scholarly journals An Investigation of User Privacy and Data Protection on User-Side Storage

Author(s):  
Thamer Al-rousan

Along with the introduction of HTML5, a new user storage technologies; particularly, Web SQL Database, Web Storage, and Indexed Database API have emerged. The common goal of these storage technologies is to overcome the limitations of legacy of user-side storage mechanisms. All these technologies have many privacy and security concerns, and the main threat is user tracking. In this context, this study investigates the usage of these technologies and to find out which one of these technologies is primarily used by user trackers, and to calculate their frequency in context of 3rd-party tracking code. The result exposes that the adoption of Web Storage most commonly used amongst the three storage technologies. Motivated by the investigation results, this study examines the degree of protection which the popular web browsers supply to prevent privacy violations. The result reveals that the protection mechanisms that are provided by web browsers are almost the same, and in many occasions privacy violations do exist

Author(s):  
Alexandros Papanikolaou ◽  
Vasileios Vlachos ◽  
Periklis Chatzimisios ◽  
Christos Ilioudis

The inherent human need for communication and socialization is the reason for the ever-increasing use of social networking services. Social networks are a very powerful communications tool that also has the ability of aggregating large volumes of information. However, if this user-related information is exploited in certain ways, it can have harmful consequences on user privacy. This chapter defines what privacy is in the context of social networks, demonstrates how user privacy can be violated, and supports these claims with examples of real incidents. Furthermore, it presents various countermeasures, as well as directions for future research with the common goal of the protection of user privacy.


2020 ◽  
Vol 2 (2) ◽  
pp. 146-164
Author(s):  
Bian Lirong ◽  
Jia Linxiang

Author(s):  
Paolo Giamundo

Background: Minimally-invasive treatments for hemorrhoids should be encouraged as they cause low morbidity, reasonable discomfort and quicker return to work. According to the “vascular theory” hemorrhoidal disease is mainly caused by blood overflow into hemorrhoidal plexus deriving from the superior hemorrhoidal arteries. Introduction: Many different procedures have been described in the literature with the common goal of reducing the blood flow into the hemorrhoidal piles. ‘HeLP’ (Hemorrhoids Laser Procedure) is a novel form of dearterialization to treat patients suffering from symptomatic hemorrhoids. Methods: The procedure consists of the closure of the terminal branches of the superior rectal artery approximately 2-3 cm above the dentate line by means of laser shots originated by a diode laser platform. The arteries, at that level, have variable location and distribution. Therefore, a doppler probe set at the frequency of 20MHz helps identifying the arteries that would be missed otherwise. The laser beam is well tolerated by patients. For this reason, anesthesia is not required in most cases and the procedure allows a quick return to daily activities. In case of concomitant severe mucosal prolapse, the laser treatment can be combined with suture mucopexy. Three to six running sutures allow a complete lifting of hemorrhoidal piles, securing long-term resolution of symptoms. Results and Conclusions: ‘HeLP’ is indicated in patients with symptomatic hemorrhoids where conservative treatment failed and when mucosal prolapse is scarce or not symptomatic. The addition of mucopexy to laser treatment (HeLPexx) contributes to overall resolution of symptoms when mucosal prolapse is an issue, Emborrhoid is another novel, ‘hi-tech’ form of selective dearterialization used in selected case of hemorrhoids where main symptom is bleeding. It is generally used in cases where surgery is contraindicated due to severe concomitant diseases.


Author(s):  
Rosalia Gonzales ◽  
Travis Mathewson ◽  
Jefferson Chin ◽  
Holly McKeith ◽  
Lane Milde ◽  
...  

Since the advent of modern-day screening collections in the early 2000s, various aspects of our knowledge of good handling practices have continued to evolve. Some early practices, however, continue to prevail due to the absence of defining data that would bust the myths of tradition. The lack of defining data leads to a gap between plate-based screeners, on the one hand, and compound sample handling groups, on the other, with the latter being the default party to blame when an assay goes awry. In this paper, we highlight recommended practices that ensure sample integrity and present myth busting data that can help determine the root cause of an assay gone bad. We show how a strong and collaborative relationship between screening and sample handling groups is the better state that leads to the accomplishment of the common goal of finding breakthrough medicines.


