Safety Measures for Social Computing in Wiki Learning Environment

2012 ◽  
Vol 6 (2) ◽  
pp. 1-15 ◽  
Author(s):  
Ahmed Patel ◽  
Mona Taghavi ◽  
Joaquim Celestino Júnior ◽  
Rodziah Latih ◽  
Abdullah Mohd Zin

Wikis are social networking systems that allow users to freely intermingle at different levels of communication such as collaborative learning, chatting, and group communications. Although a great idea and goal, it’s particularly vulnerable due to its features of open medium and lack of clear plan of defense. Personal data can be misused for virtual insulting, resulting in misuse of personal information for financial gains or creating misuses. Wikis are an example of social computing of collaborative learning, joint editing, brain storming, and virtual socializing, which is a ripe environment for hacking, deception, abuse, and misuse. Thus, wiki needs comprehensive security measures which include privacy, trust, security, audit, and digital forensics to protect users and system resources. This paper identifies and explores the needs of secure social computing and supporting information systems as places for interaction, data collection, and manipulation for wikis. It does this by reviewing the literature and related works in proposing a safety measure framework for a secure and trustworthy medium together with privacy, audit, and digital forensic investigative functions in wiki environments. These then can aid design and usage in social computing environments with the proviso to give comfort and confidence to users without worrying about abuse and cybercrime perpetrated activities.

2019 ◽  
pp. 146-164
Author(s):  
Christopher Millard

This chapter brings a legal perspective to bear on the topic of data protection on the contemporary Internet in which personal information is increasingly stored and processed in, and accessed from, “the cloud.” The reliance of ever more apps, websites, and services on cloud providers contrasts with earlier days of the Internet in which much more data was stored locally on personal computers. At a time when there is ever more use of cloud computing, this chapter illuminates the complexities over what information in cloud computing environments is protected as personal data, and who is responsible. Will data protection laws, such as those in the EU, protect us, or are there alternative approaches to providing effective protection for personal data in clouds? This chapter airs the question of whether a greater focus should be placed on localizing personal data, as advocated by the Internet pioneer, Tim Berners-Lee.


Threats involve various risks and threats are associated with the embedded SIM technology, for instance, the Internet of things (IoT) identity. IoT refers to the working capabilities enabling the allocation of unique identifiers (UID) to effectively connect with the related devices thus enhancing communication. An e-SIM application cannot produce reliable and actual data used to obtain the subscriber’s anticipated outcome. The SIM technology does not provide some reliable data that can be employed by the user to formulate some serious productive outcomes. Failure by the technology to process and automatically provide the user with the notification suppose of any infringement or hacking. SIM-jacking is the other notable threats facing the embedded universal integrated connectivity card (e-UICC). Incompetent Log Rhythm Al Engine influences the fraudster hacking experience due to failure protections within the operational surrounding. The e-SIM technology system lacks timely threat, risk, and other various vital operations predictability to react to the experienced unbearable operations challenges induced by the fraudsters. Similarly, the embedded SIM incurs the insider threats whereby the service providers fail to secure the much-needed privacy concerning an individual’s vital information. The situations of personal data leakage are witnessed within the system operations.The e-SIM hijacking enables the fraudsters to secretly obtain the victim’s vital data of the subscriber, hijack, and receive the information intended to the individual to his/her personal phone. The process results to complete mobile account operations by the hacker resulting to further access to the victim’s bank information and transfer of cash. The other threat experienced by e-SIM users is the provision of false information. The SIM subscribers normally fall into traps of the fraudsters by receiving short messages (SMS) citing assistance kind of news from the service providers, thus drawing the victim’s bank amount. Identity fraud and device poisoning are other additional threats encountered in the application of e-SIM. Generally, the entire process of fraud invasion and victimization influence the victim’s business decisions of the affected individuals. Protections focuses on the embedded SIM provides greater security in addition to a re-programmable technological system, unlike the physical SIM card. The subscriber's personal information is not contained within the e-SIM but with the service providers, thus enhancing its effectiveness. An e-SIM enables the consumers to effectively shift carriers between the T-Mobile and Sprint without physical movement, thus supportive of security systems. Despite the security measures put into place, e-SIM like any other SIM card experiences information theft. Therefore, the service providers should encounter the emerging fraudster effects by proper monitoring of the network system to enable security restrictions. The system should induce strict conditions that enable the evaluation and differentiation between the IoT and the non-IoT devices during their operation.


2021 ◽  
pp. 104-118
Author(s):  
Ya. O. Talyzina ◽  
I. A. Titko

The article highlights the problem of practical implementation of such a security measure that can be applied to participants in criminal proceedings, such as ensuring the confidentiality of personal information. It is analyzed the views diversity of investigators, prosecutors, judges and lawyers on the algorithm of application of ensuring the personal data confidentiality, on the issue of storage of resolutions (decisions) on the application of this security measure in criminal proceedings. The practice of conducting procedural actions in court with persons whose personal data have been changed is studied separately. The peculiarities of interrogation, identification with protected participants of criminal proceedings in the mode of videoconference and in a closed court session are studied. Previous attempts to solve this problem by developing a Model Instruction on conducting court proceedings with witnesses, victims and other participants in criminal proceedings, in respect of whom security measures have been taken, are considered. According to the analysis results of the domestic legislation on security of participants in criminal proceedings and identification of gaps, after conducting a survey of current investigators, prosecutors, judges and lawyers, the generalization of modern practice of criminal proceedings with the participation of protected persons is made. The purpose of this research is to formulate proposals for a unified and mandatory for all participants in criminal proceedings procedure for working with persons whose personal data are changed for security purposes at all stages of criminal proceedings.   The expediency of enshrining at the bylaw level in a separate normative legal act an algorithm for carrying out procedural actions in court with participants in criminal proceedings, which would meet the requirements of current legislation, including the provisions of the Data Summary constituting a state secret, is substantiated.


