scholarly journals Рrotecting confidential information in a university environment

2021 ◽  
pp. 209-216
Author(s):  
Светлана Александровна Корягина

Активное развитие глобальной экономической среды и национальных систем происходит в условиях интенсивного внедрения инновационных технологий. Интеграция высокотехнологичных электронных устройств в различные процессы на уровне стран, видов экономической деятельности, отдельных предприятий и в частном жизни населения приводит к генерации значительных объемов информации. Отдельное место в качестве источника генерирования данных занимает сеть Интернет, что служит инструментом создания, накопления и передачи информации. В указанных условиях информация выступает в виде ресурса, который можно оценить в денежной форме исходя из специфики данных и спроса среди отдельных групп пользователей. Отдельные государства пытаются завладеть секретной информации других стран, компании используют промышленный шпионаж для получения секретной информации конкурентов, во многих случаях фиксируются случаи похищения персональной информации граждан с целью получения определенной выгоды и тому подобное. Приведенная ситуация приводит к разработке национальных стратегий защиты в сфере информационной безопасности и активной разработки специализированных продуктов, позволяющих с помощью аппаратного и программного обеспечения минимизировать потерю информационных ресурсов стран, компаний, граждан и тому подобное. Рынок представленных продуктов активно развивается и имеет значительный потенциал для роста, поскольку происходит непрерывная эволюция методов, которые нацелены на незаконное завладение коммерческой и частной информации. В отдельных случаях главной целью незаконно доступа к информации является блокирование доступа к ней владельцев или полное уничтожение данных, что негативно влияет на функционирование компании в целом или отдельных систем. Исходя из международного опыта и ситуации в России, в первую очередь речь идет о хакерской атаке в 2017 г. через специализированное бухгалтерское программное обеспечение M.E.Doc, следует отметить активизацию государственных мероприятий, которые ориентированы на предотвращение незаконного нарушения информационной безопасности. Например, после хакерских атак в 2017 г. был создан Ситуационный центр обеспечения кибернетической безопасности. Специфика функционирования учебных заведений предусматривает генерирование персональной информации учащихся, студентов и педагогических работников, баз данных с учебными материалами, текущей документации и тому подобное. Для обеспечения эффективного функционирования учебных структур необходимо создать действенную систему защиты информации, которая позволит минимизировать риски потери или повреждения соответствующих данных. The active development of the global economic environment and national systems takes place in the conditions of intensive introduction of innovative technologies. The integration of high-tech electronic devices into various processes at the level of countries, types of economic activity, individual enterprises and in the private life of the population leads to the generation of significant amounts of information. A separate place as a source of data generation is occupied by the Internet, which serves as a tool for creating, accumulating and transmitting information. Under these conditions, information acts as a resource that can be evaluated in monetary form based on the specifics of the data and demand among individual user groups. Individual states are trying to seize the secret information of other countries, companies use industrial espionage to obtain the secret information of competitors, in many cases, cases of theft of personal information of citizens for the purpose of obtaining a certain benefit are recorded, and so on. This situation leads to the development of national protection strategies in the field of information security and the active development of specialized products that allow using hardware and software to minimize the loss of information resources of countries, companies, citizens, and the like. The market of the presented products is actively developing and has a significant potential for growth, since there is a continuous evolution of methods that are aimed at illegal acquisition of commercial and private information. In some cases, the main purpose of illegal access to information is to block the owners ' access to it or completely destroy the data, which negatively affects the functioning of the company as a whole or individual systems. Based on international experience and the situation in Russia, first of all, we are talking about a hacker attack in 2017 through specialized accounting software M.E.Doc it should be noted the intensification of state measures that are aimed at preventing illegal violations of information security. For example, after the hacker attacks in 2017 A Situational center for Cybernetic security was created. The specifics of the functioning of educational institutions provide for the generation of personal information of students, students and teaching staff, databases with educational materials, current documentation, and the like. To ensure the effective functioning of educational structures, it is necessary to create an effective information protection system that will minimize the risks of loss or damage to the relevant data.

Author(s):  
Pasquale De Luca

The violation of privacy, others people or personal, is a very current problem, which concerns not only on the web but also in private life. In the years 1990 it was expected that nowadays, that any routine operation was carried out "manually", and it would be performed through mobile phones or personal computers. The problem pertains the distribution network that allows to share and bring together information and as result the network becomes unsafe, if subjected to attacks. Nowaday we put personal information on web because otherwise we are seen as “weak”. This work aims to measure and analyze how much information are shared by users of a pre-established social network and it is carried out through a set of algorithms techniques of machine learning.


2014 ◽  
Vol 40 (3) ◽  
pp. 300-324 ◽  
Author(s):  
Véronique Bessière ◽  
Taoufik Elkemali

