Computer Security and Privacy for the Physical World

Author(s):  
Earlence Fernandes
1974 ◽  
Vol 6 (3) ◽  
pp. 13-17 ◽  
Author(s):  
Lance J. Hoffman

2017 ◽  
Vol 25 (2) ◽  
pp. 190-205 ◽  
Author(s):  
Prashanth Rajivan ◽  
Pablo Moriano ◽  
Timothy Kelley ◽  
L. Jean Camp

Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, externally valid instruments for measuring end-user security expertise are non-existent. Design/methodology/approach A questionnaire encompassing skills and knowledge-based questions was developed to identify critical factors that constitute expertise in end users. Exploratory factor analysis was applied on the results from 898 participants from a wide range of populations. Cluster analysis was applied to characterize the relationship between computer and security expertise. Ordered logistic regression models were applied to measure efficacy of the proposed security and computing factors in predicting user comprehension of security concepts: phishing and certificates. Findings There are levels to peoples’ computer and security expertise that could be reasonably measured and operationalized. Four factors that constitute computer security-related skills and knowledge are, namely, basic computer skills, advanced computer skills, security knowledge and advanced security skills, and these are identified as determinants of computer expertise. Practical implications Findings from this work can be used to guide the design of security interfaces such that it caters to people with different expertise levels and does not force users to exercise more cognitive processes than required. Originality/value This work identified four factors that constitute security expertise in end users. Findings from this work were integrated to propose a framework called Security SRK for guiding further research on security expertise. This work posits that security expertise instrument for end user should measure three cognitive dimensions: security skills, rules and knowledge.


Author(s):  
Sanchari Das ◽  
Robert S. Gutzwiller ◽  
Rod D. Roscoe ◽  
Prashanth Rajivan ◽  
Yang Wang ◽  
...  

Computer security and user privacy are critical issues and concerns in the digital era due to both increasing users and threats to their data. Separate issues arise between generic cybersecurity guidance (i.e., protect all user data from malicious threats) and the individualistic approach of privacy (i.e., specific to users and dependent on user needs and risk perceptions). Research has shown that several security- and privacy-focused vulnerabilities are technological (e.g., software bugs (Streiff, Kenny, Das, Leeth, & Camp, 2018), insecure authentication (Das, Wang, Tingle, & Camp, 2019)), or behavioral (e.g., sharing passwords (Das, Dingman, & Camp, 2018); and compliance (Das, Dev, & Srinivasan, 2018) (Dev, Das, Rashidi, & Camp, 2019)). This panel proposal addresses a third category of sociotechnical vulnerabilities that can and sometimes do arise from non-inclusive design of security and privacy. In this panel, we will address users’ needs and desires for privacy. The panel will engage in in-depth discussions about value-sensitive design while focusing on potentially vulnerable populations, such as older adults, teens, persons with disabilities, and others who are not typically emphasized in general security and privacy concerns. Human factors have a stake in and ability to facilitate improvements in these areas.


Author(s):  
P.E. Orukpe ◽  
T.O. Erhiaguna ◽  
F.O. Agbontaen

The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt to document and classify the flaws in Wi-Fi Protected Setup (WPS), then proving the existence of this flaw with a WPS Pin Cracking Method, and presenting a Reverse Engineering countermeasure to eliminating WPS from an Access Point firmware, including other recommendations to helping the network administrators not repeat the errors that are the root causes of flaws of wireless networking in general from being exploited. By implementing the various techniques discussed in this paper, a better and more secure wireless network will be developed.


Author(s):  
Hemamali Tennakoon

Information security and privacy are multi-faceted concepts, and earlier definitions of information security and privacy seem inadequate in the context of emerging technologies such as social media. Hence, this chapter presents an analysis of the concept of information security followed by a discussion of computer security, information security, network security, personal privacy, informational privacy, etc. Then the discussion narrows down to information security and privacy on Social Networking Sites (SNS) followed by an analysis of the consequences of information security and privacy breaches from individualistic and organizational perspectives. The lack of understanding of the complex nature of security and privacy issues are preventing businesses from gaining the full economic benefit, especially on SNS. Therefore, some solutions and recommendations are suggested towards the end of the chapter, including the need for a common legal framework. Finally, the chapter ends with suggestions for future research.


Sign in / Sign up

Export Citation Format

Share Document