Legal Issues

Author(s):  
Brian Leonard ◽  
Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant past, cyber security has become a forefront subject in the battle against global terrorism. Furthermore, this chapter will examine how mobile devices are not like the devices of the past as the computing power is on par with that of some desktops and the fact that these devices have the ability to execute malicious applications. In addition, this chapter will discuss the reality, significance, legal and practical affects of the fact that suspicious programs are being executed offensively and security based attacks can be performed as well with the use of programs such as Kali Linux running on Android.

2018 ◽  
pp. 1352-1361
Author(s):  
Brian Leonard ◽  
Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so distant past, cyber security has become a forefront subject in the battle against global terrorism. Furthermore, this chapter will examine how mobile devices are not like the devices of the past as the computing power is on par with that of some desktops and the fact that these devices have the ability to execute malicious applications. In addition, this chapter will discuss the reality, significance, legal and practical affects of the fact that suspicious programs are being executed offensively and security based attacks can be performed as well with the use of programs such as Kali Linux running on Android.


Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


2016 ◽  
Vol 24 (1) ◽  
pp. 93-115 ◽  
Author(s):  
Xiaoying Yu ◽  
Qi Liao

Purpose – Passwords have been designed to protect individual privacy and security and widely used in almost every area of our life. The strength of passwords is therefore critical to the security of our systems. However, due to the explosion of user accounts and increasing complexity of password rules, users are struggling to find ways to make up sufficiently secure yet easy-to-remember passwords. This paper aims to investigate whether there are repetitive patterns when users choose passwords and how such behaviors may affect us to rethink password security policy. Design/methodology/approach – The authors develop a model to formalize the password repetitive problem and design efficient algorithms to analyze the repeat patterns. To help security practitioners to analyze patterns, the authors design and implement a lightweight, Web-based visualization tool for interactive exploration of password data. Findings – Through case studies on a real-world leaked password data set, the authors demonstrate how the tool can be used to identify various interesting patterns, e.g. shorter substrings of the same type used to make up longer strings, which are then repeated to make up the final passwords, suggesting that the length requirement of password policy does not necessarily increase security. Originality/value – The contributions of this study are two-fold. First, the authors formalize the problem of password repetitive patterns by considering both short and long substrings and in both directions, which have not yet been considered in past. Efficient algorithms are developed and implemented that can analyze various repeat patterns quickly even in large data set. Second, the authors design and implement four novel visualization views that are particularly useful for exploration of password repeat patterns, i.e. the character frequency charts view, the short repeat heatmap view, the long repeat parallel coordinates view and the repeat word cloud view.


2021 ◽  
Author(s):  
Paul M. Garrett ◽  
Yuwen Wang ◽  
Joshua P. White ◽  
Yoshihisa Kashima ◽  
Simon Dennis ◽  
...  

BACKGROUND Governments worldwide have introduced COVID-19 tracing technologies. Taiwan, a world leader in controlling the virus’ spread, has introduced the Taiwan ‘Social Distancing App’ to facilitate COVID-19 contact tracing. However, for these technologies to be effective, they must be accepted and used by the public. OBJECTIVE Our study aimed to determine public acceptance for three hypothetical tracing technologies: a centralized Government App, a decentralized Bluetooth App (e.g., Taiwan’s Social Distancing App), and a Telecommunication tracing technology; and model what factors contributed to their acceptance. METHODS Four nationally representative surveys were conducted in April 2020 sampling 6,000 Taiwanese residents. Perceptions and impacts of COVID-19, government effectiveness, worldviews, and attitudes towards and acceptance of one-of-three hypothetical tracing technologies were assessed. RESULTS Technology acceptance was high across all hypothetical technologies (67% - 73%) and improved with additional privacy measures (82% - 88%). Bayesian modelling (using 95% highest density credible intervals) showed data sensitivity and perceived poor COVID-19 policy compliance inhibited technology acceptance. By contrast, technology benefits (e.g., returning to activities, reducing virus spread, lowering the likelihood of infection), higher education, and perceived technology privacy, security, and trust, were all contributing factors to overall acceptance. Bayesian ordinal probit models revealed higher COVID-19 concern for other people than for one’s self. CONCLUSIONS Taiwan is currently using a range of technologies to minimize the spread of COVID-19 as the country returns to normal economic and social activities. We observed high acceptance for COVID-19 tracing technologies among the Taiwanese public, a promising and necessary finding for the successful introduction of Taiwan’s new ‘Social Distancing App’. Policy makers may capitalize on this acceptance by focusing attention towards the App’s benefits, privacy and security measures, making the App’s privacy measures transparent to the public, and emphasizing App uptake and compliance among the public. CLINICALTRIAL Not applicable.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3801-3808

‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..


