scholarly journals A Survey: Information Security and Information Privacy in Devices

2017 ◽  
Vol 6 (1) ◽  
pp. 1515-1516
2021 ◽  
Vol 1 (3) ◽  
pp. 470-495
Author(s):  
Md Shopon ◽  
Sanjida Nasreen Tumpa ◽  
Yajurv Bhatia ◽  
K. N. Pavan Kumar ◽  
Marina L. Gavrilova

Biometric de-identification is an emerging topic of research within the information security domain that integrates privacy considerations with biometric system development. A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed. Three categories of biometric de-identification are introduced, namely complete de-identification, auxiliary biometric preserving de-identification, and traditional biometric preserving de-identification. An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is presented. The article concludes with open questions and provides a rich avenue for subsequent explorations of biometric de-identification in the context of information privacy.


2021 ◽  
pp. 183335832110197
Author(s):  
Zachary Hollo ◽  
Dominique E Martin

Australia’s national electronic health record (EHR), My Health Record (MHR), raises concerns about information privacy and the presumption of consent to participation. In contrast to the “opt-out” framework for participation, consumers must “opt-in” to obtain additional privacy features to protect their health information on MHR. We review ethical considerations relating to opt-in and opt-out frameworks in the context of EHRs, discussing potential reasons why consent for additional safeguards is not currently presumed. Exploring the implications of recent amendments to strengthen consumer privacy, we present recommendations to promote equity in health information security for all Australians using MHR.


Author(s):  
John Cassini ◽  
B. Dawn Medlin ◽  
Adriana Romaniello

Historically, the United States has attempted to address the issues of an individual’s right to information privacy and security through legislative actions. More specifically, the execution of legislation that addresses information security and privacy has been implemented in particular areas such as health care, banking, and education as well as other industries. This chapter presents an overview of the laws that have addressed the growth of security and privacy threats that havegrown over the years.


ASHA Leader ◽  
2011 ◽  
Vol 16 (9) ◽  
pp. 3-46
Author(s):  
Kate Romanow

Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document