Refine
Year of publication
- 2020 (31) (remove)
Document Type
- Working Paper (8)
- Contribution to a Periodical (6)
- Part of a Book (4)
- Report (4)
- Conference Proceeding (3)
- Book (2)
- Bachelor Thesis (1)
- Doctoral Thesis (1)
- Master's Thesis (1)
- Article (unreviewed) (1)
Conference Type
- Konferenzartikel (2)
- Konferenzband (1)
Keywords
- COVID-19 (3)
- Corona (3)
- Artistic Research (2)
- Bildungsmanagement (2)
- Künstlerische Forschung (2)
- AI (1)
- Artificial Intelligence (1)
- Audiovisual Performance (1)
- Computersicherheit (1)
- Content Marketing Strategie (1)
- DVRIP (1)
- Data privacy (1)
- Datenmanagement (1)
- Economic Impact (1)
- Einsatzmöglichkeiten (1)
- Geldwäschebekämpfung (1)
- Generative Art (1)
- Geothermie (1)
- Hygienekonzept (1)
- Improvisation (1)
- Influencer Relations (1)
- KI (1)
- Konsumverhalten (1)
- Kundendaten (1)
- Künstliche Intelligenz (1)
- Marketing (1)
- Refugee Migration (1)
- Roboter (1)
- Robotics (1)
- Robotik (1)
- Robots (1)
- Schulmanagement (1)
- Schulmarketing (1)
- Simulation-based Interaction (1)
- Social Media (1)
- Social Robots (1)
- Sound Synthesis (1)
- Soziale Roboter (1)
- Trackingverfahren (1)
- Wirtschaftskriminalität (1)
- YouTube (1)
- analysis (1)
- bargeldloser Zahlungsverkehr (1)
- binary (1)
- bloom filters (1)
- dahua (1)
- data malleability (1)
- data processing (1)
- homomorphic encryption (1)
- protocol (1)
- wireless sensor network (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (31) (remove)
Open Access
- Open Access (31) (remove)
Im Rahmen der weiter voranschreitenden Globalisierung des internationalen Waren- und Handelsverkehrs wächst auch der weltweit virtuelle Zahlungsverkehr. Die Entwicklung eines derartigen Waren- und Zahlungsverkehrs wurde durch den Stand der jeweils vorliegenden Möglichkeiten des Zahlungsverkehrs fundiert, oftmals auch gefördert. Dabei hat gleichzeitig das interregional und international tätige Handelsmanagement selbst nützliche Formen eines Zahlungsverkehrs geschaffen und initiiert. Dieses gilt vor allem auch für das 19. Jahrhundert. Der Beitrag1 verfolgt insbesondere das Ziel, die Entwicklung, Organisation und Technik des vor allem von privaten Bankhäusern getragenen interregionalen und internationalen Zahlungsverkehrs im 19. Jahrhundert zu analysieren.
While prospect of tracking mobile devices' users is widely discussed all over European countries to counteract COVID-19 propagation, we propose a Bloom filter based construction providing users' location privacy and preventing mass surveillance.
We apply a solution based on Bloom filters data structure that allows a third party, a government agency, to perform some privacy-preserving set relations on a mobile telco's access logfile.
By computing set relations, the government agency, given the knowledge of two identified persons, has an instrument that provides a (possible) infection chain from the initial to the final infected user no matter at which location on a worldwide scale they are.
The benefit of our approach is that intermediate possible infected users can be identified and subsequently contacted by the agency. With such approach, we state that solely identities of possible infected users will be revealed and location privacy of others will be preserved. To this extent, it meets General Data Protection Regulation (GDPR)requirements in this area.
Strings
(2020)
This article presents the currently ongoing development of an audiovisual performance work with the title Strings. This work provides an improvisation setting for a violinist, two laptop performers, and two generative systems. At the core of Strings lies an approach that establishes a strong correlation among all participants by means of a shared physical principle. The physical principle is that of a vibrating string. The article discusses how this principle is used in both natural and simulated forms as main interaction layer between all performers and as natural or generative principle for creating audio and video.
