Securing Data Beyond PCI in a SOA Environment: Best Practices for Advanced Data Protection

2008 ◽  
Author(s):  
Ulf T. Mattsson
2021 ◽  
pp. 195-220
Author(s):  
Chris Marsden ◽  
Ian Brown ◽  
Michael Veale

This chapter elaborates on challenges and emerging best practices for state regulation of electoral disinformation throughout the electoral cycle. It is based on research for three studies during 2018–2020: into election cybersecurity for the Commonwealth; on the use of artificial intelligence (AI) to regulate disinformation for the European Parliament; and for UNESCO, the United Nations body responsible for education. The research covers more than half the world’s nations, and substantially more than half that population, and in 2019 the two largest democratic elections in history: India’s general election and the European Parliamentary elections. Regulating digital dominance in electoral disinformation presents specific challenges in three very distinctive fields: election law, media law, and mass communications regulation, and targeted online advertising, including data protection law. Implementing best practices against electoral disinformation will require action by EMBs, data protection agencies, communications and media regulators, parliamentary authorities, and ministries of justice and equivalent Neither effective implementation, nor a disinterested assessment of best practice, can be guaranteed. Electoral laws are—like much history—written by the winners, often immediately after their victory. Legal frameworks need to be updated as a response to disinformation challenges discovered during electoral processes, as well as encompassing international best practice. Our ten recommendations for policymakers take account of these imperatives and uncertainties.


2017 ◽  
Vol 8 (2) ◽  
Author(s):  
Willy Sudiarto Raharjo ◽  
Aloysius Airlangga Bajuadji

HTTPS protocol offers better data protection than regular HTTP protocol since it utilize cryptography, mainly encryption and authentication mechanism to provide confidentiality and authenticity to packets sent to and from servers. However, not all institutions have properly implemented HTTPS protocol for their web sites. This paper analyzed the implementation of HTTPS protocol for all higher education web sites in Java island. We found that only 28 out of 1505 (1.86%) of all higher education institution who have a domain name have been using HTTPS protocol for their main domain. Furthermore, not all of them have properly implemented HTTPS protocol. We analyzed all 28 domains and we found that 8 out of 28 (28.57%) institutions are still using SSLv3 protocol which is no longer recommended to be used since it’s vulnerable to POODLE attack, 9 out of 28 (32.14%) institutions are still using an old algorithm RC4 which is proven to be insecure, 4 out of 28 (14.28%) institutions only support up to TLS 1.0, and 6 out of 28 (21.42%) institutions are still using SSLv2 or reusing same RSA keys thus vulnerable to DROWN attack. Many of the best practices of implementing HTTPS protocol were also neglected. HTTP Strict Transport Security (HSTS) is used by 5 out of 28 (17.8%) institutions and none of them have implemented HTTP Public Key Pinning (HPKP). Index Terms—cryptography, HTTPS, SSL, TLS


2021 ◽  
pp. 117-131
Author(s):  
Ashvin Kamaraju ◽  
Asad Ali ◽  
Rohini Deepak

2021 ◽  
Vol 3 ◽  
pp. 54-63
Author(s):  
Vina Himmatus Sholikhah ◽  
Noering Ratu Fatheha Fauziah Sejati ◽  
Diyanah Shabitah

The COVID-19 pandemic has increased the number of people connected to the internet. Based on data, internet users in Indonesia increased by 8.9% from 2018 to 73.7% (APJII, 2020). In addition, internet use is increasing in residential areas and residential areas (Kominfo, 2020). The development of Information, Communication and Technology Technology continues to progress, it needs to be accompanied by data protection regulations. However, Indonesia does not yet have a data protection regulation that can be implemented on the threat of cyber attacks. This research is aimed at finding best practices in data protection that can be applied in Indonesia. This study uses the Narrative Policy Framework (NPF). In the analysis, a comparison is made between data protection authorities to protect data in Indonesia and best practices in the UK and Malaysia, especially in post-pandemic conditions. This study aims to recommend solutions that strengthen data security protection in the post-COVID-19 era in Indonesia.


2015 ◽  
Author(s):  
Christopher Boehnen ◽  
David Bolme ◽  
Patrick Flynn

Author(s):  
Kristen Izaryk ◽  
Robin Edge ◽  
Dawn Lechwar

Purpose The purpose of this article is to explore and describe the approaches and specific assessment tools that speech-language pathologists are currently using to assess social communication disorders (SCDs) in children, in relation to current best practices. Method Ninety-four speech-language pathologists completed an online survey asking them to identify which of the following approaches they use to assess children with SCD: parent/teacher report, naturalistic observation, formal assessment, language sample analysis, interviews, semistructured tasks, and peer/self-report. Participants were also asked to identify specific assessment tools they use within each approach. Results Participants most commonly assess SCDs by combining interviews, naturalistic observation, language sampling, parent/teacher report, and formal assessment. Semistructured tasks and peer/self-report tools were less frequently utilized. Several established parent/teacher report and formal assessment tools were commonly identified for assessing SCDs. Most participants use an informal approach for interviews, language sampling, and naturalistic observations in their SCD assessment process. Conclusions Generally, participants follow best practices for assessing SCDs by combining several different approaches. Some considerations for future assessment are identified, including the use of established protocols in the place of informal approaches in order to make the assessment of SCDs more systematic. Future directions for research are discussed.


Sign in / Sign up

Export Citation Format

Share Document