Author(s):  
I. A. Shapoval ◽  

The paper presents the interdisciplinary analysis of the determinants of the system of self-communication discourse and internal dialogue as the forms of objectivation of human mental content focused on some actions for meeting some objectives. The author describes discourse as integration of communication and language processes in self-understanding and personal identity. Contextually determined and dynamic self-communication discourse, as a way of acquirement of new senses and confirmation of old ones, verbalizes current personal values. The study results reveal the characteristics and relations of the internal dialogue discourse determinants within the human objectivity–subjectivity continuum. Discourse determinants prescribe its context and rules and include the prototype place and agents with their motives and objectives. Self-positions manifested in Self and Non-Self (Other Self) binary self-predications form the core pair of agents. The modality of a person’s attitude to own Self-positions makes their communications a dialogue or a monologue on the boundary of their sub-territories as a discourse prototype place. The degree of discourse agency, its closeness within the prototype place, or transgression openness depends on the complexity and differentiation of Self-concept and ego boundaries functionality. The frustration of meta-necessity to keep self-confidence and self-acceptance by reassessment and reformation of interrelations of Self-positions determines the motives and objectives of self-communication. The common goal of self-organization is implemented through the internal dialogue in the form of institutionalization, verification, and integration of their Self-predications. Status-role characteristics of agents and functionality of discourse prototype place determine the specificity of its motives and objectives according to the systemic effects of Self-organization.


Author(s):  
Alla M. Shustova ◽  

The article is dedicated for the 85th anniversary of His Holiness Dalai Lama the 14th Tenzin Gyatso and considers his contribution to establishing the dialogue between academic research and spirituality. It depicts main points of Dalai Lama’s way in science, the results of which he described in his book ‘The Universe in a Single Atom. How Science and Spirituality Can Serve Our World’. In this book His Holiness tried to explain the possibility of reaching a unified vision of the world, based not only on science but also on spirituality. Dalai Lama is sure of the necessity of the dialogue between science and Buddhism; he believes that there are certain points, where science and Buddhist philosophy come very close to each other, and may form a good base for such a dialogue. It is for example non-theistic character of both science and Buddhism, the similarity of their methods of cognition, along with the common goal of attaining the truth. Dalai Lama raises one important question: Should there be a place for ethics in science? Giving the positive answer, he then proves it expressly. For several decades Dalai Lama has been undertaking active efforts to facilitate the dialogue between science and spirituality. Recently Russian scholars have also joined this process. By Dalai Lama’s initiative two big conferences were held under the aegis of the program “Fundamental knowledge: dialogues of Russian and Buddhist scholars”. As a result of these meetings the joint Russian and Buddhist research center was organized in South India to study the altered states of conciseness, basing on various types of Buddhist meditation.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Author(s):  
Mohammed Nasser Al-Suqri ◽  
Salim Said AlKindi ◽  
Naifa Eid Saleem

Author(s):  
P. Balathandayutham ◽  
V. Muralidharan

The concept of management refers to the process to plan, to organize, to staff, to direct and to control the activities in any organization for achieving the common goal in a very systematic manner. Further, the term management refers to both a method of science art to empower individuals and to make an institution more efficient and effective when compared to the state without the manager and the management. As a process of the institution, the management lies amidst the policy formation for and the actual control and command of the forces in the military sector. management covers elements like management of the resources of sector, management of the personnel in the field and acquisition management.


Author(s):  
Prajit Kumar Das ◽  
Dibyajyoti Ghosh ◽  
Pramod Jagtap ◽  
Anupam Joshi ◽  
Tim Finin

Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling dynamic context sharing on mobile platforms have led to the emergence of a new class of mobile applications that can access and share embedded sensor and context data. Most of the time such data is used for providing tailored services to the user but it can lead to serious breaches of privacy. We use Semantic Web technologies to create a rich notion of context. We also discuss challenges for context aware mobile platforms and present approaches to manage data flow on these devices using semantically rich fine-grained context-based policies that allow users to define their privacy and security need using tools we provide.


Sign in / Sign up

Export Citation Format

Share Document