Purpose – This article aims to examine the link between uncertainty and analysts' reaction to earnings announcements for a sample of European firms during the period 1997-2007. In the same way as Daniel et al., the authors posit that overconfidence leads to an overreaction to private information followed by an underreaction when the information becomes public. Design/methodology/approach – In this study, the authors test analysts' overconfidence through the overreaction preceding a public announcement followed by an underreaction after the announcement. If overconfidence occurs, over- and underreactions should be, respectively, observed before and after the public announcement. If uncertainty boosts overconfidence, the authors predict that these two combined misreactions should be stronger when uncertainty is higher. Uncertainty is defined according to technology intensity, and separate two types of firms: high-tech or low-tech. The authors use a sample of European firms during the period 1997-2007. Findings – The results support the overconfidence hypothesis. The authors jointly observe the two phenomena of under- and overreaction. Overreaction occurs when the information has not yet been made public and disappears just after public release. The results also show that both effects are more important for the high-tech subsample. For robustness, the authors sort the sample using analyst forecast dispersion as a proxy for uncertainty and obtain similar results. The authors also document that the high-tech stocks crash in 2000-2001 moderated the overconfidence of analysts, which then strongly declined during the post-crash period. Originality/value – This study offers interesting insights in two ways. First, in the area of financial markets, it provides a test of a major over- and underreaction model and implements it to analysts' reactions through their revisions (versus investors' reactions through stock returns). Second, in a broader way, it deals with the link between uncertainty and biases. The results are consistent with the experimental evidence and extend it to a cross-sectional analysis that reinforces it as pointed out by Kumar.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jillian Carmody ◽  
Samir Shringarpure ◽  
Gerhard Van de Venter

Purpose The purpose of this paper is to demonstrate privacy concerns arising from the rapidly increasing advancements and use of artificial intelligence (AI) technology and the challenges of existing privacy regimes to ensure the on-going protection of an individual’s sensitive private information. The authors illustrate this through a case study of energy smart meters and suggest a novel combination of four solutions to strengthen privacy protection. Design/methodology/approach The authors illustrate how, through smart meter obtained energy data, home energy providers can use AI to reveal private consumer information such as households’ electrical appliances, their time and frequency of usage, including number and model of appliance. The authors show how this data can further be combined with other data to infer sensitive personal information such as lifestyle and household income due to advances in AI technologies. Findings The authors highlight data protection and privacy concerns which are not immediately obvious to consumers due to the capabilities of advanced AI technology and its ability to extract sensitive personal information when applied to large overlapping granular data sets. Social implications The authors question the adequacy of existing privacy legislation to protect sensitive inferred consumer data from AI-driven technology. To address this, the authors suggest alternative solutions. Originality/value The original value of this paper is that it illustrates new privacy issues brought about by advances in AI, failings in current privacy legislation and implementation and opens the dialog between stakeholders to protect vulnerable consumers.


Baltic Region ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 149-167
Author(s):  
Boris B. Podgorny

Since 2019, the Kaliningrad Region has run a regional programme for digital transformation as part of the national initiative The Digital Economy of the Russian Federation. The programme seeks to improve the quality of life by creating information infrastructure and streamlining public administration. The regional Ministry of Digital Development has presented a report on programme implementation, which placed emphasis on economic performance. The study employed the questionnaire survey method to carry out a sociological analysis of the regional population as a participant in digital transformation. Quota sampling was used to select 384 respondents. Slightly over a half of the population had a positive attitude to digitalisation, and about 20 per cent believed that the digital economy led to the degradation of society. The development of a high-tech economy was named the main advantage of digitalisation and proliferation of digital surveillance, its distinct disadvantage. Kaliningraders reported heavy use of digital technology. Yet, the low indices of digital literacy and personal information protection raise concerns. The findings, which supplement the regional digitalisation report with sociological data, may help in planning and delivering activities within the regional digital transformation programme.


Author(s):  
Eko Wahyu Tyas Darmaningrat ◽  
Hanim Maria Astuti ◽  
Fadhila Alfi

Background: Teenagers in Indonesia have an open nature and satisfy their desire to exist by uploading photos or videos and writing posts on Instagram. The habit of uploading photos, videos, or writings containing their personal information can be dangerous and potentially cause user privacy problems. Several criminal cases caused by information misuse have occurred in Indonesia.Objective: This paper investigates information privacy concerns among Instagram users in Indonesia, more specifically amongst college students, the largest user group of Instagram in Indonesia.Methods: This study referred to the Internet Users' Information Privacy Concerns (IUIPC) method by collecting data through the distribution of online questionnaires and analyzed the data by using Structural Equation Modelling (SEM).Results: The research finding showed that even though students are mindful of the potential danger of information misuse in Instagram, it does not affect their intention to use Instagram. Other factors that influence Indonesian college students' trust are Instagram's reputation, the number of users who use Instagram, the ease of using Instagram, the skills and knowledge of Indonesian students about Instagram, and the privacy settings that Instagram has.Conclusion: The awareness and concern of Indonesian college students for information privacy will significantly influence the increased risk awareness of information privacy. However, the increase in risk awareness does not directly affect Indonesian college students' behavior to post their private information on Instagram.


2015 ◽  
Vol 4 (4) ◽  
pp. 47-58 ◽  
Author(s):  
Nico Martins ◽  
Adéle da Veiga

An information security culture is influenced by various factors, one being regulatory requirements. The United Kingdom (UK) has been regulated through the UK Data Protection Act since 1995, whereas South Africa (SA) only promulgated the Protection of Personal Information Act (PoPI) in 2013. Both laws stipulate requirements from an information security perspective with regard to the processing of personal information, however in the UK this has been regulated for a longer period. Consequently, it is to be expected that the information security culture for organisations in the UK will be significantly different from that of SA. This raises the question as to whether the same information security culture assessment (ISCA) instrument could be used in an organisation with offices in both jurisdictions, and whether it might be necessary to customise it according the particular country’s enforcement of information security and privacy-related conditions. This is reviewed, firstly from a theoretical perspective, and secondly a factorial invariance analysis was conducted in a multinational organisation with offices in both the UK and SA, using data from an ISCA questionnaire, to determine possible factorial invariances in terms of the ISCA.


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


Sign in / Sign up

Export Citation Format

Share Document