Journal articles on the topic 'Usable security and privacy'

To see the other types of publications on this topic, follow the link: Usable security and privacy.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Usable security and privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Fischer-Hübner, Simone, Luigi Lo Iacono, and Sebastian Möller. "Usable Security und Privacy." Datenschutz und Datensicherheit - DuD 34, no. 11 (November 2010): 773–82. http://dx.doi.org/10.1007/s11623-010-0210-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alt, Florian, and Emanuel von Zezschwitz. "Emerging Trends in Usable Security and Privacy." i-com 18, no. 3 (November 18, 2019): 189–95. http://dx.doi.org/10.1515/icom-2019-0019.

Full text
Abstract:
AbstractNew technologies are constantly becoming part of our everyday life. At the same time, designers and developers still often do not consider the implications of their design choices on security and privacy. For example, new technologies generate sensitive data, enable access to sensitive data, or can be used in malicious ways. This creates a need to fundamentally rethink the way in which we design new technologies. While some of the related opportunities and challenges have been recognized and are being addressed by the community, there is still a need for a more holistic understanding. In this editorial, we will address this by (1) providing a brief historical overview on the research field of ‘Usable Security and Privacy’; (2) deriving a number of current and future trends; and (3) briefly introducing the articles that are part of this special issue and describing how they relate to the current trends and what researchers and practitioners can learn from them.
APA, Harvard, Vancouver, ISO, and other styles
3

Chiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.

Full text
Abstract:
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
APA, Harvard, Vancouver, ISO, and other styles
4

Alemerien, Khalid. "Usable Security and Privacy on Online Social Networks." International Journal of Software Innovation 9, no. 2 (April 2021): 35–68. http://dx.doi.org/10.4018/ijsi.2021040103.

Full text
Abstract:
Hundreds of millions of people use online social networks (OSNs), and this use is growing rapidly. On the one hand, users of OSNs have created accounts, which include their personal information, interests, associations, postings, daily activities, sharing of social media, and so forth. In addition, users want to protect these information and activities. But on the other hand, they want to use the services, which are provided by OSNs in order to stay in touch with others. Therefore, for achieving this desire, users reveal their personal information intentionally or accidentally. Why? Because users of OSNs do not have adequate information that helps them in making security and privacy decisions effectively in addition to inadequate feedback about the implications of user decisions. This means users do not know what to reveal and how. In order to cope with this problem, a systematic literature review of the usable security and privacy on OSNs was performed. This review is an attempt to pursue the contours of research in OSNs. Therefore, this paper discusses the existing research work, highlights the main research challenges and existing solutions, identifies open research issues, and proposes some directions for future research in the usable security and privacy on OSNs.
APA, Harvard, Vancouver, ISO, and other styles
5

Karat, Clare-Marie, Carolyn Brodie, and John Karat. "Usable privacy and security for personal information management." Communications of the ACM 49, no. 1 (January 2006): 56–57. http://dx.doi.org/10.1145/1107458.1107491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shay, Rich. "CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 62–63. http://dx.doi.org/10.1145/2508976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Faraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.

Full text
Abstract:
Social web has changed the concept of leisure time. As a result street neighbors have been replaced by e-neighbors and walls have become e-walls to share ideas and gossips. Despite so many advantages we cannot ignore potential threats to user privacy and security. In order to be extremely usable, such systems should have strict security and privacy policies in place. In this paper the authors focus on “Facebook” to understand privacy and security problems by carrying out a web based survey. Based on the findings from empirical data the authors propose different enhancements for the improvement of user privacy and potential threats to user account security.
APA, Harvard, Vancouver, ISO, and other styles
8

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the design of IoT solutions that are secure and privacy-aware by design. Motivated by the above, this work presents a survey and taxonomy of SP patterns towards the creation of a usable pattern collection. The aim is to enable decomposition of higher-level properties to more specific ones, matching them to relevant patterns, while also creating a comprehensive overview of security- and privacy-related properties and sub-properties that are of interest in IoT/IIoT environments. To this end, the identified patterns are organized using a hierarchical taxonomy that allows their classification based on provided property, context, and generality, while also showing the relationships between them. The two high-level properties, Security and Privacy, are decomposed to a first layer of lower-level sub-properties such as confidentiality and anonymity. The lower layers of the taxonomy, then, include implementation-level enablers. The coverage that these patterns offer in terms of the considered properties, data states (data in transit, at rest, and in process), and platform connectivity cases (within the same IoT platform and across different IoT platforms) is also highlighted. Furthermore, pointers to extensions of the pattern collection to include additional patterns and properties, including Dependability and Interoperability, are given. Finally, to showcase the use of the presented pattern collection, a practical application is detailed, involving the pattern-driven composition of IoT/IIoT orchestrations with SP property guarantees.
APA, Harvard, Vancouver, ISO, and other styles
9

Distler, Verena, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. "A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research." ACM Transactions on Computer-Human Interaction 28, no. 6 (December 31, 2021): 1–50. http://dx.doi.org/10.1145/3469845.

Full text
Abstract:
Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 papers published at five top conferences between 2014 and 2018 that included keywords related to both security/privacy and usability, we systematically selected and analyzed 284 full-length papers that included human subjects studies. Our analysis focused on study methods; risk representation; the use of prototypes, scenarios, and educational intervention; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
10

Das, Sauvik. "Computer scientists in action: Sauvik Das, usable security & privacy." XRDS: Crossroads, The ACM Magazine for Students 25, no. 1 (October 2018): 61–62. http://dx.doi.org/10.1145/3265929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sauer, Graig, Jonathan Holman, Jonathan Lazar, Harry Hochheiser, and Jinjuan Feng. "Accessible privacy and security: a universally usable human-interaction proof tool." Universal Access in the Information Society 9, no. 3 (March 25, 2010): 239–48. http://dx.doi.org/10.1007/s10209-009-0171-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Koskela, Joakim, Kristiina Karvonen, and Theofanis Kilinkaridis. "Usable and Secure P2P VoIP for Mobile Use." International Journal of Mobile Human Computer Interaction 7, no. 1 (January 2015): 25–41. http://dx.doi.org/10.4018/ijmhci.2015010102.

Full text
Abstract:
The use of Voice over IP (VoIP) applications is relatively insecure and can involve a number of security threats and usability issues, potentially leading to loss of privacy. With the adoption of future peer-to-peer (P2P) communication systems the challenges grow even more as we need to rely on untrusted peers to access the service. The authors have developed a P2P VoIP system for mobile devices, which features techniques for improving the security and privacy of users in P2P networks. However, due to the fundamental differences in how the services are provided, the threats are not likely to be immediately understandable to the end users. Presenting these threats in an easy-to-use fashion can be quite challenging. The authors have sought to improve the usability of the emerging application by conducting iterative rounds of user interviews, questionnaires and usability testing with potential end users.
APA, Harvard, Vancouver, ISO, and other styles
13

Wahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.

