scholarly journals Privacy attitudes and behaviors in the age of post-privacy:

2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Nicolas Demertzis ◽  
Katerina Mandenaki ◽  
Charalambos Tsekeris

The digital world is a field of information and entertainment for users and a field of extraction of the most valuable good of recent years: personal data. How much of a threat to privacy is the collection and processing of data by third parties and what do people think about it? On the occasion of the extensive methods of surveilling citizens and collecting their data, this study attempts to contribute new empirical data evidence from the international research on the use of the Internet by the World Internet Project on attitudes and behaviors of individuals regarding online privacy and surveillance. The aim is to determine whether and to what extent the recorded concerns about the violation of privacy intersects with a growing acceptance of its very absence.

Author(s):  
Isao Okayasu ◽  
Chi-Ok Oh ◽  
Duarte B Morais

Running is one of the most popular activities in the world. Runners’ attitudes and behaviors vary depending on their running style. This study aims to construct different measures of running specialization based on the theory of specialization. This study also tests a runner’s stage of specialization segmentation based on recreation specialization and examines the predictive relationship between a runner’s specialization and event attachment. Three groups of sampling data assess the performance of diverse specialization measures for running in three marathon events. First, two surveys were conducted with marathon participants to assess the performance of diverse specialization measures for runners. Second, the third dataset was used to examine the relationship between a runner’s recreation specialization and event attachment.The study results showed that the 15 measures of specialization showed a good fit to the data. Our research showed how runners’ recreation specialization is connected to their event attachment. In addition, this study suggested event management for subdivisions of runners. Its practical implication is that recreation specialization for running can help us understand event attachment.


10.23856/4325 ◽  
2021 ◽  
Vol 43 (6) ◽  
pp. 198-203
Author(s):  
Oleksii Kostenko

The scale, speed and multi-vector development of science and technology are extremely effective in influencing legal, economic, political, spiritual, professional and other social relations. The development of information and communication technologies, the use of the Internet, the creation, storage, transmission, processing and management of information became the driving forces of the new scientific and technological revolution. This facilitates the introduction of technologies for the transmission and use of information in digital form in almost all spheres of public life, namely text data, photo, audio, video images, which are transmitted in various ways via the Internet and other systems and means of communication. One of the key elements of data transmission technologies and systems is the availability of information by which it is possible to identify their subjects and objects by their inherent identification attributes. In Ukrainian legislation, in particular in the Law of Ukraine «On Personal Data Protection», information or a set of information about an individual who is or can be identified specifically is defined as personal data. However, despite its modernity, this law still contains a number of shortcomings and uncertainties, both in terminology and in the legal mechanisms for working with data by which a person can be identified, i.e. identification data.


2020 ◽  
Vol 2 (1) ◽  
pp. 58-64
Author(s):  
I Komang Pasek Sudiarsa

Management of academic activities at Mahendradata University is still using manually ways, which means that it has not used an integrated information system yet, for the example the process of registering new students, arranging lecture schedules, filling in student KRS, managing lecture attendance, and managing student grades. Nowadays cultural changes have been marked by the increasingly rapid use of the internet. The internet as an information resources for its existence has now become a necessity. The benefits of the internet are quite large, especially in the world of business, entertainment and education. This system is designed to assist academic processes at the University of Mahendradata. The academic processes that have been analyzed and applied in this developed system are the process of preparing schedules, plotting teaching lecturers, printing KRS, printing lecture attendance, presenting inputs, filling in grades, and printing KHS. And the University can immediately develop a new system in order to work optimally. System design that has been used in developing this system uses the SDLC method, the waterfall method. The implementation of the system uses the PHP programming language Codegniter and MySQL database. The results of this study are in the form of an academic system design at the University of Mahendradata. This developed system is aim to assist the academic processes at the University of Mahendradata


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Author(s):  
Rian Septian Anwar ◽  
Nani Agustina

Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik.   Kata kunci: VPN, Jaringan, Open VPN-Acces Server.   Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected.   Keywords: VPN, Networking, Open VPN-Acces Server.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


2021 ◽  
pp. 111-120
Author(s):  
Rob Kitchin

This chapter charts the transition from an analogue to a digital world, its effect on data footprints and shadows, and the growth of data brokers and government use of data. The World Wide Web (WWW) started to change things by making information accessible across the Internet through an easy-to-use, intuitive graphical interface. Using the Internet, people started leaving digital traces. In their everyday lives, their digital shadows were also growing through the use of debit, credit, and store loyalty cards, and captured in government databases which were increasingly digital. Running tandem to the creation of digital lifestyles was the datafication of everyday life. This was evident in a paper which examined the various ways in which digital data was being generated and tracked using indexical codes about people, but also objects, transactions, interactions, and territories, and how these data were being used to govern people and manage organizations. Today, people live in a world of continuous data production, since smart systems generate data in real time.


The internet is now the main way in which information is obtained. Chapter 13 considers the internet from a legal perspective, focusing on information and its disclosure. It seeks to provide a non-technical description of the operation of the internet as exemplified by the world wide web. It discusses the use of the internet by bodies subject to the Freedom of Information Act 2000 and other statutes and outlines some of the pitfalls of such use. For instance, a publication of information on a website operated from England may expose the publisher to civil or criminal liability in any country of the world on the basis of the law of those countries. The chapter explains the meaning of cookies, cloud computing, hackers, crackers and viruses. and discusses the problems of determining jurisdiction and seeking enforcement.


Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


Sign in / Sign up

Export Citation Format

Share Document