scholarly journals Isolating Graphical Failure-Inducing Input for Privacy Protection in Error Reporting Systems

2016 ◽  
Vol 2016 (2) ◽  
pp. 4-21
Author(s):  
João Matos ◽  
João Garcia ◽  
Nuno Coração

Abstract This work proposes a new privacy-enhancing system that minimizes the disclosure of information in error reports. Error reporting mechanisms are of the utmost importance to correct software bugs but, unfortunately, the transmission of an error report may reveal users’ private information. Some privacy-enhancing systems for error reporting have been presented in the past years, yet they rely on path condition analysis, which we show in this paper to be ineffective when it comes to graphical-based input. Knowing that numerous applications have graphical user interfaces (GUI), it is very important to overcome such limitation. This work describes a new privacy-enhancing error reporting system, based on a new input minimization algorithm called GUIᴍɪɴ that is geared towards GUI, to remove input that is unnecessary to reproduce the observed failure. Before deciding whether to submit the error report, the user is provided with a step-by-step graphical replay of the minimized input, to evaluate whether it still yields sensitive information. We also provide an open source implementation of the proposed system and evaluate it with well-known applications.

Diagnosis ◽  
2017 ◽  
Vol 4 (2) ◽  
pp. 79-86 ◽  
Author(s):  
Veronica Restelli ◽  
Annemarie Taylor ◽  
Douglas Cochrane ◽  
Michael A. Noble

AbstractBackground:This article reports on the findings of 12,278 laboratory related safety events that were reported through the British Columbia Patient Safety & Learning System Incident Reporting System.Methods:The reports were collected from 75 hospital-based laboratories over a 33-month period and represent approximately 4.9% of all incidents reported.Results:Consistent with previous studies 76% of reported incidents occurred during the pre-analytic phase of the laboratory cycle, with twice as many associated with collection problems as with clerical problems. Eighteen percent of incidents occurred during the post-analytic reporting phase. The remaining 6% of reported incidents occurred during the actual analytic phase. Examination of the results suggests substantial under-reporting in both the post-analytic and analytic phases. Of the reported events, 95.9% were reported as being associated with little or no harm, but 0.44% (55 events) were reported as having severe consequences.Conclusions:It is concluded that jurisdictional reporting systems can provide valuable information, but more work needs to be done to encourage more complete reporting of events.


Author(s):  
Hana Ali-Pacha ◽  
Naima Hadj-Said ◽  
Adda Ali-Pacha ◽  
Mohamad Afendee Mohamed ◽  
Mustafa Mamat

<span lang="EN-US">Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</span>


2019 ◽  
Vol 87 (3) ◽  
pp. 1529-1564 ◽  
Author(s):  
Navdeep S Sahni ◽  
Harikesh S Nair

Abstract We develop a field experiment that assesses whether advertising can serve as a signal that enhances consumers’ evaluations of advertised goods. We implement the experiment on a mobile search platform that provides listings and reviews for an archetypal experience good, restaurants. In collaboration with the platform, we randomize about 200,000 users in 13 Asian cities into exposure of ads for about 600+ local restaurants. Within the exposure group, we randomly vary the disclosure to the consumer of whether a restaurant’s listing is a paid-ad. This enables isolating the effect on outcomes of a user knowing that a listing is sponsored—a pure signalling effect. We find that this disclosure increases calls to the restaurant by 77%, holding fixed all other attributes of the ad. The disclosure effect is higher when the consumer uses the platform away from his typical city of search, when the uncertainty about restaurant quality is larger, and for restaurants that have received fewer ratings in the past. On the supply side, newer, higher rated and more popular restaurants are found to advertise more on the platform; and ratings of those that advertised during the experiment are found to be higher two years later. Taken together, we interpret these results as consistent with a signalling equilibrium in which ads serve as implicit signals that enhance the appeal of the advertised restaurants to consumers. Both consumers and advertisers seem to benefit from the signalling. Consumers shift choices towards restaurants that are better rated (at baseline) in the disclosure group compared to the no disclosure group, and advertisers gain from the improved outcomes induced by disclosure.


