scholarly journals Mobile Government Applications Based on Security and Privacy: A Literature Review

2018 ◽  
Vol 7 (4.1) ◽  
pp. 51
Author(s):  
Ala'a Saeb Al-Sherideh ◽  
Roesnita Ismail ◽  
Fauziah Abdul Wahid ◽  
Norasikin Fabil ◽  
Waidah Ismail

Mobile applications available in anytime and from anywhere. The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens. The main challenges that face the acceptance and adoption of mobile governmental applications are the privacy and security issues. The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services. This study focuses in investigating the security and privacy requirements of mobile government applications. Many related works are reviewed and discussed to understand the important security requirements of mobile government applications. The main results indicate that effective privacy and security of mobile government applications should be assured so as to enhance the level of adopting and using these applications. The security requirements involve many considerations such as the hardware characteristics, software characteristics, and communication characteristics. This article mainly gives better understanding of security requirements of mobile government applications.   

2021 ◽  
Vol 1 (1) ◽  
pp. 164-194
Author(s):  
Sidra Aslam ◽  
Aleksandar Tošić ◽  
Michael Mrissa

During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires blockchain data to be secured with mechanisms that allow on-demand (as opposed to full) disclosure. In this paper, we give a comprehensive overview of blockchain privacy and security requirements, and detail how existing mechanisms answer them. We provide a taxonomy of current attacks together with related countermeasures. We present a thorough comparative analysis based on various parameters of state-of the-art privacy and security mechanisms, we provide recommendations to design secure and privacy-aware blockchain, and we suggest guidelines for future research.


2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


2020 ◽  
pp. 16-30
Author(s):  
Mukesh Soni ◽  
◽  
◽  
◽  
YashKumar Barot ◽  
...  

Health care information has great potential for improving the health care system and also providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining valuable information for prediction in future, preventing such diseases, reducing healthcare costs, and improving overall health. In any case, deciding the genuine utilization of information while saving the patient's identity protection is an overwhelming task. Regardless of the amount of medical data it can help advance clinical science and it is essential to the accomplishment of all medicinal services associations, at the end information security is vital. To guarantee safe and solid information security and cloud-based conditions, It is critical to consider the constraints of existing arrangements and systems for the social insurance of information security and assurance. Here we talk about the security and privacy challenges of high-quality important data as it is used mainly by the healthcare structure and similar industry to examine how privacy and security issues occur when there is a large amount of healthcare information to protect from all possible threats. We will discuss ways that these can be addressed. The main focus will be on recently analyzed and optimized methods based on anonymity and encryption, and we will compare their strengths and limitations, and this chapter closes at last the privacy and security recommendations for best practices for privacy of preprocessing healthcare data.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


Author(s):  
Pandelani H. Munzhedzi

Accountability and oversight are constitutional requirements in all the spheres of government in the Republic of South Africa and their foundation is in the Constitution of the Republic of South Africa of 1996. All spheres of government are charged with the constitutional mandate of providing public services. The level of responsibility and public services provision also goes with the level of capacity of a particular sphere. However, most of the direct and visible services that the public receives are at the local sphere of government. As such, enormous resources are channelled towards this sphere of government so that the said public services could be provided. It is imperative that the three spheres of government account for the huge expenditures during the public service provision processes. The parliaments of national and provincial governments exercise oversight and accountability over their executives and administrations through the Public Accounts Committees, while the local sphere of government relies on the Municipal Public Accounts Committees. This article is theoretical in nature, and it seeks to explore the current state of public accountability in South Africa and to evaluate possible measures so as to enhance public accountability. The article argues that the current public accountability mechanisms are not efficient and effective. It is recommended that these mechanisms ought to be enhanced by inter alia capacitating the legislative bodies at national, provincial and local spheres of the government.


2020 ◽  
Vol 9 (1) ◽  
pp. 80
Author(s):  
Sitti Mirsa Sirajuddin ◽  
A . Atrianingsi

The general objective of the study was to analyze the level of public trust (citizen trust) of e-government based health insurance services, namely the e-mobile National Health Insurance (JKN) BPJS in Makassar City.The design of this research is a quantitative descriptive type. The population in this study were people who used the National Health Insurance (JKN) e-mobile application with 167 respondents. Data collection was carried out using a questionnaire instrument. Data analysis uses multiple linear regression.The results showed that first there was a high level of public trust in JKN e-mobile applications. This means that the application gives satisfaction to the community and is considered beneficial for them. Secondly, the level of public trust is high in the government, where the public considers the government to be serious in providing health insurance services.Tujuan umum penelitian adalah untuk menganalisis tingkat kepercayaan publik (citizen trust) terhadap pelayanan jaminan kesehatan berbasis e-government yaitu e-mobile Jaminan Kesehatan Nasional (JKN) BPJS Kesehatan di Kota Makassar. Desain penelitian ini adalah kuantitatif tipe deskriptif. Populasi dalam penelitian ini adalah masyarakat yang menggunakan aplikasi e-mobile Jaminan Kesehatan Nasional (JKN) dengan jumlah responden sebanyak 383 orang. Pengumpulan data dilakukan dengan menggunakan instrument kuesioner. Analisis data menggunakan regresi linear berganda. Hasil penelitian menunjukkan bahwa, pertama terdapat tingkat kepercayaan tinggi masyarakat terhadap aplikasi e-mobile JKN. Hal ini berarti aplikasi memberi kepuasan kepada masyarakat dan dianggap bermanfaat bagi mereka. Kedua tingkat kepercayaan publik tinggi terhadap pemerintah tinggi, dimana masyarakat menilai pemerintah serius dalam memberikan pelayanan jaminan kesehatan.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


2012 ◽  
pp. 1141-1166
Author(s):  
Milan Petkovic ◽  
Luan Ibraimi

The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditional “purely physical” approach. Furthermore, privacy is becoming an increasing concern in domains that deal with sensitive information such as healthcare, which cannot absorb the costs of security abuses in the system. Once sensitive information about an individual’s health is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. Therefore, in addition to legal means, it is very important to provide and enforce privacy and security in healthcare by technological means. In this chapter, the authors analyze privacy and security requirements in healthcare, explain their importance and review both classical and novel security technologies that could fulfill these requirements.


Author(s):  
Jari Vuori ◽  
Marika Kylänen

Since the late 1990s, the literature of public-private management and publicness have increased, but the genealogy of public-private in a frame of pluralistic definitions has not been studied. This study focuses on ascertaining how the nature and operations of public-private relations influence discursive practices in public-private management, organization, and policy studies. The literature review produced thousands of abstracts (N=2242), but only few articles (N=39) from 22 highly ranked journals (2000-2010). Despite the research of public-private management, it seems that a surprisingly small number of researchers have recognized that the public/private sphere provides a particularly useful approach to evolve organization, management, and policy studies. The only exceptions seem to be anchored by citizenship and especially individualism, “personalized public services.” The authors also found that researchers did not integrate disciplinary traditions in their approaches and link them to different public/private arenas: public in organizations, private in organizations, public in social life, and private in social life. They conclude that the new trends in public-private organizing and management will remain an enigma unless the following is asked: how can the arenas of public/private counteract the effects of themselves?


Sign in / Sign up

Export Citation Format

Share Document