Article
Management
Daniel P. Gross
Summary: This paper examines the impacts of compulsory secrecy on firm invention and the wider innovation system. The study finds that compulsory secrecy caused firms to shift their patenting activities, restricted commercialization, and impeded follow-on innovation. However, it was effective at keeping sensitive technology out of public view.
MANAGEMENT SCIENCE
(2023)
Article
Telecommunications
Shilpa Thakur, Ajay Singh, Sudhan Majhi
Summary: This paper proposes a physical layer security analysis method to evaluate the secrecy performance of cognitive radio networks in the presence of correlated and imperfect channel state information. The closed forms of the secrecy outage probability, average secrecy rate, and amount of secrecy loss are provided over the Rayleigh fading environment with the correlation between the legitimate channel and the eavesdropper channel. The results are compared with simulations and existing work, showing that the secrecy performance improves with increasing peak interference power and correlation at medium-to-high SNR, but decreases at low SNR. Asymptotic analysis reveals that the secrecy performance improves with increasing correlation when the SNR of the legitimate channel is much higher than that of the eavesdropper channel, but decreases with decreasing correlation when the SNR of the legitimate channel is approximately equal to the SNR of the eavesdropper channel.
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING
(2023)
Article
Political Science
Christopher Darnton
Summary: This paper presents eight normative and evidentiary criteria for scholars to evaluate the legitimacy of their sources, as well as four recommendations for balancing their trade-offs when using leaked materials. It criticizes the underspecified research designs and opaque references in existing scholarship using leaked materials, and suggests that scholars need deeper reflection on source provenance and more transparency in citation and research strategies.
AMERICAN POLITICAL SCIENCE REVIEW
(2022)
Article
Management
Ziyun Fan, Lars Thoger Christensen
Summary: How the pursuit of transparency and insight produces secrecy and vice versa in popular and political discourse. They are usually depicted as mutually exclusive practices but are closely related, with performative effects and encroachment. The inseparability and performative dynamics between the two, however, remains to be unfolded.
Article
Engineering, Electrical & Electronic
Alireza Nooraiepour, Sina Rezaei Aghdam
Summary: This study focuses on learning finite-length codes for the Gaussian wiretap channel in an end-to-end manner using deep neural networks (DNNs). The goal is to achieve reliable and secure communication in the presence of an adversary, evaluated in terms of mutual information. Numerical results show that learned codes can indeed establish secure transmission in this setting.
PHYSICAL COMMUNICATION
(2021)
Article
Business
Matthew Caulfield
Summary: This article discusses whether private firms should disclose employee pay, arguing that in some cases, morally conscious companies do not need to disclose employee pay information.
JOURNAL OF BUSINESS ETHICS
(2021)
Article
Computer Science, Theory & Methods
Dinh-Thuan Do, Anh-Tu Le, Nhat-Duy Xuan Ha, Nhu-Ngoc Dao
Summary: This paper investigates the security problem of unauthorized access in IoT systems, proposes a RIS-assisted IoT system to enhance system secrecy and communication performance, and discusses key factors that affect the security performance of the system.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Information Systems
Liqiang Han, Yawei Wang, Xuemei Liu, Boyu Li
Summary: This study focuses on the secrecy performance of a free-space optical communication system over Fisher-Snedecor F-distribution turbulence fading channel. It analyzes the average secrecy capacity, secrecy outage probability, and strictly positive secrecy capacity with the influence of pointing error, atmospheric turbulence, and different detection techniques, providing exact closed-form expressions using Meijer's G-function. Monte Carlo simulations are used for validation.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2021)
Article
International Relations
Raymond C. Kuo, Jennifer Spindel
Summary: This article uses a new dataset on the place of origin of conventional weapons to provide a more comprehensive understanding of the effects of arms embargoes. It argues that arms embargoes rarely prevent states from receiving conventional weapons, but instead push them to switch their supplier base. Middlemen play a crucial role in skirting embargoes. Therefore, policymakers need to exercise caution when imposing arms embargoes.
FOREIGN POLICY ANALYSIS
(2022)
Article
Chemistry, Analytical
Masoud Kaveh, Farshad Rostami Ghadi, Riku Jaentti, Zheng Yan
Summary: This paper investigates the impact of side information on the secrecy performance of backscatter communication systems. Analytical expressions are derived and validated through Monte Carlo simulations, showing that considering additional knowledge at the transmitter improves system performance and ensures reliable communication.
Article
Computer Science, Hardware & Architecture
Rakesh Kumar Jha, Puja, Haneet Kour, Manoj Kumar, Shubha Jain
Summary: The article discusses the security issues of Narrow Band Internet of Things systems, particularly the potential risks in the field of defense security. The study found that MEMS-NB-IoT devices may be used for carrying out malicious security attacks, posing a threat to defense security.
Article
Medicine, General & Internal
So-Yeon Kang, Angela Liu, Gerard Anderson, G. Caleb Alexander
Summary: This study examined the use of manufacturer-sponsored coupons by patients during a treatment episode for a chronic condition. It found that coupon use mainly occurred within the first four prescription fills and was associated with market competition rather than patients' out-of-pocket costs.
Article
Mathematics
Aleksejus Mihalkovich, Matas Levinskas, Eligijus Sakalauskas
Summary: In this paper, a counter mode of a Shannon block cipher based on the matrix power function is presented. The security of the scheme is explored by demonstrating its perfect security and resistance to passive attacks through a sequence of security games.
Article
Telecommunications
Saeid Pakravan, Ghosheh Abed Hodtani
Summary: Analyzing wireless communication performances using information-theoretic results is important in practice. This paper obtains achievable secrecy rate and outer bound on secrecy capacity for a discrete alphabet and memoryless wiretap channel with non-causal knowledge at the transmitter. Extending the results to a continuous alphabet wireless wiretap channel, the impact of side information on secrecy coverage region is analyzed, showing that side information increases the coverage region.
WIRELESS PERSONAL COMMUNICATIONS
(2022)
Article
Medicine, General & Internal
Anne M. Neilan, Raphael J. Landovitz, Mylinh H. Le, Beatriz Grinsztejn, Kenneth A. Freedberg, Marybeth McCauley, Nattanicha Wattananimitgul, Myron S. Cohen, Andrea L. Ciaranello, Meredith E. Clement, Krishna P. Reddy, Emily P. Hyle, A. David Paltiel, Rochelle P. Walensky
Summary: The study found that although CAB-LA offers more benefits over F/TDF, effective oral PrEP limits the additional price society should be willing to pay for CAB-LA.
ANNALS OF INTERNAL MEDICINE
(2022)