scholarly journals The protect mobile user data in Russia

Author(s):  
Anna Zharova

This paper studies the issue the information security for smartphone users in Russia. The report analyses the regulations the state uses to prevent undeclared functionality and malicious programs in mobile phones in Russia; the law enforcement practice in this area; the responsibility of legal entities, officials and persons for non-compliance with the requirements for standardization, ensuring information security and violation of declaration of conformity. The paper develops proposals to improve state regulation of undeclared functionality of mobile devices providing the collection of information, including confidential data. The report discusses specific ethical issues related to privacy, including matters relating to compensation for damage resulting from the leakage of personal information and develops proposals for legal ensuring the information security of mobile phone users. The report first outlines the main actors, terms and concepts used in the report. Second the standards for mobile phone developers, although there is no guarantee of complete information security. In this case, the peculiarity of Russia is that standards used in the field of information security are voluntary. Third how law enforcement agencies protect the user community. In this case there is a potential danger that this may entail uncontrolled access of government agencies to confidential data.

Author(s):  
Barbara L. Ciaramitaro

Mobile technologies have dramatically changed the world’s ability to communicate. The number of mobile phones used worldwide has exceeded 4.6 billion with continued growth expected in the future. In fact, in the United States alone, the numbers of mobile phone users comprise over 80% of the population. Mobile phones and tablets (mobile devices) are not simply voice communication devices. They have become a medium to create voice, music, text, video, and image communications. Importantly, these various types of communication can be created and shared on demand by the mobile user. In addition to communication methods, mobile devices are also a tool used to access the Internet, view television and movies, interact with GPS (Global Positioning System), and read and respond to barcode and augmented reality messages. Each of these methods utilized by the mobile phone user becomes a tool that can be used in mobile marketing to expand beyond traditional marketing methods. Mobile devices are considered to be “the most personal piece of technology that most of us will ever own” (Krum, 2010, p. 7). We usually take them with us wherever we go and are usually reachable through them. However, mobile devices also provide the ability to access the most personal information about us. Mobile devices know who we communicate with and how often. They know our schedule – both business and personal. They often know all of our email addresses and frequently accessed web sites. They know what videos, music, television shows, and movies we like. They know about us through pictures and text messages sent and received. They know where we go, how often, and how long we stay through location tracking technology. This collection of accessible personal information allows mobile marketing to target individuals at the time and place where their message will be most effective. Mobile technologies over the past 20 years have dramatically changed the way people communicate, collaborate, search for, receive, and share information. These dramatic changes have had striking impact on the world of marketing to the extent that mobile marketing has become the predominant form of customer engagement.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2020 ◽  
Vol 7 (1) ◽  
pp. 29-48 ◽  
Author(s):  
Leonhard Menges

AbstractA standard account of privacy says that it is essentially a kind of control over personal information. Many privacy scholars have argued against this claim by relying on so-called threatened loss cases. In these cases, personal information about an agent is easily available to another person, but not accessed. Critics contend that control accounts have the implausible implication that the privacy of the relevant agent is diminished in threatened loss cases. Recently, threatened loss cases have become important because Edward Snowden’s revelation of how the NSA and GCHQ collected Internet and mobile phone data presents us with a gigantic, real-life threatened loss case. In this paper, I will defend the control account of privacy against the argument that is based on threatened loss cases. I will do so by developing a new version of the control account that implies that the agents’ privacy is not diminished in threatened loss cases.


Author(s):  
Trey Roady ◽  
Kyle Wilson ◽  
Jonny Kuo ◽  
Michael G. Lenné

Objective Research shows frequent mobile phone use in vehicles but says little regarding how drivers hold their phone. This knowledge would inform countermeasures and benefit law enforcement in detecting phone use. Methods 934 participants were surveyed over phone-use prevalence, handedness, traffic-direction, and where they held their device. Results The majority (66%) reported using their phone while driving. Younger drivers were more likely to use their device. Of device-users, 67% preferred their passenger-side hand, 25% driver-side, and 8% both. Height- wise: 22% held in-lap, 52% even with the wheel, and 22% at wheel-top. Older drivers were more likely to hold the phone in the highest position The three most popular combinations were passenger-middle (35%), passenger-low (19%), and passenger-high (13.9%). There was insufficient evidence of differences based on handedness, prevalence, or traffic-direction. Conclusion Driver-preferred attention regions often require substantial neck flexion and eye-movement, which facilitates distraction detection. However, behavior may change in response to future interventions.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


2015 ◽  
Vol 4 (4) ◽  
pp. 47-58 ◽  
Author(s):  
Nico Martins ◽  
Adéle da Veiga

An information security culture is influenced by various factors, one being regulatory requirements. The United Kingdom (UK) has been regulated through the UK Data Protection Act since 1995, whereas South Africa (SA) only promulgated the Protection of Personal Information Act (PoPI) in 2013. Both laws stipulate requirements from an information security perspective with regard to the processing of personal information, however in the UK this has been regulated for a longer period. Consequently, it is to be expected that the information security culture for organisations in the UK will be significantly different from that of SA. This raises the question as to whether the same information security culture assessment (ISCA) instrument could be used in an organisation with offices in both jurisdictions, and whether it might be necessary to customise it according the particular country’s enforcement of information security and privacy-related conditions. This is reviewed, firstly from a theoretical perspective, and secondly a factorial invariance analysis was conducted in a multinational organisation with offices in both the UK and SA, using data from an ISCA questionnaire, to determine possible factorial invariances in terms of the ISCA.


Author(s):  
MOHAMMED S. KHALIL ◽  
FAJRI KURNIAWAN ◽  
KASHIF SALEEM

Over the past decade, there have been dramatic increases in the usage of mobile phones in the world. Currently available smart mobile phones are capable of storing enormous amounts of personal information/data. The smart mobile phone is also capable of connecting to other devices, with the help of different applications. Consequently, with these connections comes the requirement of security to protect personal information. Nowadays, in many applications, a biometric fingerprint recognition system has been embedded as a primary security measure. To enable a biometric fingerprint recognition system in smart mobile phones, without any additional costs, a built-in high performance camera can be utilized. The camera can capture the fingerprint image and generate biometric traits that qualify the biometric fingerprint authentication approach. However, the images acquired by a mobile phone are entirely different from the images obtained by dedicated fingerprint sensors. In this paper, we present the current trend in biometric fingerprint authentication techniques using mobile phones and explore some of the future possibilities in this field.


Sign in / Sign up

Export Citation Format

Share Document