scholarly journals Wi-Fi Adoption and Security in Hong Kong

2017 ◽  
Vol 10 (8) ◽  
pp. 129
Author(s):  
Ken Kin-Kiu Fong ◽  
Stanley Kam Sing Wong

The benefit of using WiFi for Internet connection is obvious: cost-effective and powerful. WiFi gives us the flexibility and convenience of not being tied to a fixed location. Nowadays, more and more electronic devices and gadgets, such as mobile phones, cameras, gaming devices, TV and entertainment equipment, are WiFi enabled. WiFi also enables your devices to share files instantly. WiFi broadcasting devices, such as Chromecast, give you extra convenience by allowing you to stream video and audio contents from your mobile phone to your TV using WiFi connection. However, this kind of flexibility and convenience comes with a cost. Sharing files, streaming contents or even accessing the Internet via WiFi means signals are being transmitted and they can be captured by anyone with a computer or mobile phone installed with appropriate software. Therefore, it is important to let WiFi users know their security risks and how to minimize them. Educating WiFi users to reduce the WiFi security risk is one of our on-going missions. Basing on empirically collected data, this paper is report of a comprehensive study on the use of WiFi and WiFi networking and the knowledge of WiFi users of the risks and security issues involved in using WiFi in Hong Kong. Findings of the study highlight the WiFi security knowledge gaps of the users in Hong Kong so that stakeholders can take action to improve Internet security by eliminating the security gaps identified.

2022 ◽  
pp. 19-38
Author(s):  
Jeffrey S. Zanzig ◽  
Guillermo A. Francia III

Tremendous improvements in information networking capabilities have brought with them increased security risks resulting from the deterioration of the ability of a physical layer of computer security to protect an organization's information system. As a result, audit committees have had to deal with new security issues as well as the need to understand the cyber perpetrator and ensure the proper training of employees to consider cybersecurity risks. Standard setters including the Institute of Internal Auditors and the American Institute of Certified Public Accountants have issued guidance about lines of defense and reporting on an entity's cybersecurity risk management program and controls, respectively. Each of these topics is considered along with how cybersecurity guidance from COBIT, the National Institute of Standards and Technology, and the Center for Internet Security can be mapped into five cyber infrastructure domains to provide an approach to evaluate a system of cybersecurity.


2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a solution of an extra layer of security, via a low-cost mobile app framework, “Bio-Guard,” to use biometrics, more securely. We tested the app for its design, functions, usability, and it got a score of more than 71% on the usability scale and a reasonably low equal error rate (EER) of 6%. The survey to evaluate the usefulness of the app showed a favorable response of 80%. The results show a good potential of the app to make access to biometric data more secure. The app may enhance users’ confidence-level in encouraging higher participation of users in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many medium and small segment organizations to decrease their information security risk.


Author(s):  
Harshali Kulwal ◽  
Pallavi Badhe ◽  
Sneha Ingole ◽  
Monika Madhure ◽  
Archana. K

Existing Health Management Systems are faced with various security and privacy issues such as unauthorized Access to Patient Records, internet security issues, etc. The proposed system mainly focuses on the security of Electronic Medical Records . The purpose of the project entitled “A SECURE eHealth SYSTEM” is to develop software which is user-friendly, fast, and cost-effective. It deals with the collection of patient’s information, Doctor details, Medical information. Traditionally, it was done manually. The main function of the system is to register and store patient details, add symptom and doctor details and retrieve these details as and when required, and also to manipulate these details meaningfully. System input contains patient details, doctor details while system output is to appoint a doctor for the patient, display these details on the screen, securely generated electronic medical records, forward prescriptions to the medical store. The eHealth system can be entered using a unique ID generated during registration and password. It is accessible either by a doctor, patient, pharmacist. Only registered members add data into a database. The data can be retrieved easily. The data is well protected and the data processing becomes very fast.


2018 ◽  
Vol 15 (5) ◽  
pp. 6-15
Author(s):  
E. V. Karanina ◽  
T. V. Makarova

The relevance of the regional management of the economic sphere due to the existing economic problems in the country, when the regions are responsible for the significant part of the socio- economic obligations to the population. Therefore, proper management of the economy of the region depends on the well-being of the population, development of regional infrastructure, the possibility of further economic growth and development, social stability in society. Sustainable development of regional socio-economic systems is impossible without an adequate level of economic security of the region. The level of economic security of the region is primarily assessment of the socio-economic processes that reflect the essence of economic security, consisting of a set of interrelated indicators. According to most economists, analyzing the economic security issues, forming the basis of this set of indicators acts as a close relationship with the concept of security risk category and category of threat.


