Governance and Privacy Issues from the Internet of Value

Author(s):  
Mike Brookbanks
Keyword(s):  
Author(s):  
Martin Victor K ◽  
J. Immanuel Johnraja ◽  
Getzi Jeba Leelipushpam ◽  
J. Jebaveerasingh Jebadurai ◽  
I. Bildass Santhosam

Intexto ◽  
2019 ◽  
pp. 139-165
Author(s):  
André Luiz Martins Lemos ◽  
Daniel Góis Rabêlo Marques ◽  
Elias Cunha Bitencourt

The article describes how the Brazilian media shows the Internet of Things. The corpus is composed of 165 texts of Folha de São Paulo published online between 2011 and 2016. A data scraping tool was developed to extract the texts, which were analyzed using Atlas.ti. As criterion of analysis, we sought to identify the most cited objects, the qualities attributed to them, as well as the most recurrent IoT definitions. We also observed the main themes found in the texts and the judgment implied by the articles. We conclude that IoT is defined by the connectivity between intelligent objects, linked to technical and economic issues and to the imaginary of the future. These objects work mostly in the residential, health and transportation areas. Privacy issues still do not dominate the discussions.


Author(s):  
Muawya N. Al Dalaien ◽  
Ameur Bensefia ◽  
Salam A. Hoshang ◽  
Abdul Rahman A. Bathaqili

In recent years the Internet of Things (IoT) has rapidly become a revolutionary technological invention causing significant changes to the way both corporate computing systems, and even household gadgets and appliances, are designed and manufactured. The aim of this chapter is to highlight the security and privacy issues that may affect the evolution of IoT technology. The privacy issues are discussed from customer perspectives: first, the IoT privacy concern where the privacy debates on IoT and the IoT privacy that reflected from users' perspective based on the examination of previous researches results. In addition, the different architectures for IoT are discussed. Finally, the chapter discusses the IoT security concern by collecting, analyzing and presenting the major IoT security concerns in the literature as well as providing some potential solutions to these concerns.


Author(s):  
Xichen Zhang ◽  
Ali A. Ghorbani

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.


Author(s):  
Eralda Caushaj ◽  
Huirong Fu ◽  
Ishwar Sethi ◽  
Haissam Badih ◽  
Dion Watson ◽  
...  

The importance of wireless cellular communication in our daily lives has grown considerably in the last decade. The smartphones are widely used nowadays, besides voice communication; the authors routinely use them to access the internet, conduct monetary transactions, send text messages and query a lot of useful information regarding the location of specific places of interest. The use of smartphones in their day-to-day communication raises many unresolved security and privacy issues. In this paper they identify relevant security attacks in Wireless Cellular Network. The authors conduct experiments in four different platforms such as Iphone, Android, Windows and Blackberry. The packets captured through Wireshark for approximately 24 minutes, giving them a lot of information regarding security and privacy issues involving the users. A lot of useful apps installed and used by the end-users have serious issues in terms of privacy and the information exposed. Which is the better platform comparing all four and what exactly do they expose from the user’s information? What are the threats and countermeasures that the users should be aware of? The aim of the authors’ paper is to give answers to the above questions based on the data captured by conducting real-life scenarios.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


2021 ◽  
Author(s):  
donghua jiang ◽  
Lidong Liu ◽  
Liya Zhu ◽  
Xingyuan Wang ◽  
Yingpin Chen ◽  
...  

Abstract The transmission of images via the Internet has grown exponentially in the past few decades. However, the Internet considered as an insecure method of information transmission may cause serious privacy issues. In order to overcome such potential security issues, a novel double-image visually meaningful encryption (DIVME) algorithm conjugating quantum cellular neural network (QCNN), compressed sensing (CS) and fractional Fourier transform (FRFT) is proposed in this paper. First, the wavelet coefficients of the two plain images are scrambled by the Fisher-Yates confusion algorithm, and then compressed by the key-controlled partial Hadamard matrix. The final meaningful cipher image is generated by embedding the encrypted images into a host image with the same resolution of the plain image via the FRFT-based embedding method. Besides, the eigenvalues of the plain images are utilized to generate the key stream to improve the ability of proposed DIVME algorithm to withstand the plaintext attacks. Afterwards, the plaintext eigenvalues are embedded into the alpha channel of the meaningful cipher image under control of the keys to reduce unnecessary storage space and transmission costs. Ultimately, the simulation results and security analyses indicate that the proposed DIVME algorithm is effective and can withstand multiple attacks.


Sign in / Sign up

Export Citation Format

Share Document