internet privacy
Recently Published Documents


TOTAL DOCUMENTS

171
(FIVE YEARS 41)

H-INDEX

17
(FIVE YEARS 2)

2022 ◽  
pp. 621-648
Author(s):  
Bruce L. Mann

News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.


2021 ◽  
Vol 93 ◽  
pp. 327-348
Author(s):  
Seon Yeong Hwang ◽  
Liu Zhi Hua

Author(s):  
Aleksandar Tošic ◽  
Jernej Vičič

To anonymous internet traffic, many popular protocols route traffic through a network of nodes in order to conceal information about the request. However, routing traffic through other nodes inherently introduces added latency. Over the past two decades, there were many attempts to improve the path selection in order to decrease latency with little or no trade-off in terms of security, and anonymity. In this paper, we show the potential use of geo-sharding in decentralized routing networks to improve fault-tolerance, and latency. Such networks can be used as a communication layer for Edge devices computing huge amounts of data. Specifically, we focus our work on Low Latency Anonymous Routing Protocol (LLARP), a protocol built on top of Oxen blockchain that aims to achieve internet privacy. We analyse the existing network of Service Nodes(SN), observe cloud provider centralisation, and propose a high level protocol that provides incentives for a better geographical distribution mitigating potential cloud provider/country wide service dropouts. Additionally, the protocol level information about geographical location can be used to improve client’s path (the string of nodes that will participate in the transaction) selection, decreasing network latency. We show the feasibility of our approach by comparing it with the random path selection in a simulated environment. We observe marginal drops in average latency when selecting paths geographically closer to each other.


2021 ◽  
pp. 77-91
Author(s):  
Kieron O’Hara

This chapter describes the Brussels Bourgeois Internet. The ideal consists of positive, managed liberty where rights of others are respected, as in the bourgeois public space, where liberty follows only when rights are secured. The exemplar of this approach is the European Union, which uses administrative means, soft law, and regulation to project its vision across the Internet. Privacy and data protection have become the most emblematic struggles. Under the Data Protection Directive of 1995, the European Union developed data-protection law and numerous privacy rights, including a right to be forgotten, won in a case against Google Spain in 2014, the arguments about which are dissected. The General Data Protection Regulation (GDPR) followed in 2018, amplifying this approach. GDPR is having the effect of enforcing European data-protection law on international players (the ‘Brussels effect’), while the European Union over the years has developed unmatched expertise in data-protection law.


2021 ◽  
Vol 8 (6) ◽  
pp. 161-166
Author(s):  
Yu Peng ◽  

In recent years, privacy issues have attracted more and more attention. This paper combines existing research and the CFIP scale to construct a model of college students’ concerns about Internet privacy, and validates the model based on data from 445 questionnaires. The results show that perceived privacy risks, privacy control, privacy tendencies, misrepresentation, improper access, and unauthorized secondary use all have a significant impact on privacy concerns, and environmental factors have a more significant impact on privacy concerns. On this basis, relevant suggestions are provided.


2021 ◽  
Author(s):  
Zainab Khan

As social media technologies become more embedded within the online shopping interface, the phenomenon of social commerce arises. This research examines the role of social commerce in influencing consumer purchase intention. Specifically, factors investigated are social presence, consumer’s security perceptions, perceived internet privacy risk, trust and willingness to provide personal information to transact. The study found that security perception, trust and willingness to provide personal information to transact have a significant influence on consumer purchase intention.


2021 ◽  
Author(s):  
Zainab Khan

As social media technologies become more embedded within the online shopping interface, the phenomenon of social commerce arises. This research examines the role of social commerce in influencing consumer purchase intention. Specifically, factors investigated are social presence, consumer’s security perceptions, perceived internet privacy risk, trust and willingness to provide personal information to transact. The study found that security perception, trust and willingness to provide personal information to transact have a significant influence on consumer purchase intention.


2021 ◽  
Author(s):  
Julie Gustavel

Issues about informational privacy have emerged in tandem with the escalating increase in nformation stored in electronic formats. Data protection is a pressing issue not only because files of personal information are being kept in greater detail and for longer periods of time, but also because the data can be retrieved and compared or matched without delay, regardless of geography. While defenders of information technology cite efficiency and safety among the countervailing benefits, concerns from an increasingly tech-savvy public have introduced a sense of urgency to demand tough legislation. Although many studies have provided evidence of online privacy concerns, few have explored the nature of the concern in detail, especially in terms of government policy for our new online environment. Bill C-6, Canada's recent legislative action, has provided a practical basis from which to appraise governments' role in privacy protection. With this in mind, the paper will be divided into two parts. Part one will be undertaken to: (A) evaluate the arguments of critics as well as defenders of contemporary record-keeping practices and the philosophical conceptions of privacy, which underlie them; and, using these themes (B) provide a comprehensive assessment of the effectiveness of Bill C- 6, examining the ways in which policy makers have begun to treat privacy as both a commodity and a secondary adjunct to business activity. Part two of the paper, purposes a series of recommendations or, more specifically, a framework for Bill C-6 that would, more effectively, protect individual privacy from private entities, who collect online data.


2021 ◽  
Author(s):  
Julie Gustavel

Issues about informational privacy have emerged in tandem with the escalating increase in nformation stored in electronic formats. Data protection is a pressing issue not only because files of personal information are being kept in greater detail and for longer periods of time, but also because the data can be retrieved and compared or matched without delay, regardless of geography. While defenders of information technology cite efficiency and safety among the countervailing benefits, concerns from an increasingly tech-savvy public have introduced a sense of urgency to demand tough legislation. Although many studies have provided evidence of online privacy concerns, few have explored the nature of the concern in detail, especially in terms of government policy for our new online environment. Bill C-6, Canada's recent legislative action, has provided a practical basis from which to appraise governments' role in privacy protection. With this in mind, the paper will be divided into two parts. Part one will be undertaken to: (A) evaluate the arguments of critics as well as defenders of contemporary record-keeping practices and the philosophical conceptions of privacy, which underlie them; and, using these themes (B) provide a comprehensive assessment of the effectiveness of Bill C- 6, examining the ways in which policy makers have begun to treat privacy as both a commodity and a secondary adjunct to business activity. Part two of the paper, purposes a series of recommendations or, more specifically, a framework for Bill C-6 that would, more effectively, protect individual privacy from private entities, who collect online data.


Sign in / Sign up

Export Citation Format

Share Document