Listing 1 - 10 of 28 | << page >> |
Sort by
|
Choose an application
In our digital world, integrated circuits are present in nearly every moment of our daily life. Even when using the coffee machine in the morning, or driving our car to work, we interact with integrated circuits. The increasing spread of information technology in virtually all areas of life in the industrialized world offers a broad range of attack vectors. So far, mainly software-based attacks have been considered and investigated, while hardware-based attacks have attracted comparatively little interest. The design and production process of integrated circuits is mostly decentralized due to financial and logistical reasons. Therefore, a high level of trust has to be established between the parties involved in the hardware development lifecycle. During the complex production chain, malicious attackers can insert non-specified functionality by exploiting untrusted processes and backdoors. This work deals with the ways in which such hidden, non-specified functionality can be introduced into hardware systems. After briefly outlining the development and production process of hardware systems, we systematically describe a new type of threat, the hardware Trojan. We provide a historical overview of the development of research activities in this field to show the growing interest of international research in this topic. Current work is considered in more detail. We discuss the components that make up a hardware Trojan as well as the parameters that are relevant for an attack. Furthermore, we describe current approaches for detecting, localizing, and avoiding hardware Trojans to combat them effectively. Moreover, this work develops a comprehensive taxonomy of countermeasures and explains in detail how specific problems are solved. In a final step, we provide an overview of related work and offer an outlook on further research in this field.
Choose an application
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
Choose an application
Sharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified.
Choose an application
This essay discusses practical issues confronted when conducting surveys as well as designing appropriate field trials. First, it looks at the challenge of ensuring transparency while maintaining confidentiality. Second, it explores the role of trust in light of asymmetric information held by the surveyor and by the respondents as well as the latter's expectations as to what their participation will set in motion. The authors present case studies relevant to both of these issues. Finally, they discuss the role of ethical review from the perspective of research conducted through the World Bank.
Choose an application
Many governments have spent much of the past decade trying to extend a helping hand to informal businesses by making it easier and cheaper for them to formalize. Much less effort has been devoted to raising the costs of remaining informal, through increasing enforcement of existing regulations. This paper reports on a field experiment conducted in Belo Horizonte, Brazil, in order to test which government actions work in getting informal firms to register. Firms were randomized to a control group or one of four treatment groups: the first received information about how to formalize; the second received this information and free registration costs along with the use of an accountant for a year; the third group was assigned to receive an enforcement visit from a municipal inspector; while the fourth group was assigned to have a neighboring firm receive an enforcement visit to see if enforcement has spillovers. The analysis finds zero or negative impacts of information and free cost treatments, and a significant but small increase in formalization from inspections. Estimates of the impact of actually receiving an inspection give a 21 to 27 percentage point increase in the likelihood of formalizing. The results show most informal firms will not formalize unless forced to do so, suggesting formality offers little private benefit to them. But the tax revenue benefits to the government of bringing firms of this size into the formal system more than offset the costs of inspections.
E-Business --- Enforcement --- Finance and Financial Sector Development --- Informality --- Information Security & Privacy --- Knowledge for Development --- Microfinance --- Private Sector Development --- Small Enterprises. --- Small Scale Enterprise
Choose an application
This paper examines the specialization and diversity of manufacturing industries within Indian districts. Prior to India's recent economic growth and liberalization, specialization levels in 1989 were substantially higher than similar metrics calculated for the United States. From 1989 to 2010, average specialization levels for Indian districts declined to a level that is now quite comparable to the United States. Diversity levels similarly increased. Specialization and diversity levels in India are becoming more persistent with time. Manufacturing plants display higher productivity in districts that display both properties. From 1989 to 2010, manufacturing employment growth was higher in districts that were more specialized at the start of the period.