Author(s):  
Irina Tatomur

Introduction. With the rapid adoption of computer and networking technologies, educational institutions pay insufficient attention to the implementation of security measures to ensure the confidentiality, integrity and accessibility of data, and thus fall prey to cyber-attacks. Methods. The following methods were used in the process of writing the article: methods of generalization, analogy and logical analysis to determine and structure the motives for phishing attacks, ways to detect and prevent them; statistical analysis of data – to build a chronological sample of the world's largest cyber incidents and determine the economic losses suffered by educational institutions; graphical method – for visual presentation of results; abstraction and generalization – to make recommendations that would help reduce the number of cyber scams. Results. The article shows what role cyber security plays in counteracting phishing scams in the educational field. The motives for the implementation of phishing attacks, as well as methods for detecting and preventing them, have been identified and regulated. The following notions as "phishing", "submarine" and "whaling" are evaluated as the most dangerous types of fraud, targeting both small and large players in the information chain of any educational institution. An analytical review of the educational services market was conducted and a chronological sampling of the largest cyber incidents that occurred in the period 2010-2019 was made. The economic losses incurred by colleges, research institutions and leading universities in the world were described. It has been proven that the US and UK educational institutions have been the most attacked by attackers, somewhat inferior to Canada and countries in the Asia-Pacific region. It is found that education has become the top industry in terms of the number of Trojans detected on devices belonging to educational institutions and the second most listed among the most affected by the ransomware. A number of measures have been proposed to help reduce the number of cyber incidents. Discussion. The obtained results should be taken into account when formulating a strategy for the development of educational institutions, as well as raising the level of awareness of the representatives of the academic community in cybersecurity. Keywords: phishing, cyber security, cyber stalkers, insider threat, rootkit, backdoor.


2014 ◽  
Vol 31 (5) ◽  
pp. 14-16 ◽  
Author(s):  
Dheeraj Singh Negi

Purpose – The purpose of this paper is to describe the use of mobile technologies to develop new ways of Libraries and Information Centre. Mobile devices help to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. The resources below should help libraries begin to plan and implement their own unique mobile presence: analyzing the present usage of mobile devices; providing an overview of devices, providers and features; describing the various activities these devices support for well library use; focusing how libraries and our librarians are responding with services tailored for these devices; and what can be done by libraries in future in this respect”. Design/methodology/approach – Information and Communications Technology continues to expand the boundaries of higher education into the “anytime/anywhere” experiences. Mobile communication is transforming how people search, receive and interact with information on a daily basis. In just a few short years, smart phone ownership has skyrocketed, and popular use of e-readers has been steadily on the rise. These advanced mobile tools provide portable access to the world of information, across boundaries of subject, discipline and industry. Findings – Mobile technology holds great promise for enabling libraries to provide enhanced services in a form users increasingly are demanding. If this promise is to be fully realized, however, libraries will need to conduct analyses and make smart decisions to address the issues outlined above, support staff education and explore partnerships and new funding models, and be prepared to compromise with respect to their traditional information delivery models. Originality/value – The explosion of advanced mobile technology and robust digital information collection capabilities should prompt libraries to examine carefully the ramifications for user privacy. Libraries can maintain their commitment to user privacy without overcompensating by imposing burdensome security measures or annoying interruptions. For example, libraries do not have to show users a privacy statement or security warning every time they want to access information on a mobile device. A single log-in and acceptance of terms of use, similar to the procedures for other mobile applications and services, should suffice. At the same time, libraries can take the opportunity to educate users in best practices with respect to privacy issues associated with the use of mobile devices.


Sign in / Sign up

Export Citation Format

Share Document