Full text
Abstract:
The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceive the users by providing security and privacy protections that are weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized them based on the real security features they provide, or on their popularity. From the analysis, we extracted a set of recommendations that developers should follow in order to build usable, secure and privacy-friendly barcode scanning applications. Based on them, we also implemented BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a user experience test on our app and we compared it with DroidLa, the most popular/secure QR code reader app. The results show that our app has nice features, such as ease of use, provides security trust, is effective and efficient.
APA, Harvard, Vancouver, ISO, and other styles
14

Kinder, Petal. "Free, Open, and Re-Usable Access to Legal Information – The Australian Experience." International Journal of Legal Information 45, no. 1 (March 2017): 45–48. http://dx.doi.org/10.1017/jli.2017.12.

Full text
Abstract:
Several years ago, the Australian Information Commissioner decided that, subject to security and privacy and so forth, all of its public-sector information should be, “free, easily discoverable, machine readable and re-useable.”
APA, Harvard, Vancouver, ISO, and other styles
15

Vorakulpipat, Chalee, Sasakorn Pichetjamroen, and Ekkachan Rattanalerdnusorn. "Usable comprehensive-factor authentication for a secure time attendance system." PeerJ Computer Science 7 (August 16, 2021): e678. http://dx.doi.org/10.7717/peerj-cs.678.

Full text
Abstract:
In information security, it is widely accepted that the more authentication factors are used, the higher the security level. However, more factors cannot guarantee usability in real usage because human and other non-technical factors are involved. This paper proposes the use of all possible authentication factors, called comprehensive-factor authentication, which can maintain the required security level and usability in real-world implementation. A case study of an implementation of a secure time attendance system that applies this approach is presented. The contribution of this paper is therefore to provide a security scheme seamlessly integrating all classical authentication factors plus a location factor into one single system in a real environment with a security and usability focus. Usability factors emerging from the study are related to a seamless process including the least number of actions required, the lowest amount of time taken, health safety during the pandemic, and data privacy compliance.
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Rayani, Bodoor Ayeed, Morooj Saleh Al-Ghamdi, and Jawaher Abdulrahman Al-Harbi. "Looking at Authentication Methods under the Demand of Usable Security and Privacy: A Review." OALib 09, no. 10 (2022): 1–12. http://dx.doi.org/10.4236/oalib.1109348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Garfinkel, Simson L. "Privacy and Security Concerns When Social Scientists Work with Administrative and Operational Data." ANNALS of the American Academy of Political and Social Science 675, no. 1 (December 21, 2017): 83–101. http://dx.doi.org/10.1177/0002716217737267.

Full text
Abstract:
Social science research is transitioning from working with “designated data,” collected through experiments and surveys, to working with “organic data,” including administrative data not collected for research purposes, and other data such as those collected from online social networks and large-scale sensor networks. The shift to organic data requires significant innovations in research methodologies. This article reviews the complexities and diversity of organic data and the special efforts that must be undertaken to make those data findable and usable by researchers. In some cases, advanced formal privacy techniques such as differential privacy and secure multiparty computation are needed to work with organic data in a manner that is ethically and logistically permissible, and effort is also required to make studies involving organic data transparent and replicable. These considerations make clear that moving forward, social scientists and information and communications technology (ICT) professionals must work closely to develop appropriate technical controls and ethical frameworks that minimize the risks of research to participants and to society at large.
APA, Harvard, Vancouver, ISO, and other styles
18

Ling, Zhen, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao. "Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing." Wireless Communications and Mobile Computing 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3928261.

Full text
Abstract:
To protect users from numerous password inference attacks, we invent a novel context aware privacy enhancing keyboard (PEK) for Android touch-based devices. Usually PEK would show a QWERTY keyboard when users input text like an email or a message. Nevertheless, whenever users enter a password in the input box on his or her touch-enabled device, a keyboard will be shown to them with the positions of the characters shuffled at random. PEK has been released on the Google Play since 2014. However, the number of installations has not lived up to our expectation. For the purpose of usable security and privacy, we designed a two-stage usability test and performed two rounds of iterative usability testing in 2016 and 2017 summer with continuous improvements of PEK. The observations from the usability testing are educational: (1) convenience plays a critical role when users select an input method; (2) people think those attacks that PEK prevents are remote from them.
APA, Harvard, Vancouver, ISO, and other styles
19

Rocheleau, Jessica N., and Sonia Chiasson. "Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors." ACM Transactions on Computer-Human Interaction 29, no. 1 (February 28, 2022): 1–39. http://dx.doi.org/10.1145/3469859.

Full text
Abstract:
Autistic teenagers are suspected to be more vulnerable to privacy and safety threats on social networking sites (SNS) than the general population. However, there are no studies comparing these users’ privacy and safety concerns and protective strategies online with those reported by non-autistic teenagers. Furthermore, researchers have yet to identify possible explanations for autistic teenagers’ increased risk of online harms. To address these research gaps, we conducted semi-structured interviews with 12 autistic and 16 non-autistic teenagers assessing their privacy- and safety-related attitudes and behaviors on SNS, and factors affecting them. We used videos demonstrating relevant SNS scenarios as prompts to engage participants in conversation. Through our thematic analyses, we found evidence that autistic teenagers may be more averse to taking risks on SNS than non-autistic teenagers. Yet, several personal, social, and SNS design factors may make autistic teenagers more vulnerable to cyberbullying and social exclusion online. We provide recommendations for making SNS safer for autistic teenagers. Our research highlights the need for more inclusive usable privacy and security research with this population.
APA, Harvard, Vancouver, ISO, and other styles
20

Framner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, and John Sören Pettersson. "Making secret sharing based cloud storage usable." Information & Computer Security 27, no. 5 (November 11, 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.

Full text
Abstract:
Purpose The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user’s requirements and other restrictions, is a complex task. In particular, complex trade-offs between different protection goals and legal privacy requirements need to be made. Design/methodology/approach A human-centered design approach with structured interviews and cognitive walkthroughs of user interface mockups with system administrators and other technically skilled users was used. Findings Even technically skilled users have difficulties to adequately select secret sharing parameters and other configuration settings for adequately securing the data to be outsourced. Practical implications Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations. Originality/value The authors present novel human computer interaction (HCI) guidelines for a usable configuration management, which propose to automatically set configuration parameters and to solve trade-offs based on the type of data to be stored in the cloud. Through these automatic settings, not only system administrators but also non-technical users will be able to easily derive suitable configurations.
APA, Harvard, Vancouver, ISO, and other styles
21

Aliyu, Mansur. "Assessing User’s Perception on Security Challenges of Selected E-Commerce Websites in Nigeria." SLU Journal of Science and Technology 4, no. 1&2 (July 20, 2022): 177–87. http://dx.doi.org/10.56471/slujst.v4i.280.