Development --- Diversity --- E-Business --- Growth --- Information Security & Privacy --- Labor Policies --- Macroeconomics and Economic Growth --- Manufacturing --- Political Economy --- Poverty Reduction --- Specialization --- Urban --- Water and Industry
Choose an application
Information technology --- System analysis --- Information technology. --- System analysis. --- complicated technical systems --- system analysis --- data processing --- information technologies --- information security --- Network theory --- Systems analysis --- System theory --- Mathematical optimization --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Network analysis --- Network science
Choose an application
This paper studies the relationship between inequality of opportunity and development outcomes in a cross-country setting. Scholars have long debated the impact of inequality on growth, development, and the quality of institutions in a society. The empirical relationships are however confounded by the notion that "inequality" can be seen as a composite of inequality arising from differences in effort and ability, which would tend to encourage competition and productivity, and inequality attributable to unequal opportunities, particularly in terms of access to basic goods and services, which might translate to wasted human potential and lower levels of development. The analysis in this paper applies a measure of educational opportunities that incorporates inequality between "types" or circumstance groups. Theories from economic history are used to instrument for this type of inequality in a large cross-country dataset. The results seem to confirm the hypothesis that this measure of inequality of opportunity is a better fit for structural inequality than the Gini index of income. The results suggest that inequality of endowments at the outset of history led to unequal educational opportunities, which in turn affected development outcomes such as institutional quality, infant mortality, and economic growth. The findings are robust to several checks on the instrumental variable specification.
Economic Theory & Research --- Education --- Equity --- Growth --- Health, Nutrition and Population --- Inequality --- Information and Communication Technologies --- Information Security and Privacy --- Institutions --- Macroeconomics and Economic Growth --- Opportunity --- Population Policies --- Poverty Impact Evaluation --- Poverty Reduction
Choose an application
This paper studies the relationship between inequality of opportunity and development outcomes in a cross-country setting. Scholars have long debated the impact of inequality on growth, development, and the quality of institutions in a society. The empirical relationships are however confounded by the notion that "inequality" can be seen as a composite of inequality arising from differences in effort and ability, which would tend to encourage competition and productivity, and inequality attributable to unequal opportunities, particularly in terms of access to basic goods and services, which might translate to wasted human potential and lower levels of development. The analysis in this paper applies a measure of educational opportunities that incorporates inequality between "types" or circumstance groups. Theories from economic history are used to instrument for this type of inequality in a large cross-country dataset. The results seem to confirm the hypothesis that this measure of inequality of opportunity is a better fit for structural inequality than the Gini index of income. The results suggest that inequality of endowments at the outset of history led to unequal educational opportunities, which in turn affected development outcomes such as institutional quality, infant mortality, and economic growth. The findings are robust to several checks on the instrumental variable specification.
Economic Theory & Research --- Education --- Equity --- Growth --- Health, Nutrition and Population --- Inequality --- Information and Communication Technologies --- Information Security and Privacy --- Institutions --- Macroeconomics and Economic Growth --- Opportunity --- Population Policies --- Poverty Impact Evaluation --- Poverty Reduction
Choose an application
Transparency-sunshine-is often touted as a core element of the governance agenda, and one that is most important in environments with low transparency to begin with. In a provocative paper published in the American Political Science Review, Edmund Malesky, Paul Schuler, and Anh Tran present the results of a creative experiment in which they provided an additional spotlight on the activities of a random sample of delegates to Vietnam's National Assembly. They report that the effect of sunshine was negative, that delegates subject to this treatment curtailed their speech, and that those who spoke most critically were punished through the subsequent election and promotion processes. The present paper argues that Malesky, Schuler, and Tran's results, if interpreted correctly, actually predict a net positive effect of transparency. The differences in interpretation stem primarily from three sources: the interpretation of regression results for models with interaction terms, the interpretation of the variable for Internet penetration, and significant pre-treatment differences between treated and control delegates. For the context in which more than 80 percent of delegates operate, Malesky, Schuler, and Tran's results predict a positive but insignificant effect of transparency. In addition, Internet penetration, itself a measure of access to information, is positively associated with critical speech. The paper draws lessons for the design and interpretation of randomized experiments with interaction effects.
Disease Control & Prevention --- Economic Theory & Research --- Educational Technology and Distance Education --- Information Security & Privacy --- Internet --- Legislature --- Macroeconomics and Economic Growth --- Multiplicative interaction --- Political economy --- Poverty Reduction --- Randomized experiments --- Technology Industry --- Transparency --- Vietnam
Listing 1 - 10 of 28 | << page >> |
Sort by
|