Author(s):  
Balbir S. Barn ◽  
Ravinder Barn ◽  
Jo-Pei Tan

This article reports on a study of mobile phone usage by young people in the UK tertiary education sector. Responses from 397 respondents were analysed to explore the attitudes of young people towards data security issues for mobile devices. Results from the comparative analysis found that there were significant differences in data security risk concerns across ethnic groups. Those who reported extrovert personalities tend to take more risk in data security issues. In addition, young people who were 'technology savvy' were less likely to expose themselves to risk to data security issues through the use of free wifi and access of installed applications. It is argued that there is an urgent need for greater education and awareness of Information and Communication Technology (ICT) to reduce risk of cybercrime. The research reported here is part of a wider study looking at the overall communications and mobile phone usage of young people and taken as a whole, the paper contributes to this increasingly important area of Information Technology.


Author(s):  
Shambhu Sharan Srivastava

In theDistributed Computing Environment, many processors/nodes remain active in system at any moment, coordinate or operate without interfering. Nodes have certain degree of freedom like own hardware, own code, sometimes ownindependent task, but at the same time there will still be sharing of some common resources and information. One of the main themes of recent research in distributed computing is "locality" (as utilized by decentralized/peer-to-peer systems). Networks grow fast, thus locality and scalability becomes a major issues. Computing security is, at its core, more than a technical issue. It is a fundamental business challenge. Managers have plenty of security alternatives, but have very little real guidance on making intelligent decisions about them. Today's distributed, multi-vendor, Internet-connected environments encompass more insecure systems and networks than ever before. Security in Distributed Computing offers the manager of distributed systems a thorough, common-sense framework for cost-effective computer security. The first step to understand security is to know what the potential risks are, or more specifically, to determine the type and level of security risks for the organizations. Security risks are unique to each organization because they are dependent on the nature of the business and the environment in which the organization operates. Security risk is determined by identifying the assets that need to be protected.


Author(s):  
Chong Yuan ◽  
Yue Zhang ◽  
Ye Liu

With the widespread use pay treasures, which occupy an increasingly large daily, the proportion of third-party payment, pay treasure security issues become more and more prominent. So, how to better respond to Alipay security risks, how to improve its security, these are very important to discuss the contents. This article briefly learn Alipay technical processes missing from the mobile phone, Internet and transaction worries wireless network vulnerabilities, a brief description of the security issues Alipay, and put forward relevant measures in the third chapter of governance.


Author(s):  
Wajid Hassan ◽  
Te-Shun Chou ◽  
Xiaoming Li ◽  
Patrick Appiah-Kubi ◽  
Omar Tamer

The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented.  This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.


2020 ◽  
Author(s):  
Bhanu Pratap Singh ◽  
Nirvisha Singh

With high paced growth in biometrics, and its easy availability to capture various biometric features, it is <a>emerging as one of the most valuable technologies for multifactor authentication to verify a user’s identity, for data security. </a>Organizations encourage their members to use biometrics, but <a>they are hesitant to use due to perceived security risks. Because of its low usage rate, many medium and small segment organizations find it unfeasible to deploy robust biometric systems. </a>We propose a “server-specific add-on biometric security layer model,” to enhance confidence in the usage of biometrics. We tested this model via a biometric mobile app, and the survey showed a favorable response of 80%. The innovative mobile app was tested for its usability and got a score of more than 71%. For test tool reliability, we examined the equal error rate (EER) of the app and got a reasonably low score of 6%. The results show a good potential of this framework to enhance users’ confidence-level in the usage of biometrics. Higher usage rates may make deployment of biometrics more cost-effective for many organizations to decrease their information security risk.


Author(s):  
Jeffrey S. Zanzig ◽  
Guillermo A. Francia III

Tremendous improvements in information networking capabilities have brought with them increased security risks resulting from the deterioration of the ability of a physical layer of computer security to protect an organization's information system. As a result, audit committees have had to deal with new security issues as well as the need to understand the cyber perpetrator and ensure the proper training of employees to consider cybersecurity risks. Standard setters including the Institute of Internal Auditors and the American Institute of Certified Public Accountants have issued guidance about lines of defense and reporting on an entity's cybersecurity risk management program and controls, respectively. Each of these topics is considered along with how cybersecurity guidance from COBIT, the National Institute of Standards and Technology, and the Center for Internet Security can be mapped into five cyber infrastructure domains to provide an approach to evaluate a system of cybersecurity.


Sign in / Sign up

Export Citation Format

Share Document