Full text
Abstract:
Online shopping websites in Nigeria were assumed to be associated with security challenges such as intrusion, and abuse of users’ privacy. This study assessed users’ perception on the security challenges of selected e-commerce websites in Nigeria. The study was conducted in the Sokoto metropolis. The survey was based on ten (10) selected e-commerce websites, viz: Jumia, Konga, Olx, Jiji, Deal Dey, Taafoo, Adibba, Yudala, Kaymu, and Wakanow. A total of 200 Structured questionnaire was administered on the participants of the study based on their online shopping experience and their access to the Internet within the Sokoto metropolis. 296 responses were found usable for data analysis at the end of the survey. A descriptive analysis in form of frequency was conducted to achieve the main objective of the study. It was found that Konga, Jiji, Jumia, and OLX are the most visited e-commerce websites in Nigeria. The study discovered that privacy and security challenges are of great concern to these e-commerce websites in Nigeria. They also provide high-quality and very cheap products, provides up-to-date adverts on their websites and very easy pick-up and home delivery services. Based on the findings of this study, the following recommendations were made. Stronger security measures should be taken by e-commerce websites to earn users' trust; the e-commerce sites should engage in user awareness programs to familiarize users with security measures.
APA, Harvard, Vancouver, ISO, and other styles
22

Plenz, Maik, Chaoyu Dong, Florian Grumm, Marc Florian Meyer, Marc Schumann, Malcom McCulloch, Hongjie Jia, and Detlef Schulz. "Framework Integrating Lossy Compression and Perturbation for the Case of Smart Meter Privacy." Electronics 9, no. 3 (March 10, 2020): 465. http://dx.doi.org/10.3390/electronics9030465.

Full text
Abstract:
The encoding of high-resolution energy profile datasets from end-users generated by smart electricity meters while maintaining the fidelity of relevant information seems to be one of the backbones of smart electrical markets. In the end-user sphere of smart grids, specific load curves of households can easily be utilized to aggregate detailed information about customer’s daily activities, which would be attractive for cyber attacks. Based on a dataset measured by a smart meter installed in a German household, this paper integrates two complementary approaches to encrypt load profile datasets. On the one hand, the paper explains an integration of a lossy compression and classification technique, which is usable for individual energy consumption profiles of households. On the other hand, a perturbation approach with the Gaussian distribution is used to enhance the safety of a large amount of privacy profiles. By this complete workflow, involving the compression and perturbation, the developed framework sufficiently cut off the chance of de-noising attacks on private data and implement an additional, easy-to-handle layer of data security.
APA, Harvard, Vancouver, ISO, and other styles
23

R, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (January 15, 2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.

Full text
Abstract:
The popularity of cloud computing technology is increasing tremendously. There is no disagreement about the effectiveness of the data storage and the data transition techniques of clouds. Earlier it used distributed computing just for sharing resources. However, with technology advancement, cloud computing has become more and more powerful as well as more adaptive in various business sectors. However, with the increase in number of users, there is also an increase in the security threats affecting the users’ privacy, personal data, identity and confidentiality. In this paper, we have aimed at categorizing security and privacy threats based on the kind of usage of cloud. We have also presented an algorithm to find the appropriate solution to address the security and privacy related issues as per the usage category. This paper helps in improving security and privacy of cloud technology users without compromising the benefits of data storage.
APA, Harvard, Vancouver, ISO, and other styles
24

Enaizan, Odai, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah, and Asaad Alsakarneh. "Understanding and Predicting the Determinants of Consumers’ Acceptance and Usage of M-commerce Application: Hybrid SEM and Neural Network Approach." Emerging Science Journal 6, no. 6 (December 1, 2022): 1507–24. http://dx.doi.org/10.28991/esj-2022-06-06-018.

Full text
Abstract:
In m-commerce, privacy and security are major concerns. Existing research has examined the privacy and relationship, security, and intention to use. However, the determinants of privacy and security in mobile commerce remain largely unexplored. A study based on UTAUT2 and trust examines the factors that influence mobile commerce privacy and security. By using the approach of hybrid SEM/ANN analysis, it is possible to detect non-linear and non-compensatory relationships. According to linear and compensatory models, the absence of one determinant can be compensated for by another. The decision-making process of consumers is actually quite complex, and non-compensatory or linear models tend to simplify it. The sample is collected by using a mobile commerce application in order to gather 890 datasets on mobile commerce consumers. Findings: (1) Two determinants of M-commerce acceptance and use had an explicit and significant positive effect. Security and individual are two of these factors. (2) Privacy concerns have a severe negative impact on M-commerce acceptance and use. (3) Trust is found to partially mediate the effect on behavioral intentions of Security Factors (SCF), Privacy Factors (PRF), and Individual Factors (INF) on m-commerce in Jordan (INTENTION). According to the integrated model, m-commerce offers 71% privacy, security, and trust. Doi: 10.28991/ESJ-2022-06-06-018 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles
25

Chatterjee, Sheshadri. "Factors Impacting Behavioral Intention of Users to Adopt IoT In India." International Journal of Information Security and Privacy 14, no. 4 (October 2020): 92–112. http://dx.doi.org/10.4018/ijisp.2020100106.

Full text
Abstract:
The purpose of this study is to identify the factors that impact on the behavioral intention of the Indian consumers to use devices embedded with the internet of things (IoT). While identifying the factors, due attention has been given on the security and privacy issues. With the inputs from the studies of available literature and with the help of technology adoption model (TAM) and of innovation diffusion theory (IDT), some hypotheses have been formulated and a conceptual model has been developed. The hypotheses have been tested and the conceptual model has been validated statistically with the help of survey works using 232 usable respondents. The result shows that perceived usefulness, perceived ease of use, compatibility and cost affect the behavioral intention of the consumers to use IoT enabled devices in India.
APA, Harvard, Vancouver, ISO, and other styles
26

Abdelkarim Almajali, Dmaithan. "Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq." Interdisciplinary Journal of Information, Knowledge, and Management 17 (2022): 339–59. http://dx.doi.org/10.28945/4994.