2021 ◽  
Vol 21 (1) ◽  
pp. 1-24
Author(s):  
Tanusree Sharma ◽  
Hunter A. Dyer ◽  
Masooda. Bashir

Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. Several types of COVID-19 apps have enabled healthcare professionals and governments to communicate with the public regarding the pandemic spread, coronavirus awareness, and self-quarantine measures. While these apps provide immense benefits for the containment of the spread, privacy and security of these digital tracing apps are at the center of public debate. To address this gap, we conducted an online survey of a midwestern region in the United State to assess people’s attitudes toward such apps and to examine their privacy and security concerns and preferences. Survey results from 1,550 participants indicate that privacy/security protections and trust play a vital role in people’s adoption of such apps. Furthermore, results reflect users’ preferences wanting to have control over their personal information and transparency on how their data is handled. In addition, personal data protection priorities selected by the participants were surprising and yet revealing of the disconnect between technologists and users. In this article, we present our detailed survey results as well as design guidelines for app developers to develop innovative human-centered technologies that are not only functional but also respectful of social norms and protections of civil liberties. Our study examines users’ preferences for COVID-19 apps and integrates important factors of trust, willingness, and preferences in the context of app development. Through our research findings, we suggest mechanisms for designing inclusive apps’ privacy and security measures that can be put into practice for healthcare-related apps, so that timely adoption is made possible.


Author(s):  
O. Maistrenko ◽  
M. Petrushenko ◽  
S. Nikul ◽  
Y. Sinilo

The article analyzes the possible risks that can arise when firing artillery and rocket launches. The disadvantages of the method of calculating the protection zones are identified, which taking into account will reduce the likelihood of the occurrence of abnormal situations, which can lead to tragic consequences and damage to objects adjacent to the boundary of the testing ground. Additions to the procedure for determining the protection zones of the test site in the interests of RVIA are proposed and the specified, correct sizes of these zones are provided. Development of rocket troops and artillery (RTaA) of the Armed Forces (AF) of Ukraine is impossible without a permanent improvement and modernisation of types of armament and ammunition to them, development of the new artillery systems and their ground tests. During realization of ground tests of types of armament and military technique (WME) of RTaA firing of artillery and starting of rockets is accompanied by errors or wrong acts of WME attendant and personnel or extraneous persons, the consequences of that must be envisaged, and the risk of their origin is Analysis of the battle firing, including during realization of anti-terror operation and operation of the incorporated forces on east of Ukraine row of ground tests of standards of WME RTaA test if possibility of origin of nonpermanent near-accidents during application of armament of RtaA as a result of rejection of trajectory of flight of projectile (mines) by the direction and distance from the expected targets. Mostly it happens through untaking into account of maximal rejections of meteorological and ballistic terms of firing from tabular or errors in calculations, wrong acquisition of charge, error at aiming of fighting machines, cannons, mortars. There for practice of the battle firing needs taking into account of these errors, that will give an opportunity consider ably to promo test rength security at application of armament of RAaT during testing of standards of WME. Thus, in the article certainly and possible risks that can arise up during realization of firing of artillery and starting of rockets are analysed, related to the lacks of existent methodology of realization of calculations in relation to providing of safety measures during the tests of WME RtaA. Suggestions are brought in, in relation to the improvement of methodology of realization of calculations of sizes of protective zones, that unlike existing more in detail take into account maximal deviations of terms of firing from tabular values. These suggestions for providing of safety measures it will be allowed to decrease probability of origin of situations, that can result in tragic consequences and to causing of damages to the objects that fit closely to the limits of training field. Anoffer adding to the order of determination of protective zones and given specified sizes of the sezones have an important practical value at determination of possibilities of grounds and providing of safety of testing and battle firing (starting) of RtaA.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


Author(s):  
Sami M. Fawzy ◽  
Tarek M. Esmael ◽  
Hany Hosny ◽  
Abdulmajeed Al Amri ◽  
Khalid Al Malki ◽  
...  

Progress in deciding the opinion of head-teachers on the instructional and logistical characteristics needed for a fundamental cardiopulmonary resuscitation (b-CPR) program for adolescents in secondary school. The purpose of the thesis is to explore the level of educators' preparation to cope with life-threatening circumstances. This paper aims to determine the connection between the score of the instructor to the questions drawn up and their knowledge of BSL. And we have studied the participants' student conduct without any impact on their behaviour. Teachers from chosen primary schools are the partners. There will also be a record of population characteristics. There will be registered personal data and documents. Some of the information involves the compilation of gender, gender, degree of education and weight data using survey questions. A high degree of secrecy would be ensured through this study. In addition, all information from the participants will be collected voluntarily. The educators would be allowed to have an answer to all the questions. The primary aim of the research is to raise awareness of the importance of critical support for life in schools. At the beginning of each academic year, this study is proposed to create a compulsory training session for teachers, and the outcome is gathered using survey questions to produce using personal information and data such as sex, gender, level of education and weight details.


Sign in / Sign up

Export Citation Format

Share Document