scholarly journals The Challenges of Effectively Anonymizing Network Data

Author(s):  
Ch. Himabindu

The availability of realistic network data plays a significant role in fostering collaboration and ensuring U.S. technical leadership in network security research. Unfortunately, a host of technical, legal, policy, and privacy issues limit the ability of operators to produce datasets for information security testing. In an effort to help overcome these limitations, several data collection efforts (e.g., CRAWDAD[14], PREDICT [34]) have been established in the past few years. The key principle used in all of these efforts to assure low-risk, high-value data is that of trace anonymization—the process of sanitizing data before release so that potentially sensitive information cannot be extracted.

Author(s):  
Lech J. Janczewski ◽  
Victor Portougal

Developments in multimedia technology and networking offer organizations new and more effective ways of conducting their businesses. That includes intensification of external contacts. Barriers between different organizations are becoming less visible. The progress gives advantages to competing forces, as well. In the past, an organization was directly exposed to competition only within its own region. Now, due to easy communications, a competitor could be located on the opposite side of the globe, having the ability to access or even disrupt the most sensitive information of a competing company. Hackers and other cyber-criminals are another part of the external threat.


2019 ◽  
Vol Special Issue ◽  
pp. 105-118
Author(s):  
Bernard Wiśniewski

This article presents basic issues concerning security research in the past, called reaching the origins of security. Reaching the origins is not a concept that finds its rightful place in security research. It has been used and thus fixed permanently in other areas, therefore, the issues discussed in this article concern problems from many fields of knowledge. Security testing covers a number of processes, including retrospective ones, the essence of which is a scientific look into the past. Reaching the origins, all in all, makes it possible to identify the sources of danger and the requirements to be met for safety to reach an acceptable level. It allows, on the one hand, to prevent the recurrence of these sources and, on the other hand, to apply the solutions of the past to today's and tomorrow's security efforts. It can also be said that reaching the origins of safety is connected with determining the methods of eliminating and minimizing threats, and thus indicating the procedures providing an appropraite level of security. It's a utilitarian effect. In the cognitive context, it should be emphasized that the results of reaching the origins may serve to enrich the contemporary knowledge in the field of security. In both cases the procedures of avoiding mistakes made in the past are going to be worked out, especially that their sources are usually human mistakes having their origins in the lack of knowledge of past times. The considerations presented in the article allowed to determine the meaning of reaching the origins, its types and mutual relations between it and the diagnosis, monitoring and forecasting of security. In conclusion, the presented deliberations are summarized.


Author(s):  
Disha Satyan Dahanukar ◽  
Durva Sanjay Shelke

With the explosively growing internet that has been merging with our lives for the past few decades, data and network security has been of utmost importance as society moves towards the age of digital information. As the number of users connected to the web increases, the threat faced by the network because of attackers also increases. Cryptography, the science of information security derived from the inherent needs of humans to converse and share information or communicate selectively at times, has the primary function of sending correct data over the network without any undesirable modifications. In cryptography, the original message is masked or encrypted by the sender and has to be decoded or decrypted by the receiver using a predefined set of algorithms decided before the commencement of the data transmission. Thereby, successfully avoiding redundant people from accessing or understanding the message as it is converted to content unreadable by the human eye.


2012 ◽  
Vol 153 (43) ◽  
pp. 1692-1700
Author(s):  
Viktória Szűcs ◽  
Erzsébet Szabó ◽  
Diána Bánáti

Results of the food consumption surveys are utilized in many areas, such as for example risk assessment, cognition of consumer trends, health education and planning of prevention projects. Standardization of national consumption data for international comparison is an important task. The intention work began in the 1970s. Because of the widespread utilization of food consumption data, many international projects have been done with the aim of their harmonization. The present study shows data collection methods for groups of the food consumption data, their utilization, furthermore, the stations of the international harmonization works in details. The authors underline that for the application of the food consumption data on the international level, it is crucial to harmonize the surveys’ parameters (e.g. time of data collection, method, number of participants, number of the analysed days and the age groups). For this purpose the efforts of the EU menu project, started in 2012, are promising. Orv. Hetil., 2012, 153, 1692–1700.


Author(s):  
Tracy Spencer ◽  
Linnea Rademaker ◽  
Peter Williams ◽  
Cynthia Loubier

The authors discuss the use of online, asynchronous data collection in qualitative research. Online interviews can be a valuable way to increase access to marginalized participants, including those with time, distance, or privacy issues that prevent them from participating in face-to-face interviews. The resulting greater participant pool can increase the rigor and validity of research outcomes. The authors also address issues with conducting in-depth asynchronous interviews such as are needed in phenomenology. Advice from the field is provided for rigorous implementation of this data collection strategy. The authors include extensive excerpts from two studies using online, asynchronous data collection.


2020 ◽  
pp. 027347532096050
Author(s):  
Eileen Bridges

This article looks back over the past two decades to describe how teaching of undergraduate marketing research has (or has not) changed. Sweeping changes in technology and society have certainly affected how marketing research is designed and implemented—but how has this affected teaching of this important topic? Although the purpose of marketing research is still to better understand target customer needs, the tools are different now: customer data are typically collected using technology-based interfaces in place of such instruments as mailed, telephone, or in-person surveys. Observational techniques collect more data electronically rather than requiring a human recorder. Similarly, sampling has changed: sample frames are no longer widely used. Many of these changes are not yet fully discussed in marketing research courses. On the other hand, there is increasing interest in and availability of courses and programs in marketing data analytics, which teach specialized skills related to analysis and interpretation of electronic databases. Perhaps even more importantly, new technology-based tools permit greater automation of data collection and analysis, and presentation of findings. A critical gap is identified in this article; specifically, effort is needed to better integrate the perspectives of data collection and data analysis given current research conditions.


2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2008 ◽  
Vol 8 (4) ◽  
pp. 255-260 ◽  
Author(s):  
Jeongeun Kim ◽  
Howard Dubowitz ◽  
Elizabeth Hudson-Martin ◽  
Wendy Lane

Sign in / Sign up

Export Citation Format

Share Document