Full text
Abstract:
Aim/Purpose: This study identifies the elements that influence intentions to purchase from the most popular Arabic online classifieds platform, OpenSooq.com. Background: Online purchasing has become popular among consumers in the past two decades, with perceived risk and trust playing key roles in consumers’ intention to purchase online. Methodology: A questionnaire survey was conducted of Internet users from three Jordanian districts to investigate how they used the OpenSooq platform in their e-commerce activities. In total, 202 usable responses were collected, and the data were analyzed with PLS-SEM for hypothesis testing and model validation. Contribution: Though online trading is increasingly popular, the factors that impact the behavior of consumers when purchasing high-value products have not been adequately investigated. Therefore, this study examined the factors affecting perceived risk, and the potential impact of privacy concerns on the perceived risk of online smartphone buyers. The study framework can help explore online behavior in various situations to ascertain similarities and differences and probe other aspects of online buying. Findings: Perceived risk negatively correlates with online purchasing behavior and trust. However, privacy concern and perceived risk, transaction security and trust, and trust and online purchasing behavior exhibited positive correlations. Recommendations for Practitioners: Customers can complete and retain online purchases in a range of settings illuminated in this study’s methods and procedures. Moreover, businesses can manage their IT arrangements to make Internet shopping more convenient and build processes for online shopping that allow for engagement, training, and ease of use, thus improving their customers’ online purchasing behavior. Recommendation for Researchers: Given the insight into the understanding and integration of variables including perceived risk, privacy issues, trust, transaction security, and online purchasing behavior, academics can build on the groundwork of this research paradigm to investigate underdeveloped countries, particularly Jordan, further. Impact on Society: Understanding the characteristics that influence online purchasing behavior can help countries realize the full potential of online shopping, particularly the benefits of safe, fast, and low-cost financial transactions without the need for an intermediary. Future Research: Future research can examine the link between online purchase intent, perceived risk, privacy concerns, trust, and transaction security to see if the findings of this study in Jordan can be applied to a broader context in other countries.
APA, Harvard, Vancouver, ISO, and other styles
27

Saleh, Ashraf, Odai Enaizan, Bilal Eneizan, Lu’ay Al-Mu’ani, Ahmad Al-Radaideh, and Feras Hanandeh. "A Hybrid SEM and Neural Network Approach to Understand and Predict the Determinants of Consumers’ Acceptance and Usage of Mobile-Commerce Application." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 21 (November 15, 2022): 125–52. http://dx.doi.org/10.3991/ijim.v16i21.31815.

Full text
Abstract:
The growth of mobile commerce marketplaces worldwide has been boosted by modern advances in digital technology. However, Privacy and security are still concern in m-commerce application. Since the previous study has researched the link between security and privacy and purpose to use, the factors that influence the formation of privacy and security in m-commerce are mostly unidentified. On the basis of UTAUT2, this study investigates the factors of security and privacy effecting mobile commerce acceptance. A hybrid SEM-ANN method was utilized to identify non-linear and compensatory interactions. Compensatory and Linear models are based on the idea that a deficiency in one component might also be compensated for by other variables. Linear and Non-compensatory models, on the other hand, seem to overcomplicate buyer decision mechanisms. Survey criteria have been conducted to obtain 890 mobile commerce consumer’s datasets utilizing an application on m-commerce. The following are the results. (1) M-commerce acceptability and use were positively influenced by five determinants (Security, performance expectancy, effort expectancy, habit, and price value). (2) Un-authorization, Error, secondary usage, collection, control, and awareness were all shown to directly and significantly negatively impact M-COMMERCE acceptance and use. (3) Three additional variables (social influence, hedonic motivation, and facilitating conditions) did not affect customers' intentions to use m-commerce applications in Jordan. In m-commerce, the integrated model expects a 45% percent increase in security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
28

Amin, Amr, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. "AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach." Information 10, no. 10 (October 22, 2019): 326. http://dx.doi.org/10.3390/info10100326.

Full text
Abstract:
The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution.
APA, Harvard, Vancouver, ISO, and other styles
29

Holzinger, Andreas. "Introduction to MAchine Learning & Knowledge Extraction (MAKE)." Machine Learning and Knowledge Extraction 1, no. 1 (July 3, 2017): 1–20. http://dx.doi.org/10.3390/make1010001.

Full text
Abstract:
The grand goal of Machine Learning is to develop software which can learn from previous experience—similar to how we humans do. Ultimately, to reach a level of usable intelligence, we need (1) to learn from prior data, (2) to extract knowledge, (3) to generalize—i.e., guessing where probability function mass/density concentrates, (4) to fight the curse of dimensionality, and (5) to disentangle underlying explanatory factors of the data—i.e., to make sense of the data in the context of an application domain. To address these challenges and to ensure successful machine learning applications in various domains an integrated machine learning approach is important. This requires a concerted international effort without boundaries, supporting collaborative, cross-domain, interdisciplinary and transdisciplinary work of experts from seven sections, ranging from data pre-processing to data visualization, i.e., to map results found in arbitrarily high dimensional spaces into the lower dimensions to make it accessible, usable and useful to the end user. An integrated machine learning approach needs also to consider issues of privacy, data protection, safety, security, user acceptance and social implications. This paper is the inaugural introduction to the new journal of MAchine Learning & Knowledge Extraction (MAKE). The goal is to provide an incomplete, personally biased, but consistent introduction into the concepts of MAKE and a brief overview of some selected topics to stimulate future research in the international research community.
APA, Harvard, Vancouver, ISO, and other styles
30

Changchit, Chuleeporn, and Kallol Bagchi. "Privacy and Security Concerns with Healthcare Data and Social Media Usage." Journal of Information Privacy and Security 13, no. 2 (April 3, 2017): 49–50. http://dx.doi.org/10.1080/15536548.2017.1322413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Alshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (March 12, 2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.

Full text
Abstract:
Purpose The purpose of this case study is to examine the factors that impact higher education employees’ violations of information security policy by developing a research model based on grounded theories such as deterrence theory, neutralization theory and justice theory. Design/methodology/approach The research model was tested using 195 usable responses. After conducting model validation, the hypotheses were tested using multiple linear regression. Findings The results of the study revealed that procedural justice, distributive justice, severity and celerity of sanction, privacy, responsibility and organizational security culture were significant predictors of violations of information security measures. Only interactional justice was not significant. Research limitations/implications As with any exploratory case study, this research has limitations such as the self-reported information and the method of measuring the violation of information security measures. The method of measuring information security violations has been a challenge for researchers. Of course, the best method is to capture the actual behavior. Another limitation to this case study which might have affected the results is the significant number of faculty members in the respondent pool. The shared governance culture of faculty members on a US university campus might bias the results more than in a company environment. Caution should be applied when generalizing the results of this case study. Practical implications The findings validate past research and should encourage managers to ensure employees are involved with developing and implementing information security measures. Additionally, the information security measures should be applied consistently and in a timely manner. Past research has focused more on the certainty and severity of sanctions and not as much on the celerity or swiftness of applying sanctions. The results of this research indicate there is a need to be timely (swift) in applying sanctions. The importance of information security should be grounded in company culture. Employees should have a strong sense of treating company data as they would want their own data to be treated. Social implications Engaging employees in developing and implementing information security measures will reduce employees’ violations. Additionally, giving employees the assurance that all are given the same treatment when it comes to applying sanctions will reduce the violations. Originality/value Setting and enforcing in a timely manner a solid sanction system will help in preventing information security violations. Moreover, creating a culture that fosters information security will help in positively affecting the employees’ perceptions toward privacy and responsibility, which in turn, impacts information security violations. This case study applies some existing theories in the context of the US higher education environment. The results of this case study contributed to the extension of existing theories by including new factors, on one hand, and confirming previous findings, on the other hand.
APA, Harvard, Vancouver, ISO, and other styles
32

Al Quhtani, Masoud. "Data Mining Usage in Corporate Information Security: Intrusion Detection Applications." Business Systems Research Journal 8, no. 1 (March 28, 2017): 51–59. http://dx.doi.org/10.1515/bsrj-2017-0005.

