A Conceptual Model for Assessing Security and Privacy Risks in Healthcare Information Infrastructures

2021 ◽  
pp. 285-297
Author(s):  
Georgia Kougka ◽  
Anastasios Gounaris ◽  
Apostolos Papadopoulos ◽  
Athena Vakali ◽  
Diana Navarro Llobet ◽  
...  
2019 ◽  
Vol 19 (4) ◽  
pp. 787-824 ◽  
Author(s):  
Trygve M. H. Reenskaug

AbstractMy objective is to create an intuitive computer for laypeople who want to go beyond ready-made apps and create programs to control their electronic environment. I submit Loke, a new kind of computer that is a universe of objects and nothing but objects. I call it an object computer. Loke is implemented in Squeak, a variant of Smalltalk, and is an extensible, conceptual model for execution, inspection, and exploration. It was first used to demonstrate how Ellen, a novice, programs a smart alarm clock through a GUI adapted to her competence, needs, and preferences. Informal demonstrations indicated that laypeople immediately grasp the idea of communicating objects that represent real things in their environment. They also wanted to use it for their own purposes. They were creative in identifying personal opportunities for Loke and in sketching out their implementations. Interestingly, expert programmers who attended the demonstration did not see the point of Loke. I have completed the programming of Loke qua conceptual model. The model underpins its potential security and privacy and sustains its object and message models. The Loke qua programming environment is still in its infancy, and its inherent security and privacy properties are still not realized in practice. A future Loke device will be accessible from anywhere and embedded in its own hardware to achieve them. The Loke IDE rests on Data–Context–Interaction (DCI), a new programming paradigm that leads to readable code with a clear architecture. I submit Loke for the pleasure of personal programming.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Xiu-Ming Loh ◽  
Voon-Hsien Lee ◽  
Garry Wei-Han Tan ◽  
Keng-Boon Ooi ◽  
Yogesh K. Dwivedi

PurposeThis paper explores the reasons behind the slow uptake of mobile payment (m-payment) from a switching intention (SI) perspective. The antecedents of SI from cash to m-payment were explored using an integrated conceptual model of the push-pull-mooring (PPM) framework and the status quo bias (SQB) perspective.Design/methodology/approachA self-administered survey was used to collect data, which are empirically tested using SmartPLS 3.0.FindingsThe push factor was found to have an insignificant effect on SI to m-payment whereas the pull factor was significant. Furthermore, the results revealed that the two mooring variables have contrasting results as trust is not a significant determinant of SI to m-payment while perceived security and privacy (PSP) is. Additionally, all SQB-related relationships were found to be statistically significantOriginality/valueThis study determined the factors that play vital roles in the consumers' decision-making to transition from cash to m-payment. This was done via a uniquely developed conceptual model that incorporated the PPM framework with the SQB perspective.


2006 ◽  
pp. 215-241
Author(s):  
James B.D. Joshi ◽  
Mei-Ling Shyu ◽  
Walid Aref ◽  
Arif Ghafoor

This chapter focuses on the key challenges in the design of multimedia-based scalable techniques for threat management and security of information infrastructures. It brings together several multimedia technologies and presents a conceptual architectural framework for an open, secure distributed multimedia application that is composed of multiple domains employing different security and privacy policies and various data analysis and mining tools for extracting sensitive information. The challenge is to integrate such disparate components to enable large-scale multimedia applications and provide a mechanism for threat management. The proposed framework provides a holistic solution for large-scale distributed multi-domain multimedia application environments.


2014 ◽  
Vol 10 (2) ◽  
pp. 78-95 ◽  
Author(s):  
Karen Smith ◽  
Francis Mendez ◽  
Garry L. White

A model is developed and tested to explain the relationships among narcissism, privacy concern, vigilance, and exposure to risk on Facebook, with age and gender as controlling variables. Two important constructs are conceptualized and measured in this research. Facebook exposure is defined as the opportunity for privacy and security breaches on Facebook. Facebook vigilance is the extent to which consumers stay focused, attentive, and alert to potential security and privacy risks on Facebook by restricting who can access and post to their Facebook accounts. Data from a survey of 286 adult Facebook users in the U.S. support the hypothesized relationships in the model. Results suggest that narcissism is related to increased Facebook exposure and lower Facebook vigilance, despite greater stated concern for privacy and security. Furthermore, females and younger users have greater risk exposure compared to males and older users. Implications of the findings and future research directions are discussed.


2001 ◽  
Vol 44 (2) ◽  
pp. 51-57 ◽  
Author(s):  
Anup K. Ghosh ◽  
Tara M. Swaminatha

2020 ◽  
Vol 9 (1) ◽  
pp. 91 ◽  
Author(s):  
Nasser Taleb ◽  
Elfadil A. Mohamed

This study is a literature review on cloud computing cloud computing trends as one the fastest growing technologies in the computer industry and their benefits and opportunities for all types of organizations. In addition, it addresses the challenges and problems that contribute to increasing the number of customers willing to adopt and use the technology. A mixed research study approach was adopted for the study, that is, by collecting and analyzing both quantitative and qualitative information within the same literature review and summarizing the findings of previous (related) studies. Results highlights the current and future trends of cloud computing and exposes readers to the challenges and problems associated with cloud computing. The reviewed literature showed that the technology is promising and is expected to grow in the future. Researchers have proposed many techniques to address the problems and challenges of cloud computing, such as security and privacy risks, through mobile cloud computing and cloud-computing governance.


Sign in / Sign up

Export Citation Format

Share Document