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
In the work at hand, we state that privacy and malleability of data are two aspects highly desired but not easy to associate. On the one hand, we are trying to shape data to make them usable and editable in an intelligible way, namely without losing their initial information. On the other hand, we are looking for effective privacy on data such that no external or non-authorized party could learn about their content. In such a way, we get overlapping requirements by pursuing different goals; it is trivial to be malleable without being secure, and vice versa. We propose four “real-world” use cases identified as scenarios where these two contradictory features are required and taking place in distinct environments. These considered backgrounds consist of firstly, cloud security auditing, then privacy of mobile network users and industry 4.0 and finally, privacy of COVID-19 tracing app users. After presenting useful background material, we propose to employ multiple approaches to design solutions to solve the use cases. We combine homomorphic encryption with searchable encryption and private information retrieval protocol to build an effective construction for the could auditing use case. As a second step, we develop an algorithm to generate the appropriate parameters to use the somewhat homomorphic encryption scheme by considering correctness, performance and security of the respective application. Finally, we propose an alternative use of Bloom filter data structure by adding an HMAC function to allow an outsourced third party to perform set relations in a private manner. By analyzing the overlapping bits occurring on Bloom filters while testing the inclusiveness or disjointness of the sets, we show how these functions maintain privacy and allow operations directly computed on the data structure. Then, we show how these constructions could be applied to the four selected use cases. Our obtained solutions have been implemented and we provide promising results that validate their efficiency and thus relevancy.
OVVL (the Open Weakness and Vulnerability Modeller) is a tool and methodology to support threat modeling in the early stages of the secure software development lifecycle. We provide an overview of OVVL (https://ovvl.org), its data model and browser-based UI. We equally provide a discussion of initial experiments on how identified threats in the design phase can be aligned with later activities in the software lifecycle (issue management and security testing).
Diese Bachelorarbeit analysiert das Medienkonsumverhalten der deutschen Bevölkerung und die vielfältigen Nutzungen von YouTube. Mit dieser Abhandlung sollte es möglich sein, wichtige Punkte für die Erstellung eines eigenen YouTube-Kanals zu sammeln. Dies gilt sowohl für Ersteller von Inhalten als auch für Unternehmen.
Zu Beginn wird analysiert, welche Funktionen YouTube für Content Creator, Unternehmen und Konsumenten bietet. Des Weiteren werden die verschiedenen Finanzierungsmöglichkeiten aufgezeigt, welche die Videoplattform anbietet.
Die für die Analyse erforderlichen Daten stammen aus verschiedenen Studien zum Verhalten des Medienkonsums. Darüber hinaus werden auf sozialen Plattformen eigene Umfragen durchgeführt, um einen spezifischen Überblick über die Nutzung von YouTube und seinen Alternativen zu erhalten.
Mit dem Ergebnis der Analyse wird ein Prozess entwickelt, der dazu beitragen soll, Fehler beim Erstellen eines YouTube-Kanals zu vermeiden und einen positiven Effekt für den Kanal zu erzielen. Dieser Prozess enthält wichtige Punkte, die beim Ausführen eines Kanals zu beachten sind.
Computer an allen Schulen (1984), Schulen ans Netz (1996), Digitalpakt Schule (2016): Jede neue Rechnergeneration wird für Schule und Unterricht als notwendig reklamiert. Die Argumente wiederholen sich: PCs, Laptops, heute Tablets seien innovativ, motivationsfördernd und ermöglichten „modernen“ Unterricht. Stand der Wissenschaft ist: Weder Nutzen noch Mehrwert von IT in Schulen sind belegt. Die Digitalisierung dient offensichtlich anderen Interessen. Denn ob Kreidetafel oder Whiteboard: Entscheidend für Lernerfolge sind Lehrpersönlichkeiten, ein gut strukturierter Unterricht und der lernförderliche Umgang miteinander, nicht Medientechnik.