Full text
Abstract:
AbstractBackground: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.
APA, Harvard, Vancouver, ISO, and other styles
33

Darmiasih, Made, and Putu Yudi Setiawan. "Continuance usage intention and its antecedents on using OVO e-wallet application in Denpasar." International research journal of management, IT and social sciences 8, no. 1 (December 21, 2020): 35–46. http://dx.doi.org/10.21744/irjmis.v8n1.1104.

Full text
Abstract:
This study aims to explain the effect of information quality, perceived privacy protection, perceived security protection on trust, and its effect on continuance intention to use OVO in Denpasar. This research was conducted in Denpasar, using 139 respondents. This study uses Structural Equation Modelling (SEM) analysis techniques with the Partial Least Square approach. This study shows that information quality has a positive and significant effect on trust. Perceived privacy protection has a positive and significant effect on trust and continuance usage intention. Perceived security protection has a positive and significant effect on trust and continuance usage intention. Also, this study also shows that trust has a positive and significant effect on continuance usage intention. Information quality was found that have no significant effect on the continuance usage intention.
APA, Harvard, Vancouver, ISO, and other styles
34

Shafie, Emad. "Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability." Pertanika Journal of Science and Technology 30, no. 3 (April 20, 2022): 1909–26. http://dx.doi.org/10.47836/pjst.30.3.08.

Full text
Abstract:
The Middle Eastern region has witnessed many cyber-attacks in recent years, especially in Saudi Arabia. Saudi Arabian organisations face problems anticipating, detecting, mitigating, or preventing cyber-attacks despite policies and regulations. The reasons for this have not been investigated adequately. This research aims to study the methods used to address cyber security issues in the private sector. A survey of IT managers of private organisations yielded 230 usable responses. The data were analysed for descriptive statistics and frequency estimations of responses, and the results are presented in this paper. Poor awareness of cyber security issues is reflected in the survey responses. The expenditure on cyber security, especially by large firms, was inadequate. There was a greater tendency to outsource many aspects of cyber security without concern about the risks. A very small percentage of IT managers considered the certainty of a cyber threat within the next year. It is important from the point of proactive strategies to prevent attacks. The findings highlight a lack of required knowledge and skills in performing their expected roles well. Additionally, many weaknesses have been detected in cyber security management in Saudi private organisations, and there is room to improve the quality of computer security systems. The published literature largely supported this. The findings from this study have implications for the stakeholders, especially IT managers working in the private sector of Saudi Arabia. The learnings from this study may be used to address the vulnerabilities identified. The findings clearly show the need to train IT managers of Saudi private organisations.
APA, Harvard, Vancouver, ISO, and other styles
35

Al-Abdullah, Muhammad, Izzat Alsmadi, Ruwaida AlAbdullah, and Bernie Farkas. "Designing privacy-friendly data repositories: a framework for a blockchain that follows the GDPR." Digital Policy, Regulation and Governance 22, no. 5/6 (November 26, 2020): 389–411. http://dx.doi.org/10.1108/dprg-04-2020-0050.

Full text
Abstract:
Purpose The paper posits that a solution for businesses to use privacy-friendly data repositories for its customers’ data is to change from the traditional centralized repository to a trusted, decentralized data repository. Blockchain is a technology that provides such a data repository. However, the European Union’s General Data Protection Regulation (GDPR) assumed a centralized data repository, and it is commonly argued that blockchain technology is not usable. This paper aims to posit a framework for adopting a blockchain that follows the GDPR. Design/methodology/approach The paper uses the Levy and Ellis’ narrative review of literature methodology, which is based on constructivist theory posited by Lincoln and Guba. Using five information systems and computer science databases, the researchers searched for studies using the keywords GDPR and blockchain, using a forward and backward search technique. The search identified a corpus of 416 candidate studies, from which the researchers applied pre-established criteria to select 39 studies. The researchers mined this corpus for concepts, which they clustered into themes. Using the accepted computer science practice of privacy by design, the researchers combined the clustered themes into the paper’s posited framework. Findings The paper posits a framework that provides architectural tactics for designing a blockchain that follows GDPR to enhance privacy. The framework explicitly addresses the challenges of GDPR compliance using the unimagined decentralized storage of personal data. The framework addresses the blockchain–GDPR tension by establishing trust between a business and its customers vis-à-vis storing customers’ data. The trust is established through blockchain’s capability of providing the customer with private keys and control over their data, e.g. processing and access. Research limitations/implications The paper provides a framework that demonstrates that blockchain technology can be designed for use in GDPR compliant solutions. In using the framework, a blockchain-based solution provides the ability to audit and monitor privacy measures, demonstrates a legal justification for processing activities, incorporates a data privacy policy, provides a map for data processing and ensures security and privacy awareness among all actors. The research is limited to a focus on blockchain–GDPR compliance; however, future research is needed to investigate the use of the framework in specific domains. Practical implications The paper posits a framework that identifies the strategies and tactics necessary for GDPR compliance. Practitioners need to compliment the framework with rigorous privacy risk management, i.e. conducting a privacy risk analysis, identifying strategies and tactics to address such risks and preparing a privacy impact assessment that enhances accountability and transparency of a blockchain. Originality/value With the increasingly strategic use of data by businesses and the contravening growth of data privacy regulation, alternative technologies could provide businesses with a means to nurture trust with its customers regarding collected data. However, it is commonly assumed that the decentralized approach of blockchain technology cannot be applied to this business need. This paper posits a framework that enables a blockchain to be designed that follows the GDPR; thereby, providing an alternative for businesses to collect customers’ data while ensuring the customers’ trust.
APA, Harvard, Vancouver, ISO, and other styles
36

Sattar, Mian Usman, Amna Mubashar, Rimsha Fareed, and Muhammad Rizwan. "Architectures, Security Issues, and Usage Scenarios of EC." UMT Artificial Intelligence Review 1, no. 1 (June 30, 2021): 1. http://dx.doi.org/10.32350/umtair.11.04.

