scholarly journals Security and Privacy Concerns in Wireless Networks - A Survey

Author(s):  
Yong Weixiong ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>

2020 ◽  
Author(s):  
Yong Weixiong ◽  
Robin Lee ◽  
Alvin Kon Soon Seng ◽  
Fatima tuz Zahra

<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>


2019 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Matteo La Torre ◽  
Vida Lucia Botes ◽  
John Dumay ◽  
Elza Odendaal

Purpose Privacy concerns and data security are changing the risks for businesses and organisations. This indicates that the accountability of all governance participants changes. This paper aims to investigate the role of external auditors within data protection practices and how their role is evolving due to the current digital ecosystem. Design/methodology/approach By surveying the literature, the authors embrace a practice-oriented perspective to explain how data protection practices emerge, exist and occur and examine the auditors’ position within data protection. Findings Auditors need to align their tasks to the purpose of data protection practices. Accordingly, in accessing and using data, auditors are required to engage moral judgements and follow ethical principles that go beyond their legal responsibility. Simultaneously, their accountability extends to data protection ends for instilling confidence that security risks are properly managed. Due to the changing technological conditions under, which auditors operate, the traditional auditors’ task of hearing and verifying extend to new phenomena that create risks for businesses. Thus, within data protection practices, auditors have the accountability to keep interested parties informed about data security and privacy risks, continue to transmit signals to users and instill confidence in businesses. Research limitations/implications The normative level of the study is a research limitation, which calls for future empirical research on how Big Data and data protection is reshaping accounting and auditing practices. Practical implications This paper provides auditing standard setters and practitioners with insights into the redefinitions of auditing practices in the era of Big Data. Social implications Recent privacy concerns at Facebook have sent warning signals across the world about the risks posed by in Big Data systems in terms of privacy, to those charged with governance of organisations. Auditors need to understand these privacy issues to better serve their clients. Originality/value This paper contributes to triggering discussions and future research on data protection and privacy in accounting and auditing research, which is an emerging, yet unresearched topic.


2013 ◽  
Vol 21 (2) ◽  
pp. 72-95 ◽  
Author(s):  
Aries Susanto ◽  
Hwansoo Lee ◽  
Hangjung Zo ◽  
Andrew P. Ciganek

Internet banking is a prominent example of Internet-based applications. Previous research has found that satisfaction, trust, commitment, and loyalty are important factors for Internet banking success. Resistance to adopt Internet banking is often attributed to the role of trust, security, and privacy in e-commerce systems. This study proposes a framework to examine behaviors toward Internet banking services in Indonesia and South Korea. A research model was empirically tested with data captured in a large-scale study. The results show that Indonesians’ use of Internet banking is strongly influenced by perceived security, while Koreans use of Internet banking is strongly influenced by privacy concerns. Trust and user satisfaction have a greater influence on loyalty for Indonesians while commitment has a greater influence on loyalty for Koreans. The study develops related conclusions including a discussion of the research implications.


2016 ◽  
pp. 379-402 ◽  
Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


2018 ◽  
Vol 18 (1) ◽  
pp. 28-34 ◽  
Author(s):  
Josephine Bailey

AbstractAgainst a backdrop of increasing data security and privacy concerns, current data protection law will soon be overhauled by the General Data Protection Regulation (GDPR). Previous research has indicated a lack of data protection management in libraries, however, it has been nine years since the latest study. This article by Josephine Bailey aims to provide an updated review of the extent of data protection management in UK library and information services and gauge preparation for the incoming GDPR.


Author(s):  
Scott Amyx

This chapter identifies concerns about, and the managerial implications of, data privacy issues related to wearables and the IoT; it also offers some enterprise solutions to the complex concerns arising from the aggregation of the massive amounts of data derived from wearables and IoT devices. Consumer and employee privacy concerns are elucidated, as are the problems facing managers as data management and security become an important part of business operations. The author provides insight into how companies are currently managing data as well as some issues related to data security and privacy. A number of suggestions for improving the approach to data protection and addressing concerns about privacy are included. This chapter also examines trending issues in the areas of data protection and the IoT, and contains thought-provoking discussion questions pertaining to business, wearables/IoT data, and privacy issues.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2021 ◽  
Author(s):  
Ayan Chatterjee ◽  
Andreas Prinz

UNSTRUCTURED The Internet of Medical Things (IoMT) combines medical devices and applications connected to healthcare information technology systems using network technologies. With the flourishing adaptation rate of Internet-enabled medical devices in healthcare applications, we need to guarantee the security and privacy of electronic health records (EHRs) and communications among these IoMT devices, exposed web services, and the underlying infrastructure. This research is a proof-of-concept (PoC) study for implementing an integrated security solution with Spring Security and KeyCloak open-access platform (SSK) to safeguard microservice architecture application programming interfaces (APIs). Subsequently, we extended the security solution with a virtual private network (VPN), Bcrypt hash, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure following the Norwegian data protection policies and General Data Protection Regulation (GDPR). In this study, we have not proposed any new security solution; however, we have focused on accomplishing a hybrid security solution based on the established frameworks (e.g., Spring Security) and open-access software product (e.g., Keycloak) to protect microservice APIs for a health eCoach system as a PoC study. This study describes the methodological, technical, and practical considerations to protect REST interfaces only and ensuring the privacy of data in the system. We validate our SSK security implementation by theoretical evaluation and experimental testing. In addition, we compare the test results with related studies qualitatively to determine the effectiveness of the hybrid security solution (SSK).


Sign in / Sign up

Export Citation Format

Share Document