Aprendizagem Inspiração Criatividade

quinta-feira, 29 de junho de 2017

Leitura do dia: Engineering Privacy

Disponível em:

        Boa leitura,


Engineering Privacy

IEEE Transactions on Software Engineering, Vol. 35, Nr. 1, 2009
16 Pages Posted: 5 Sep 2008 Last revised: 5 Aug 2014

Sarah Spiekermann

Vienna University of Economics and Business

Lorrie Faith Cranor

Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology
Date Written: Jänner/Februar 2009


In this paper we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a two-layer model of user privacy concerns to relate them to system operations (data transfer, storage and processing) and examine their effects on user behavior. In the second part of the paper we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy by policy" and "privacy by architecture." The privacy by policy approach focuses on the implementation of the notice and choice principles of fair information practices (FIPs), while the privacy by architecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. The paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.

Keywords: anonymity, privacy, privacy enhancing technologies, engineering

quarta-feira, 28 de junho de 2017

Mais uma leitura recomendada para hoje:

A network of networks
How will carriers handle the evolution to 5G?

     Em tempo,

Leituras recomendadas:

1) What is Blockchain Technology? A Step-by-Step Guide For Beginners

2) Blockchain and IoT - Projects and Case Studies

      Boa leitura !!!


quinta-feira, 22 de junho de 2017

IDC Press Release de 14 jun 2017


Boa leitura!!!


Worldwide Spending on the Internet of Things Forecast to Reach Nearly $1.4 Trillion in 2021, According to New IDC Spending Guide 

[...] The IoT use cases that are expected to attract the largest investments in 2017 include manufacturing operations ($105 billion), freight monitoring ($50 billion), and production asset management ($45 billion). Smart grid technologies for electricity, gas and water and smart building technologies are also forecast to see significant investments this year ($56 billion and $40 billion, respectively). While these use cases will remain the largest areas of IoT spending in 2021, smart home technologies are forecast to experience strong growth (19.8% CAGR) over the five-year forecast. The use cases that will see the fastest spending growth are airport facilities automation (33.4% CAGR), electric vehicle charging (21.1% CAGR), and in-store contextual marketing (20.2% CAGR).

[...]The industries making the largest IoT investments in 2017 are Manufacturing ($183 billion), Transportation ($85 billion), and Utilities ($66 billion). Cross-Industry IoT investments, which represent use cases common to all industries, such as connected vehicles and smart buildings, will be $86 billion in 2017 and rank among the top segments throughout the five-year forecast. Consumer IoT purchases will be the fourth largest market segment in 2017 at $62 billion, but will grow to become the third largest segment in 2021. Meanwhile, The industries that will see the fastest spending growth are Insurance (20.2% CAGR), Consumer (19.4%), and Cross-Industry (17.6%).

quarta-feira, 21 de junho de 2017

Leitura recomendada:

Cyber Education: A Multi-Level, Multi-Discipline Approach
Edward Sobiesk, Jean Blair, Gregory Conti, Michael Lanham, and Howard Taylor
United States Military Academy West Point, New York 10996 USA


terça-feira, 20 de junho de 2017

Continuing the march: The past, present, and future of the IoT in the militaryThe Internet of Things in defense

Disponível em:  https://dupress.deloitte.com/dup-us-en/focus/internet-of-things/iot-in-military-defense-industry.html#endnote-20


1) Leitura 1

ACID = 4 pilares do futuro da tecnologia

Algorithms. Cloud. Internet of Things. Data

Ler em https://www.geekwire.com/2016/future-machine-learning-5-trends-watch-around-algorithms-cloud-iot-big-data/


2) Leitura 2

Insights into an Evolving Future



segunda-feira, 19 de junho de 2017

1) Ler a notícia abaxo:
   Proliferação de dispositivos online aumenta brechas de segurança cibernética

2) Caracterize e descreva os casos:
    a) Mirai
    b) Wannacry

quarta-feira, 7 de junho de 2017

Leitura recomendada:

Bosch to create radar road “signature” 

maps for high accuracy self-driving