Full text
Abstract:
Demand for the digital media is increasing exponentially due to the data generated with regards to IoT devices, thus for these growing needs certain advancements have been made in various technologies like cloud computing which has transitioned to fog and edge computing. The differences between each technology relate to many factors like security, privacy, Big data issues, bandwidth, and radio access networking. Thus, we have discussed the problems faced by older versions of cloud computing and how Mobile Edge Computing (MEC) helps to overcome most of these problems. MEC is explored where it offers real-time information thus providing benefits to the end-users. The growth of MEC is such that, as discussed further, it is used in normal habitual routines like real-time grocery shopping. This paper explores the various architectures, use cases and security aspects of edge computing.
APA, Harvard, Vancouver, ISO, and other styles
37

Lejap, Hedwig H. T., Maria Augustin Lopes Amaral Amaral, Selfiana Goetha, Engelbertus G. Ch Watu, and Apryanus Fallo. "DETERMINANT FACTORS OF MOBILE BANKING USAGE: CASE STUDY IN KUPANG, EAST NUSA TENGGARA." Jurnal REP (Riset Ekonomi Pembangunan) 6, no. 2 (October 1, 2021): 232–50. http://dx.doi.org/10.31002/rep.v6i2.5457.

Full text
Abstract:
A review of previous research on m-banking in developing countries reveals that research on the drivers of trust in mobile banking is somewhat limited. Therefore, this study attempts to investigate the factors that influence the user's perception of confidence in mobile banking services. This model was tested empirically using an online survey from a convenience sampling of 95 respondents and analyzed using SEM PLS. This study estimates that six variables (perceived credibility, perceived benefits, security risks, privacy risks, social influence, and perceived behavioral control) directly impact perceived trust in mobile banking. The results, in particular, perceived benefits positively affect perceived trust in mobile banking, followed by social influence, security risk, and privacy risk has power on perceived trust in mobile banking. On the other hand, perceived credibility and PBC show no significant effect on the belief of mobile banking users.
APA, Harvard, Vancouver, ISO, and other styles
38

Kapp, Alexandra. "Collection, usage and privacy of mobility data in the enterprise and public administrations." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 440–56. http://dx.doi.org/10.56553/popets-2022-0117.

Full text
Abstract:
Human mobility data is a crucial resource for urban mobility management, but it does not come without personal reference. The implementation of security measures such as anonymization is thus needed to protect individuals’ privacy. Often, a trade-off arises as such techniques potentially decrease the utility of the data and limit its use. While much research on anonymization techniques exists, there is little information on the actual implementations by practitioners, especially outside the big tech context. Within our study, we conducted expert interviews to gain insights into practices in the field. We categorize purposes, data sources, analysis, and modeling tasks to provide a profound understanding of the context such data is used in. We survey privacy-enhancing methods in use, which generally do not comply with state-of-the-art standards of differential privacy. We provide groundwork for further research on practice-oriented research by identifying privacy needs of practitioners and extracting relevant mobility characteristics for future standardized evaluations of privacy-enhancing methods.
APA, Harvard, Vancouver, ISO, and other styles
39

Martucci, William C., and Brent N. Coverdale. "New protections in employee privacy rights regarding usage and disclosure of social security numbers." Employment Relations Today 29, no. 4 (2003): 69–77. http://dx.doi.org/10.1002/ert.10066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bamidis, P., C. Bond, E. Gabarron, M. Househ, A. Y. S. Lau, M. A. Mayer, M. Merolli, M. Hansen, and K. Denecke. "Ethical Issues of Social Media Usage in Healthcare." Yearbook of Medical Informatics 24, no. 01 (August 2015): 137–47. http://dx.doi.org/10.15265/iy-2015-001.

Full text
Abstract:
Summary Objective: Social media, web and mobile technologies are increasingly used in healthcare and directly support patient-centered care. Patients benefit from disease self-management tools, contact to others, and closer monitoring. Researchers study drug efficiency, or recruit patients for clinical studies via these technologies. However, low communication barriers in social-media, limited privacy and security issues lead to problems from an ethical perspective. This paper summarizes the ethical issues to be considered when social media is exploited in healthcare contexts. Methods: Starting from our experiences in social-media research, we collected ethical issues for selected social-media use cases in the context of patient-centered care. Results were enriched by collecting and analyzing relevant literature and were discussed and interpreted by members of the IMIA Social Media Working Group. Results: Most relevant issues in social-media applications are confidence and privacy that need to be carefully preserved. The patient-physician relationship can suffer from the new information gain on both sides since private information of both healthcare provider and consumer may be accessible through the Internet. Physicians need to ensure they keep the borders between private and professional intact. Beyond, preserving patient anonymity when citing Internet content is crucial for research studies. Conclusion: Exploiting medical social-media in healthcare applications requires a careful reflection of roles and responsibilities. Availability of data and information can be useful in many settings, but the abuse of data needs to be prevented. Preserving privacy and confidentiality of online users is a main issue, as well as providing means for patients or Internet users to express concerns on data usage.
APA, Harvard, Vancouver, ISO, and other styles
41

Wilson, Virginia. "Post-Secondary Students Prefer IM to Email for Personal and Social Communication." Evidence Based Library and Information Practice 3, no. 1 (March 17, 2008): 61. http://dx.doi.org/10.18438/b82s56.

