intelligence
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
Android malware overview, status and dilemmas
Android malware overview, status and dilemmas
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
Download now