Cross-boundary information sharing in e-governance based on third-party platform

Author(s):  
Wensheng Yang
2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2016 ◽  
Author(s):  
Jennifer Urban

*Abstract: *This paper empirically examines the 17 U.S.C. § 512 notice and takedown process as implemented by the Texas online service provider, The Planet. We reviewed a random sample of notices from a population of all notices processed by The Planet from August 2004 to June 2007. We used a mixed methodology, qualitatively assessing the notices, and running quantitative checks to ensure that we were not mistakenly over- or understating the importance of qualitative findings. Because the notices most clearly show sender behavior, we focus on senders’ use of section 512; we then more generally discuss the possible effects of sender behavior on targets and OSPs. We conclude that section 512 continues to be useful for copyright holders; in addition, it undoubtedly provides important innovation-promoting protection for intermediaries. Yet the section 512 regime also shows serious strain in practice, at least within our observed set of notices. A considerable group of senders have difficulty following section 512’s technical requirements and understanding the substantive underlying copyright law. Further, as expected, the large copyright industries appear to be challenged by peer-to-peer filesharing — a problem for which the notice and takedown framework does not provide immediate relief — leading them to make broader demands than are supported by section 512. Finally, the emerging dominance of third-party rights enforcement organizations ("REOs") and trade associations, which have incentives to generate notices and achieve takedowns, add a layer of complexity to the process. Ultimately, these strains, and senders’ responses to them, likely affect both OSPs and targets. Overall, they prompt concerns about due process for targets and potential harms to Internet expression. We reaffirm our previous suggestions for reform, and call for greater information sharing and transparency to help rebalance and strengthen the section 512 process.Available at SSRN: http://ssrn.com/abstract=2694348


2017 ◽  
Vol 13 ◽  
pp. 7-13
Author(s):  
Shanti Basnet

Information resources, spatial or non-spatial are used widely and wisely to improve the organization's operation in today's competitive environment. With the advancement of information and communication technology, information sharing is made feasible and practiced within various entities. However, information sharing can be complex. There are various factors that influence cross-boundary information sharing because each organization operates within complex information, organizational and national context. There can be differences in technology, knowledge, culture, politics, geography, resources, relationships and intentions. This paper highlights on the different factors that can influence the information sharing in different perspectives.Nepalese Journal on Geoinformatics -13, 2014, Page: 7-13


Author(s):  
Theresa A. Pardo ◽  
J. Ramon Gil-Garcia ◽  
G. Brian Burke

2019 ◽  
Vol 39 (5) ◽  
pp. 346-354 ◽  
Author(s):  
Sora Park ◽  
J. Ramon Gil-Garcia ◽  
Theresa A. Pardo ◽  
Megan Sutherland ◽  
Andrew Roepe

Sign in / Sign up

Export Citation Format

Share Document