Full text
Abstract:
A review of: Lancaster, Sean, David C. Yen, Albert H. Huang, and Shin-Yuan Hung. “The Selection of Instant Messaging or E-mail: College Students’ Perspective for Computer Communication.” Information Management & Computer Security 15.1 (2007): 5-22. Objective – This study investigates college students’ perceptions of instant messaging (IM) and e-mail for conveying emotions, aiding in relationship building, ease of use, and reliability. Design – A survey consisting of 59 questions was administered to 1,000 college students, resulting in 545 usable responses. Setting – The research took place at a midwestern university in the United States. Subjects – 1,000 Management Information Systems (MIS) college students. Methods – A 59-question survey was distributed to 1,000 MIS students during the 2005 academic year. 545 usable responses were returned. Participation was voluntary. During the pre-phase of the research, four categories were determined: emotion, relationship, usage, and reliability. Questions were then written for a pilot study using Likert scaling. The post-research phase involved evaluating the questions linguistically to ensure proper word usage, comprehension, and lack of bias. Main Results – The questions in the section on conveying emotion dealt with how well the two technologies (e-mail and IM) communicated feelings and emotions. While both technologies were acknowledged as being able to communicate more than merely text, IM was clearly preferred for expressing emotion. Fifty-two percent of the respondents strongly agreed or agreed that they used emoticons (originally symbols created with letters and special characters; later evolving into graphical images produced and made available by IM companies) to express emotion in IM, while fewer than 11% agreed or strongly agreed that they did so in e-mail. More than 70% of the respondents strongly agreed or agreed that their friends used emoticons in IM, while fewer than 14% strongly agreed or agreed that their friends used emoticons in e-mails. More than 75% of respondents agreed that it is easier to convey emotions in IM than via e-mail. Analysis on the questions that dealt with the technologies as useful relationship builders again showed a preference for IM. IM was preferred by a greater number of respondents for fostering friendships, improving relationships with friends or team members, building relationships, social interaction, and social networking. This section also found that more than 75% of the respondents felt that IM was more useful than e-mail when interacting with friends. However, when asked about interacting with co-workers specifically, only 44% were in agreement. Nearly 32% were neutral on this point, while 24% were in disagreement. It appears that IM is preferred over e-mail for fostering social and friendly relationships, but is not preferred when the interaction is work-related and more professional. In terms of use, both technologies were considered easy to learn and use by more than 90% of respondents. In terms of preferred use, more than 60% of respondents use IM for personal and social interaction, while less than 1% uses IM for work-related activities. Nearly 80% of respondents preferred using e-mail for work, and nearly 75% preferred using IM for social interaction. Sixty-three percent of respondents did not agree that IM is just as effective as face-to-face meetings, while nearly 75% did not agree that e-mail can be as effective as meeting face-to-face. In the areas of reliability, security, and privacy of IM and e-mail, respondents perceived e-mail more favourably. Sixty-four percent of respondents agreed or strongly agreed that IM is very reliable, while 80% of respondents felt the same way about e-mail. Just over 30% of those questioned agreed that IM is very secure, while more than 50% felt that way about e-mail. However, the gap is narrower when users were queried as to whether or not they worry about security: 13% strongly agreed with the statement that users do not worry about their security when using IM, while 15% strongly agreed with the statement as it pertained to e-mail. The same types of questions were asked about perceived privacy. Nearly 50% agreed that their privacy is protected with e-mail, while just under 35% had the same belief about IM. More than 60% of respondents reported that they do not worry about privacy when e-mailing, while about 53% of respondents do not worry about privacy with IM. Conclusion – IM was perceived more favourably than e-mail in 3 of the 4 categories: conveying emotions, building relationships, and ease of use. In the reliability category, e-mail was perceived more favourably. However, there is a division between social interaction and professional communication. IM is preferred for personal and social relationships, while e-mail is preferred for work-related communication. Neither of the technologies is as desirable as face-to-face meetings.
APA, Harvard, Vancouver, ISO, and other styles
42

Kouroubali, Angelina, Lefteris Koumakis, Haridimos Kondylakis, and Dimitrios G. Katehakis. "Smart Healthcare Apps for Quality Cancer Patient Support." International Journal of Big Data and Analytics in Healthcare 5, no. 1 (January 2020): 28–48. http://dx.doi.org/10.4018/ijbdah.2020010103.

Full text
Abstract:
This paper analyzes the clinical and technological characteristics of cancer mobile apps that enable patients to securely record, manage, and share their information. It proposes an integrated approach towards developing quality mobile health apps for cancer and discusses issues relevant to the enhancement of patient experience and acceptance, adherence to treatment, and effective support of coordinated care. Regulation, standardization, and interoperability together with the existence of useful, accurate, and reliable tools for active patient engagement are important aids towards efficient cancer disease management. Improving quality of life and well-being, in a secure and safe manner that respects the patients' privacy, seems to be a key challenge, together with the exploitation of the outcomes of recent research projects, relevant to end user digital engagement towards an integrated approach for the introduction of trustworthy, interoperable, usable, adaptable, and quality mobile health apps.
APA, Harvard, Vancouver, ISO, and other styles
43

Bin Kasim, Hairoladenan, Zul-Azri Bin Ibrahim, and Mutahir Bin Mohamed Ariff. "Digital Energy Hub for Optimizing Energy Usage: A Review." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 453. http://dx.doi.org/10.14419/ijet.v7i4.36.23915.

Full text
Abstract:
Energy usage as it relates to its security and management is an important aspect that all organizations having a vested stake in power production should be concerned with in these coming years. In this respect, harnessing the knowledge so that it may benefit various sectors, from the power producer right down to the customers, can be achieved by way of the digital energy hub, as proposed in this paper. We first put into context the workings and functions of such a digital platform, and then proceed to outline how it could benefit the many parties involved. Lastly, we take into account the challenges that needs to be addressed for its successful implementation, in which information security and privacy is a top priority amongst other issues.
APA, Harvard, Vancouver, ISO, and other styles
44

Merlec, Mpyana Mwamba, Youn Kyu Lee, Seng-Phil Hong, and Hoh Peter In. "A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR." Sensors 21, no. 23 (November 30, 2021): 7994. http://dx.doi.org/10.3390/s21237994.

Full text
Abstract:
A massive amount of sensitive personal data is being collected and used by scientists, businesses, and governments. This has led to unprecedented threats to privacy rights and the security of personal data. There are few solutions that empower individuals to provide systematic consent agreements on distinct personal information and control who can collect, access, and use their data for specific purposes and periods. Individuals should be able to delegate consent rights, access consent-related information, and withdraw their given consent at any time. We propose a smart-contract-based dynamic consent management system, backed by blockchain technology, targeting personal data usage under the general data protection regulation. Our user-centric dynamic consent management system allows users to control their personal data collection and consent to its usage throughout the data lifecycle. Transaction history and logs are recorded in a blockchain that provides trusted tamper-proof data provenance, accountability, and traceability. A prototype of our system was designed and implemented to demonstrate its feasibility. The acceptability and reliability of the system were assessed by experimental testing and validation processes. We also analyzed the security and privacy of the system and evaluated its performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Xu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (November 28, 2022): 354. http://dx.doi.org/10.3390/fi14120354.

Full text
Abstract:
The rapid development of three-dimensional (3D) acquisition technology based on 3D sensors provides a large volume of data, which are often represented in the form of point clouds. Point cloud representation can preserve the original geometric information along with associated attributes in a 3D space. Therefore, it has been widely adopted in many scene-understanding-related applications such as virtual reality (VR) and autonomous driving. However, the massive amount of point cloud data aggregated from distributed 3D sensors also poses challenges for secure data collection, management, storage, and sharing. Thanks to the characteristics of decentralization and security, Blockchain has great potential to improve point cloud services and enhance security and privacy preservation. Inspired by the rationales behind the software-defined network (SDN) technology, this paper envisions SAUSA, a Blockchain-based authentication network that is capable of recording, tracking, and auditing the access, usage, and storage of 3D point cloud datasets in their life-cycle in a decentralized manner. SAUSA adopts an SDN-inspired point cloud service architecture, which allows for efficient data processing and delivery to satisfy diverse quality-of-service (QoS) requirements. A Blockchain-based authentication framework is proposed to ensure security and privacy preservation in point cloud data acquisition, storage, and analytics. Leveraging smart contracts for digitizing access control policies and point cloud data on the Blockchain, data owners have full control of their 3D sensors and point clouds. In addition, anyone can verify the authenticity and integrity of point clouds in use without relying on a third party. Moreover, SAUSA integrates a decentralized storage platform to store encrypted point clouds while recording references of raw data on the distributed ledger. Such a hybrid on-chain and off-chain storage strategy not only improves robustness and availability, but also ensures privacy preservation for sensitive information in point cloud applications. A proof-of-concept prototype is implemented and tested on a physical network. The experimental evaluation validates the feasibility and effectiveness of the proposed SAUSA solution.
APA, Harvard, Vancouver, ISO, and other styles
46