2018 ◽  
Vol 13 (4) ◽  
pp. 815-839 ◽  
Author(s):  
Qinglong Gou ◽  
Fangdi Deng ◽  
Yanyan He

Purpose Selective crowdsourcing is an important type of crowdsourcing which has been popularly used in practice. However, because selective crowdsourcing uses a winner-takes-all mechanism, implying that the efforts of most participants except the final winner will be just in vain. The purpose of this paper is to explore why this costly mechanism can become a popularity during the past decade and which type of tasks can fit this mechanism well. Design/methodology/approach The authors propose a game model between a sponsor and N participants. The sponsor is to determine its reward and the participants are to optimize their effort-spending strategy. In this model, each participant's ability is the private information, and thus, all roles in the system face incomplete information. Findings The results of this paper demonstrate the following: whether the sponsor can obtain a positive expected payoff are determined by the type of tasks, while the complex tasks with a strong learning effect is more suitable to selective crowdsourcing, as for the other two types of task, the sponsor cannot obtain a positive payoff, or can just gain a rather low payoff; besides the task type, the sponsor's efficiency in using the solutions and the public's marginal cost also influence the result that whether the sponsor can obtain a positive surplus from the winner-takes-all mechanism. Originality/value The model presented in this paper is innovative by containing the following characteristics. First, each participant's ability is private information, and thus, all roles in the system face incomplete information. Second, the winner-takes-all mechanism is used, implying that the sponsor's reward will be entirely given to the participant with the highest quality solution. Third, the sponsor's utility from the solutions, as well as the public's cost to complete the task, are both assumed as functions just satisfying general properties.


i-com ◽  
2015 ◽  
Vol 14 (3) ◽  
Author(s):  
Raquel Oliveira ◽  
Sophie Dupuy-Chessa ◽  
Gaëlle Calvary

AbstractInteractive systems have largely evolved over the past years. Nowadays, different users can interact with systems on different devices and in different environments. The user interfaces (UIs) are expected to cope with such variety. Plastic UIs have the capacity to adapt to changes in their context of use while preserving usability. Such capability enhances UIs, however, it adds complexity on them. We propose an approach to verifying interactive systems considering this adaptation capability of the UIs. The approach applies two formal techniques: model checking, to the verification of properties over the system model, and equivalence checking, to compare different versions of a UI, thereby identifying different levels of UI equivalence. We apply the approach to a case study in the nuclear power plant domain in which several UI are analyzed, properties are verified, and the level of equivalence between them is demonstrated.


2020 ◽  
Vol 5 (4) ◽  
pp. 395-398
Author(s):  
Taleb Samad Obaid

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.


2019 ◽  
Vol 39 (61) ◽  
pp. 117
Author(s):  
Maria Graciete Besse

Resumo: Desde O dia dos prodígios (1980) até Estuário (2018), a obra ficcional de Lídia Jorge percorre diferentes lugares, experiências e memórias para desenhar uma cartografia da vida precária e interrogar incansavelmente as sombras que se escondem nas dobras do tempo, sabendo que “escrever sobre o passado é sempre uma proposta de futuro”. A partir de alguns conceitos fundamentais de Agamben, o objectivo deste estudo é analisar como o olhar iluminador da romancista se debruça sobre o arcaico e o contemporâneo, para resgatar do silêncio os contornos mais sensíveis da realidade, oferecendo-nos um testemunho notável sobre a vulnerabilidade humana e interpelando-nos para uma reflexão estimulante sobre a importância da literatura na transformação do mundo.Palavras-chave: Lídia Jorge, Agamben, romance, sociedade portuguesa, ética.Abstract: From The Day of Prodigies (1980) to Estuary (2018), Lídia Jorge’s fictional work traverses different places, experiences and memories to draw a map of precarious life and tirelessly interrogate the shadows that hide in the folds of time, knowing that “writing about the past is always a proposal for the future.” From some fundamental concepts of Agamben, the objective of this study is to analyze how the illuminating look of the novelist focuses on the archaic and the contemporary, to rescue from the silence the most sensitive contours of reality, offering us a remarkable testimony about human vulnerability and questioning us for a stimulating reflection on the importance of literature in the transformation of the world.Keywords: Lídia Jorge, Agamben, novel, portuguese society, ethic.


Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.


Author(s):  
Warren Heymann ◽  
Annette Reboli

Medical school is a stressful enterprise. The days of getting a medical degree and knowing that you will practice in any specialty you desire have become folklore of the past. The number of residency positions available to medical school graduates has not kept pace with the increased number of new medical schools and students. Every discipline is now competitive but the problem is particularly acute for the most competitive programs, such as plastic surgery, orthopedics, otolaryngology, and dermatology.


Sign in / Sign up

Export Citation Format

Share Document