scholarly journals Securing Hospital Data with Blockchain and AI

Author(s):  
M. Shailaja

In cyber world everything is dependent on data and all Artificial Intelligence algorithms discover knowledge from past data only, With the development of information technologies, the trend of integrating cyber, physical and social (CPS) systems to a highly unified information society, rather than just a digital Internet, is becoming increasing obvious. An increasing amount of personal data, including location information, web-searching behaviour, user calls, user preference, is being silently collected by the built-in sensors inside the products from those big companies, which brings in huge risk on privacy leakage of data owners. In this paper, we aim at securing data by combining blockchain and AI together, and design a Secure Networking architecture (termed as SecNet) to significantly improve the security of data sharing, and then the security of the whole network. In SecNet, to protect data, one of the biggest challenges is where and how to store data, because users have to give their data to service providers if they want to use certain services or applications.

Author(s):  
Yanis Arturovich Sekste ◽  
Anna Sergeevna Markevich

The subject of this research is the problems emerging in the process of establishment and development of the Institution of personal data protection in the Russian Federation. Special attention is turned to the comparison of Soviet and Western models of protection of private life and personal data. The authors used interdisciplinary approach, as comprehensive and coherent understanding of socio-legal institution of personal data protection in the Russian Federation is only possible in inseparable connection with examination of peculiarities of the key historical stages in legal regulation of private life of the citizen. After dissolution of the Soviet political and legal system, the primary task of Russian law consisted in development and legal formalization of the institution of protection of human and civil rights and freedoms, first and foremost by means of restricting invasion of privacy by the state and enjoyment of personal freedom. It is concluded that the peculiarities of development of the new Russian political and legal model significantly impacted the formation of the institution of personal data protection in the Russian Federation. The authors believe that the Russian legislator and competent government branches are not always capable to manage the entire information flow of personal data; therefore, one of the priority tasks in modern Russian society is the permanent analysis and constant monitoring of the development of information technologies.


2018 ◽  
Vol 8 (3) ◽  
pp. 63
Author(s):  
Firas Rifai

Reports on the news about nature or man-made catastrophes are not uncommon. We hear constantly that a human catastrophe has taken place somewhere in the world. In those cases where the infrastructure could possibly be destroyed, it becomes clear that a rescue mission is difficult to achieve. We need special rescue teams, who despite the difficult rescue mission, save lives and reduce suffering.The special organizations involved in catastrophes are called humanitarian organizations. In addition, the specific skills and abilities that these organizations have should be mainly in logistics.In this paper, the author goes into more details about humanitarian logistics and shows its importance in disaster areas. Unfortunately, these humanitarian organizations have many weaknesses and challenges. As a result, these organizations are not well developed, despite their importance. In contrast, the commercial logistics companies, which are well developed, have much strength in management, information technologies, etc.This research defines humanitarian logistics and describes its weaknesses and limitations. Furthermore, it deals with the specifics of humanitarian organizations. The special features of these organizations are their rescue missions, especially in destroyed infrastructure areas. This research demonstrates the various similarities between commercial and humanitarian logistics and points to the potential of knowledge and experience transfer from commercial logistics to humanitarian logistics.This research compares humanitarian logistics with commercial logistics. In doing so, the author tries to gain a deeper insight into the potential of transferring know-how and experience from retail logistics to humanitarian logistics in order to strengthen humanitarian logistics.The research of logistics is a very dynamic world in which humanitarian logistics is becoming increasingly important both in research and in practice. In particular, the demands on logistics in general and on humanitarian logistics, in particular, will increase significantly in the near future because it is estimated that the number and impact of both natural and human disasters is increasing (Kumar et al., 2012).Murphy (2015) analyzed the past data of catastrophes and derived a forecast for the future frequency of disasters and their impact: “Because of the increasing frequency (and severity) of disasters over the past 50 years, humanitarian logistics is likely to be an important topic into the foreseeable future”.


Author(s):  
Kirils Dubinins ◽  
Kristīne Mārtinsone

Provision of remote services became relevant all over the world, during the 2020 COVID-19 pandemic. Latvian supervisors were also forced to transfer their practice to the digital space as well. COVID-19 pandemic challenges opened a wider range of opportunities for improvement remote practice. Pandemic also highlighted the risks associated with lack of relevant competences. At the global level over the last decade, risks associated with remote counselling summarized in guidelines, providing professionals with examples of best practice. In Latvia, on other hand, such guidelines have not adopted yet.This study developed with the aim to find out the awareness of Latvian supervisors about the risks (cyber security) of using information technology and the protection of personal data in the conditions created by the COVID-19 pandemic.To find out how Latvian supervisors are aware about the risks of using information technology (cyber security) and personal data protection, a survey conducted among Latvian supervisors and organizing an expert panel discussion, scientific strength of the study ensured by data triangulation.The obtained results allowed to conclude that the COVID-19 pandemic highlighted the need for supervision remote practice, at the same time the research data show that the awareness of Latvian supervisors about the risks of information technology use (cyber security) and personal data protection is medium to low.The results of the research show that in the education of Latvian supervisors it is necessary to allocate place for the acquisition of information technology (cyber security) risk and personal data protection regulation.This research emphasizes the importance of several supervisors’ competences such as digital knowledge and personal data protection, however further research is needed to find the most effective methods how to improve these competences.  


Author(s):  
Ernest Gramatskyy ◽  
Inha Kryvosheyina ◽  
Volodymyr Makoda ◽  
Liydmyla Panova

The modern society necessitates the introduction of new IT-solutions to meet its needs. With the spread of know-how, the need for its detailed analysis with the further determination of the direction of development. The purpose is to carry out an analysis of the introduction and functioning of know-how, as well as to determine the vectors of its use, taking into account the needs of participants in legal relations arising in this area. The subject of research – information technologies (know-how) as objects of intellectual property rights in their use. The methodological basis consists of the method of analysis, the method of synthesis, the dialectical method, the comparative-legal method, the system method, and the logical-legal method. The result of this work is to identify the importance of the information technologies in everyday life of modern society and the level of popularity of their use, outlining possible vectors of development in the economics in the direction of digitalization and justification of the need to improve the provisions of current legislation within the considered topic, expressing the idea of the direction of innovative information policy in the direction of active use of blockchain and maximum compliance with the protection of personal data of customers.


Refuge ◽  
2013 ◽  
Vol 29 (1) ◽  
pp. 31-42 ◽  
Author(s):  
Nora Danielson

Communication between service providers and refugees about services, legal processes, and rights helps shape refugees’ experience of asylum but has, in Cairo, Egypt, been a source of misunderstandings and conflict. Based on qualitative pilot research, this paper explores the practices, challenges, and potentials of information technologies old and new in facilitating access to asylum in this southern city. Interviews with refugee and service providers and review of previous technology-based initiatives show that although service providers tend to rely on oral information transfer, other channels—print, phone, text messaging, websites, social media—hold significant capacity for growth. Existing practices and initiatives in Cairo demonstrate the potential for technology-based projects to overcome the geographic barriers of the urban setting and the range of literacy and languages in Cairo’s refugee communities. However, service providers and refugees require further funding and institutional support if this potential is to be realized.


Author(s):  
Anna Rohunen ◽  
Jouni Markkula

Personal data is increasingly collected with the support of rapidly advancing information and communication technology, which raises privacy concerns among data subjects. In order to address these concerns and offer the full benefits of personal data intensive services to the public, service providers need to understand how to evaluate privacy concerns in evolving service contexts. By analyzing the earlier used privacy concerns evaluation instruments, we can learn how to adapt them to new contexts. In this article, the historical development of the most widely used privacy concerns evaluation instruments is presented and analyzed regarding privacy concerns' dimensions. Privacy concerns' core dimensions, and the types of context dependent dimensions, to be incorporated into evaluation instruments are identified. Following this, recommendations on how to utilize the existing evaluation instruments are given, as well as suggestions for future research dealing with validation and standardization of the instruments.


2021 ◽  
Vol IV(1) ◽  
Author(s):  
Dinu Turcanu ◽  
◽  
Natalia Spinu ◽  
Serghei Popovici ◽  
Tatiana Turcanu ◽  
...  

The process of implementing information technologies in all areas of economic, political, social life, etc. in the Republic of Moldova has also determined the evolution of cybercrime. New “virtual” dimensions of national infrastructure are being formed, which are becoming more and more important for local and international politics. As a result, in recent years it has been found that computer systems, networks and data are being used more and more frequently for criminal purposes, and the materials that could be evidence of these crimes are also stored and transmitted through these networks by perpetrators. Cybercrime, espionage, propaganda, diversion and excessive exploitation of personal data through electronic communications networks are used as basic tools at all stages of designing a hybrid security threat. Cyberspace-specific threats are characterized by asymmetry and accentuated dynamics and global character, which makes them difficult to identify and counteracted by measures proportional to the impact of the materialization of risks. Moldova is currently facing threats from cyberspace at the address of critical infrastructures, given the increasing interdependence between cyber infrastructures and infrastructures such as those in the financial banking, transport, energy and national defense sectors. The globality of cyberspace is likely to amplify the risks to them by affecting both the sector to the same extent private as well as public. Threats to cyberspace can be classified in several ways, but the most commonly used are those based on motivational factors and the impact on society. In the prevailing conditions cybersecurity is becoming one of the most important areas for ensuring internal security and the effective operation of state institutions in all spheres of social and economic life.


Author(s):  
M. Fevzi Esen ◽  
Eda Kocabas

With the new developments in information technologies, personal and business data have become easily accessible through different channels. The huge amounts of personal data across global networks and databases have provided crucial benefits in a scientific manner and many business opportunities, also in the meeting, incentive, convention, and exhibition (MICE) industry. In this chapter, the authors focus on the analysis of MICE industry with regards to the new regulation (GDPR) of personal data protection of all EU citizens and how the industry professionals can adapt their way of business in light of this new regulation. The authors conducted an online interview with five different meetings industry professionals to have more insight about the data produced with its content and new regulations applied to the industry. The importance of personal data privacy and protection is discussed, and the most suitable anonymization techniques for personal data privacy are proposed.


Author(s):  
Feng Xu ◽  
Mingming Su ◽  
Yating Hou

The Cloud computing paradigm can improve the efficiency of distributed computing by sharing resources and data over the Internet. However, the security levels of nodes (or severs) are not the same, thus, sensitive tasks and personal data may be scheduled (or shared) to some unsafe nodes, which can lead to privacy leakage. Traditional privacy preservation technologies focus on the protection of data release and process of communication, but lack protection against disposing sensitive tasks to untrusted computing nodes. Therefore, this article put forwards a protocol based on task-transformation, by which tasks will be transformed into another form in the task manager before they can be scheduled to other nodes. The article describes a privacy preservation algorithm based on separation sensitive attributes from values (SSAV) to realize the task-transformation function. This algorithm separates sensitive attributes in the tasks from their values, which make the malicious nodes cannot comprehend the real meaning of the values even they get the transformed tasks. Analysis and simulation results show that the authors' algorithm is more effective.


Author(s):  
M. Fevzi Esen ◽  
Eda Kocabas

With the new developments in information technologies, personal and business data have become easily accessible through different channels. The huge amounts of personal data across global networks and databases have provided crucial benefits in a scientific manner and many business opportunities, also in the meeting, incentive, convention, and exhibition (MICE) industry. In this chapter, the authors focus on the analysis of MICE industry with regards to the new regulation (GDPR) of personal data protection of all EU citizens and how the industry professionals can adapt their way of business in light of this new regulation. The authors conducted an online interview with five different meetings industry professionals to have more insight about the data produced with its content and new regulations applied to the industry. The importance of personal data privacy and protection is discussed, and the most suitable anonymization techniques for personal data privacy are proposed.


Sign in / Sign up

Export Citation Format

Share Document