Aalto, Leena, Pia Sirola, Tiina Kalliomäki-Levanto, Marjaana Lahtinen, Virpi Ruohomäki, Heidi Salonen, and Kari Reijula. "User-centric work environments in modular healthcare facilities." Engineering, Construction and Architectural Management 26, no. 6 (July 15, 2019): 1047–62. http://dx.doi.org/10.1108/ecam-04-2018-0169.

Full text
Abstract:
Purpose The challenges arising from the reform of the social and healthcare sector call for efficient, effective and novel processes in both public and private health and medical care. Facilities need to be designed to suit the new processes and to offer usable workspaces at different levels of healthcare services. Along with traditional construction, modular facility innovations could be one solution to these pressures. The paper aims to discuss these issues. Design/methodology/approach This case study analyzed the different usability characteristics of the work environment in modular and non-modular healthcare facilities (HCFs). The qualitative research method was based on semi-structured interviews of employees and observations of the case buildings. Findings According to the results, the usability characteristics were divided into four main categories: functionality, healthiness, safety/security and comfort. The main differences between the modular and non-modular facilities appeared to be room size, soundproofing, safety issues and the utilization of colors and artwork, which were all perceived as better realized in the non-modular facilities. The staff highlighted functionality as the most important characteristic in their work environment. They even considered functionality as a feature of a comfortable work environment. Originality/value This paper presents new knowledge and a detailed description of the opinions and experiences of healthcare professionals concerning a user-centric, usable environment in the context of modular and non-modular HCFs.
APA, Harvard, Vancouver, ISO, and other styles
47

M.O, MUKOLU, ADELEKE K.O, and ILLUGBEMI A.O. "The Impact of Banking Industry on Customers Perception of Privacy, Risk and Security on Internet Banking Usage." International Review of Management and Business Research 8, no. 1 (March 5, 2019): 89–98. http://dx.doi.org/10.30543/8-1(2019)-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Wass, S., and V. Vimarlund. "Big Data, Smart Homes and Ambient Assisted Living." Yearbook of Medical Informatics 23, no. 01 (August 2014): 143–49. http://dx.doi.org/10.15265/iy-2014-0011.

Full text
Abstract:
Summary Objectives: To discuss how current research in the area of smart homes and ambient assisted living will be influenced by the use of big data. Methods: A scoping review of literature published in scientific journals and conference proceedings was performed, focusing on smart homes, ambient assisted living and big data over the years 2011-2014. Results: The health and social care market has lagged behind other markets when it comes to the introduction of innovative IT solutions and the market faces a number of challenges as the use of big data will increase. First, there is a need for a sustainable and trustful information chain where the needed information can be transferred from all producers to all consumers in a structured way. Second, there is a need for big data strategies and policies to manage the new situation where information is handled and transferred independently of the place of the expertise. Finally, there is a possibility to develop new and innovative business models for a market that supports cloud computing, social media, crowdsourcing etc. Conclusions: The interdisciplinary area of big data, smart homes and ambient assisted living is no longer only of interest for IT developers, it is also of interest for decision makers as customers make more informed choices among today’s services. In the future it will be of importance to make information usable for managers and improve decision making, tailor smart home services based on big data, develop new business models, increase competition and identify policies to ensure privacy, security and liability.
APA, Harvard, Vancouver, ISO, and other styles
49

Zimmermann, Sina, and Nina Gerber. "Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment." i-com 18, no. 3 (November 18, 2019): 271–85. http://dx.doi.org/10.1515/icom-2018-0041.

Full text
Abstract:
AbstractFor many people, digital applications, especially messengers, social networks and cloud services, have become an important part of their daily life. Although most users express privacy concerns regarding the use of digital applications, their concerns do not prevent users from sharing personal information with such applications. A reason for this seemingly paradoxical behavior could be that users pursue certain goals when they are using these applications, which possibly overweigh their privacy concerns. We thus conducted semi-structured interviews with 17 users, with most of them being psychology students, to investigate why they use digital applications (i. e., messengers, social networks, cloud services, digital assistants, and Smart TVs) and what psychological needs they aim to fulfill by using these applications. Our study further included a card sorting task, in which the participants ranked the relevance of ten psychological needs for each of the investigated digital applications they reported to use. Using open coding for the analysis of the interview questions, and a quantitative analysis of the card sorting task, we identified four main psychological needs people aim to fulfill by using digital applications: (1) relatedness-belongingness, (2) competence-effectance, (3) pleasure-stimulation, and (4) autonomy-independence, and four additional psychological needs which are application-specific: (5) security, (6) popularity-influence, (7) self-actualization-meaning, and (8) money-luxury. Besides this, we identified several concerns (e. g., data abuse, privacy invasion, and eavesdropping) and reasons why people refrain from using certain digital applications (i. e., the lack of benefits, malfunction, high costs, and the fear of being eavesdropped on). The fulfillment of the psychological needs seem to overweigh those privacy concerns and play a major role for people’s intention to use digital applications, which is why users will not use alternative privacy friendly applications if these do not allow for the fulfillment of those needs in the same way established applications do.
APA, Harvard, Vancouver, ISO, and other styles
50

Alarefi, Mohammed. "Cloud computing usage by governmental organizations in Saudi Arabia based on Vision 2030." Uncertain Supply Chain Management 11, no. 1 (2023): 169–78. http://dx.doi.org/10.5267/j.uscm.2022.10.010.

Full text
Abstract:
Cloud computing (CC) has been used in several industries and domains. However, the use of CC in governmental organization is still limited. The purpose of this study is to examine the CC usage among governmental organizations in Saudi Arabia. The population of this study are Information technology (IT) professionals working for governmental organizations in Saudi Arabia. Purposive sampling was used to collect the data from the respondents. The questionnaire was distributed, and 211 valid responses were collected. The analysis was conducted using Smart PLS 4.0. The findings showed that perceived usefulness (PU), perceived ease of use (PEOU), external influence, security but not privacy have significant effects on CC usage. The findings also showed that technological readiness moderated the effect of PU, external influence, and security on CC usage. Decision makers are recommended to enhance the perception of the benefit of CC and conduct more training courses to ease the usage of CC.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography