Skip to main content

Home/ CSIA 459/ Group items tagged Field

Rss Feed Group items tagged

Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
Leo T Garcia

Near Field Communications Primer - 1 views

  •  
    Here is a primer on Near Field Communications (NFC) which is a set of standards for smartphones that establishes radio communication between similar devices which are in close proximity. It is a subset for RFID (radio-frequency identification) and is being integrated into our daily lives as in most technology. The low-cost NFC tags practical uses are limited only by imagination, the challenge will be is to mitigate the cybersecurity risks it poses.
  •  
    Here is another video presentation on NFC. http://www.youtube.com/watch?v=_RBbuGwC7Eg
  •  
    I have to say this was a very interesting video to watch, and I see now how these things work and what we can do with them. I do like the fact that they have a shorter range than Bluetooth as well as less power consumption. I would still be worried about losing information when say on a crowded train or bus. People could brush up against your phone and you may not realize it. thanks for sharing. Lee
Ken Ripley

Popular Science | New Technology, Science News, The Future Now - 0 views

shared by Ken Ripley on 24 Mar 13 - Cached
  •  
    Popular Science has always been a resource I depend upon to see whats on the horizon in the technology field.  
Michael Austin

Security in Near Field Communication (NFC): Strengths and Weaknesses - 0 views

  •  
    A detailed analysis of the functioning of NFC and the vulnerabilities associated with it.
  •  
    Michael, I like the way the paper talked about the strengths and weaknesses of NCF and how to work with them. Ben
Michael Austin

Strengths and Weaknesses of Near Field Communication (NFC) Technology - 0 views

  •  
    A paper discussing how NFC technology works, what it's vulnerabilities are, and how to counteract them.
cpanagopulos

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
cpanagopulos

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
samuelrios

Homeland Security Drones Designed to Identify Civilians Carrying Guns - 4 views

  •  
    Recently uncovered government documents reveal that the U.S. Department of Homeland Security's (DHS) unmanned Predator B drone fleet has been custom designed to identify civilians carrying guns and track cell phone signals. "I am very concerned that this technology will be used against law-abiding American firearms owners," said founder and executive vice president of the Second Amendment Foundation, Alan Gottlieb.
  • ...2 more comments...
  •  
    Good read. After reading this and another related article (http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/) There's a fine line which must be established before the full use of this technology, however it does raise concerns for the future in terms of privacy. It's primary purpose for homeland security is the survey the borders of the united states. There are certainlly risks involved in its use. Ensuring that this technology is effectively secured from attacks to its onboard weapons and communications systems is equally important to the issues raised in the articles.
  •  
    Good post I've heard chatter about drones being flown over the USA before. I could see the benefits of using drones for recon and counter terrorism, but this opens the door for much larger issues. Where will line be drawn in the sand as far as citizen privacy and avoiding the "big brother" hysteria?
  •  
    The power these drones represent is incredible. I can easily see how the can (and will be) abused. As Jammes pointed out, the Primary purpose of DHS is securing our nations borders, yet I have read of DHS rading peoples homes because of an "improperly" imported car! Not to sound like I am about to put a tinfoil hat on, but I do see the distinct possibility of the banning of firearms in this country as happened in England in 1997. These tools will be in place well before that day.
  •  
    The use of Drones in the field as a tool to fight the fight on the borders is one thing, using them as a tool to fight terrorism is still another, but using them as tool to spy on the people of the United States is another. I think this is one that the United States Supreme Court will be deciding soon.
Ken Ripley

ARE THE ELECTROMAGNETIC FIELDS A DANGER TO THE PUBLIC HEALTH? - 0 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ben Garey

Bloomberg Cybersecurity Conference: Understanding Cyber War - and Fighting Back | Secur... - 0 views

  •  
    Bloomberg is hosting a conference on Cybersecurity. Bloomberg is on the cutting edge of the field and they are doing a great job bringing threats into the public eye.
Michael Austin

A Comprehensive Study of Google Wallet as an NFC Application - 0 views

  •  
    As the title suggests, this is a detailed paper on the implementation and security concerns associated with Google Wallet and NFC.
Michael Austin

Near Field Communication: How will it change airport processing and the passenger exper... - 0 views

  •  
    A brief article on the prospects of NFC with regards to Airport Management.
cpanagopulos

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
cpanagopulos

Near Field Communication (NFC) - 1 views

  •  
    The authors of this publication describe the technology behind NFC, the various applications for NFC, and the devices that are currently, or have the potential to be, NFC enabled.
cpanagopulos

Defining business models for near-field communication payments - 1 views

  •  
    This publication discusses the necessary factors involved in making the mass use of NFC technology a reality.
Lisa Ruggiero

Demonstration of temporal cloaking - 0 views

  •  
    Abstract: Recent research has uncovered a remarkable ability to manipulate and control electromagnetic fields to produce effects such as perfect imaging and spatial cloaking. To achieve spatial cloaking, the index of refraction is manipulated to flow light from a probe around an object in such a way that a "hole" in space is created, and it remains hidden.
Christopher Salinas

Emerging Tech - Self Healing Chips - 2 views

  •  
    Research from CalTech on self healing chips. They were able to destroy chips with laser and watch as the chip recovered to near it's original state. Could have future implication for indestructible equipment in the field (i.e. DoD).
  • ...3 more comments...
  •  
    This is really interesting technology. If they figure out a way to produce this technology at a reasonable cost, this would be huge for operational security. Like anything else, if this becomes possible to mass produce, the cost will inevitable drop over time, enough for the cost-benefit ratio to make sense to implement in a variety of hardware. Nice find!
  •  
    CalTech's self-healing chips are truly an amazing step into the future. The technology alone is unbelievable. Once this technology is fully tested and developed it could be used in many different ways, such as part of the space station, pace makers, insulin pumps, etc. It is a very exciting discovery.
  •  
    The self-healing integrated chips is an ingenious solution! This amazing invention will definitely be applied to other systems when the research work is successfully completed. The real concern for me is if there is an unknown adverse effect that its implementation may bring about.
  •  
    Funsho, Adverse as in the machines rising up?
  •  
    My sentiments exactly!
1 - 17 of 17
Showing 20 items per page