Digital Transformation and Challenges to Data Security and Privacy - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

27
(FIVE YEARS 27)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799842019, 9781799842026

Author(s):  
Pedro Fernandes da Anunciação ◽  
Vitor Dinis ◽  
Francisco Madeira Esteves

In an economy that tends to operate in real time, where companies reduce stocks and value the customization of products and services according to the needs of their customers, information systems and technologies assume a predominant role. Equipment maintenance proves to be critical in supplying markets and meeting consumer needs. Regarding the maintenance of equipment, most managers are faced with the technical indications of suppliers, serving as a reference for the respective interventions. However, these indications often do not contemplate the contingency of certain situations, excessive hours of operation, or temperatures higher than those indicated. Preventive maintenance assumes an important role in the maintenance area by allowing interventions that are more appropriate to the wear and tear of the equipment. The technological potential associated with the internet of things or analytics allows the generation of economic value by guaranteeing the adequate conditions of the equipment and by avoiding disruptions in supply to the markets.


Author(s):  
Igor Oliveira ◽  
Sérgio Maravilhas ◽  
Sérgio Ricardo Goes Oliveira

The Brazilian Navy encourages the adoption of active learning methodologies aiming the development of competencies in the military. This research aims to analyze the contributions of the game Simulador para Treinamento em Administração (Simulator for Training in Administration) in the development of competencies of the Supply Officers who accomplished the Curso de Aperfeiçoamento em Intendência para Oficiais (CAIO). This research has a qualitative approach and an exploratory-descriptive nature. A questionnaire was used to investigate the participants' perception and semi-structured interviews were conducted to understand the expectation of the Centro de Instrução Almirante Newton Braga (CIANB) regarding the application of business games for the development of competencies. The results show that the participants positively perceive the use of business games as a teaching-learning strategy. Finally, it was possible to map the competencies developed with the application of the STA and verify that the intended objectives with the use of the methodology were met.


Author(s):  
Kamalkumar Macwan ◽  
Sankita Patel

Recently, the social network platforms have gained the attention of people worldwide. People post, share, and update their views freely on such platforms. The huge data contained on social networks are utilized for various purposes like research, market analysis, product popularity, prediction, etc. Although it provides so much useful information, it raises the issue regarding user privacy. This chapter discusses the various privacy preservation methods applied to the original social network dataset to preserve privacy against attacks. The two areas for privacy preservation approaches addressed in this chapter are anonymization in social network data publication and differential privacy in node degree publishing.


Author(s):  
Rafael Velasquez Saavedra Silva ◽  
Matheus Felipe Saavedra da Silva

In Brazil, organized crime, unfortunately, finds a fertile field that allows its growth and development due to several different aspects. Also, the vast and continental dimension of the Brazilian territory, the evident social inequality, and in many cases, the lack of synergy and collaboration among municipal, provincial, and federal levels are problems. It is important to mention that, in recent times, via its main institutions—executive, legislative, and judiciary—Brazil has been organizing itself and trying to tackle corruption on different fronts, with the use of advanced technology, new procedures of criminal investigation, an increased collaboration between different players and internal cooperation, the celerity in the process of penal persecution, and the revision of laws related to the theme. This chapter aims at displaying technological innovations that have helped law enforcement to act with rigor, speed, and assertiveness in the production of evidence from digital evidence, while respecting the Brazilian Constitution, individual rights, and guarantees of every citizen.


Author(s):  
Md Alimul Haque ◽  
Shameemul Haque ◽  
Kailash Kumar ◽  
Narendra Kumar Singh

The role of the internet of things (IoT) and cyberspace in a digital society is well recognized, and they have become tremendously popular due to certain features like the ability to ease the operational process of businesses and instant communication. Recent developments in the fields of wireless communication networks like 4G, 5G, and 6G with IoT applications have greatly benefited human welfare. Still, the rapid growth of various IoT applications focuses on automating different tasks and are trying to empower the inanimate physical objects to act without any human intervention. It has also contributed to unethical practices by hackers who use new tools and techniques to penetrate more complex or well-controlled environments and produce increased damage and even remain under the cover. The main objective of this chapter is to improve understanding of the challenges to secure future digital infrastructure while it is still evolving. In this context, a detailed review of the security-related issues, challenges, threats, and countermeasures in the IoT applications is presented.


Author(s):  
Thiago R. Veloso Costa

We are experiencing a time of intense change in human relations with great exposure and with this the need for governments and companies to be prepared to ensure the protection of personal data of their users and customers. The purpose of this chapter is to provide clear evidence of the impacts that arbitration and arbitration chambers will be subject to by changes imposed by data protection laws. The arbitral chambers shall prepare and adapt their procedures to this new reality under penalty of its extinction.


Author(s):  
Bhimavarapu Usharani ◽  
Raju Anitha

Due to the advancement in internet technology, everyone can connect to anyone living anywhere in this world who is far away from us by using social media. Social media became a public place to share everyone's personal photos and videos. These photos or videos are viewed, shared, and even downloaded by their respective friends, someone from their friends' profiles, and even unrelated persons also without their permission. One of the risks from the social media is the cyber bullying or online harassment. Cyber bullies perpetrate either through denigration or doxing. The cyber bullies are anonymous, and it is very difficult for us to catch and punish them. The main aim of this chapter is to provide the privacy and security to the photos that are sharing on social media. This chapter proposes a novel algorithm to keep the photos safe that are uploading on social media and the extension of the novel algorithm to reveal the details of the cyber bullies those who performed morphing on the photos that were downloaded from social media.


Author(s):  
Jose P. Rascao

In the contemporary organizational context, the sharing and transfer of knowledge play a significant role, and therefore, it is important to overcome internal and external barriers for them to be processed. This can be facilitated by the implementation of data governance (GovD). The problem is that, in addition to being a new construct and still little studied, conceptual divergences are fed by the amplitude the possible dimensions of analysis. In this context, the objective of this study arises in identifying the conceptualization of the construct governance and data proposed in the scientific literature to support its better understanding and perspective of future investigations. A theoretical research was conducted through a systematic literature review, followed by an analysis of the most relevant publications on the subject. The discussions about this subject are considered in the context of contemporary organizations; however, it signals the importance of future studies of empirical and theoretical order to foster discussions on the subject today.


Author(s):  
Ricardo de Sousa Correia

In an increasingly complex and competitive world, information is a valuable asset and a difference maker. It contributes to better government through supporting efficient business, assisting decision-making, mitigating risks, and adding economic value. This case study reviews Portuguese military information security requirements and its potential application on business company's crucial information protection. It's a military security policy, procedures, and measures approach to commercial environment. It's defined a security checklist to be applied by companies which want to achieve success. The explosive growth of information and communication technologies and their global dissemination and penetration have been a special impact on commercial activities, making them an attractive target to competitors and other agents. Cybersecurity is an organization's top priority. It's necessary to build an increasingly effective security policy in order to protect critical information. Keeping safe business competitive information advantages will be the key to success.


Author(s):  
George Leal Jamil ◽  
Alexis Rocha da Silva

Users' personal, highly sensitive data such as photos and voice recordings are kept indefinitely by the companies that collect it. Users can neither delete nor restrict the purposes for which it is used. Learning how to machine learning that protects privacy, we can make a huge difference in solving many social issues like curing disease, etc. Deep neural networks are susceptible to various inference attacks as they remember information about their training data. In this chapter, the authors introduce differential privacy, which ensures that different kinds of statistical analysis don't compromise privacy and federated learning, training a machine learning model on a data to which we do not have access to.


Sign in / Sign up

Export Citation Format

Share Document