Cyber Law, Privacy, and Security
Latest Publications


TOTAL DOCUMENTS

89
(FIVE YEARS 89)

H-INDEX

2
(FIVE YEARS 2)

Published By IGI Global

9781522588979, 9781522588986

2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


2019 ◽  
pp. 1777-1799
Author(s):  
Emre Erturk

This chapter sets out to explore new trends in cyber and cloud security, and their implications for businesses. First, the terminology and assumptions related to cloud computing are stated. Next, the chapter reports on contemporary research around the awareness of security issues, and the security processes within the cloud computing realm. Cyber security poses a different challenge to local small and medium sized organizations, which may seem to have less at stake financially. However, they are more vulnerable, due to fewer resources dedicated toward prevention. A series of serious security incidents may even keep them out of business. Furthermore, security needs to be understood and handled differently in a cloud based environment. Therefore, the chapter identifies unique security practices and recommendations for these businesses to run their IT resources safely in the cloud.


2019 ◽  
pp. 1748-1764
Author(s):  
Dan Dumbrell ◽  
Robert Steele

Social media technologies represent an emerging means by which older adults can access health and community information, engage in peer-to-peer information sharing, and also potentially decrease social isolation. Privacy concerns, however, have been consistently identified as a barrier for older adults' use of the Web and social media technologies. The authors conduct a preliminary study involving 150 older adult participants, investigating their use and perceptions of social media technologies. The trial involved first providing the participants with brief training in three common social media technologies: Facebook, Twitter, and Skype. The authors carried out a quantitative and qualitative analysis of the participant's use and privacy perceptions of these technologies. Overall, the results are promising as to the potential to address privacy concerns to enable older adults to further utilize these technologies for improved mental, physical, and social health. Implications for future research and usage within the older adult community are also discussed.


2019 ◽  
pp. 1697-1710
Author(s):  
Paul Kariuki

It is critical that cyber education curriculum considers the growing cyber technologies and which aspects of these technologies need to be aligned with the fourth industrial revolution. This chapter seeks to present a comprehensive analysis of the current level of cyber security education in South Africa. It will also track the current trends of cyber security education in the country as well as examining any challenges being experienced including any knowledge gaps. In the end, the chapter proposes recommendations for consideration in strengthening cybersecurity education in the country in to achieve advanced cyber security responses, capable of mitigating any cyber security threats. Offering quality cyber security education is important in preparing the next generation cyber security practitioners, who are highly competent and capable of developing innovative solutions in response to the growing global demand of cyber technologies. The chapter ends by proposing specific strategies that can guide towards this ideal in the context of the fourth industrial revolution.


2019 ◽  
pp. 1518-1538
Author(s):  
Sowmyarani C. N. ◽  
Dayananda P.

Privacy attack on individual records has great concern in privacy preserving data publishing. When an intruder who is interested to know the private information of particular person of his interest, will acquire background knowledge about the person. This background knowledge may be gained though publicly available information such as Voter's id or through social networks. Combining this background information with published data; intruder may get the private information causing a privacy attack of that person. There are many privacy attack models. Most popular attack models are discussed in this chapter. The study of these attack models plays a significant role towards the invention of robust Privacy preserving models.


2019 ◽  
pp. 1482-1499 ◽  
Author(s):  
Leanne Hirshfield ◽  
Philip Bobko ◽  
Alex J. Barelka ◽  
Mark R. Costa ◽  
Gregory J. Funke ◽  
...  

Despite the importance that human error in the cyber domain has had in recent reports, cyber warfare research to date has largely focused on the effects of cyber attacks on the target computer system. In contrast, there is little empirical work on the role of human operators during cyber breaches. More specifically, there is a need to understand the human-level factors at play when attacks occur. This paper views cyber attacks through the lens of suspicion, a construct that has been used in other contexts, but inadequately defined, in prior research. After defining the construct of suspicion, the authors demonstrate the role that suspicion plays as the conduit between computer operators' normal working behaviors and their ability to alter that behavior to detect and react to cyber attacks. With a focus on the user, rather than the target computer, the authors empirically develop a latent structure for a variety of types of cyber attacks, link that structure to levels of operator suspicion, link suspicion to users' cognitive and emotional states, and develop initial implications for cyber training.


2019 ◽  
pp. 1159-1175
Author(s):  
Nimisha Singh

Changing trends in IT industry are opening new avenues. With the scalability, flexibility, and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it poses a danger of digital crime and security breaches. These challenges are compounded by the fact that cybercrime and the transgressors transcend geographical boundaries while the law enforcement does not. This paper tries to focus on how cloud computing is rising to the challenges thrown in from cyber space and recent developments to avoid and mitigate cloud fraud and abuse. Taking counter measures at organizational level, will alleviate and up to an extent eliminate security breaches. With current knowledge on policy and standards adopted by developed nations, the policy makers and law enforcement agencies in developing countries can work towards formulating standards and guidelines for awareness on threats, vulnerabilities and effectiveness of security controls to respond to risk.


2019 ◽  
pp. 1142-1158
Author(s):  
Amr Farouk

Not all infrastructures are critical. In most countries' definitions, a critical infrastructure (CI) is a collection of indispensable assets that provide an essential support for economic and social well-being, for public safety and for the functioning of key government responsibilities. CI assets can be classified into three broad categories: Physical, Cybernetic and Human. In the present era, Information and Communication Technology sector (e.g., Cloud Computing, Big Data, Internet of Things) can be regarded as the backbone of the economies of developed and the developing countries worldwide since they provide basic services to all segments of a society. Critical infrastructure protection (CIP) is a concept du jour in many developed countries. The present chapter discusses the method of protecting critical infrastructures in developing countries. It observes many developing countries experiencing massive growth in Internet capacity and the use of Internet-based technologies. Attacks on the information infrastructure can severely affect the ability of a country to function effectively.


2019 ◽  
pp. 978-1002
Author(s):  
Zdenek Smutny ◽  
Vaclav Janoscik ◽  
Radim Cermak

This chapter addresses the issue of privacy settings with a focus on Generation Y from a technological, social, generational, cultural and philosophical point of view. After introducing the issue of Internet privacy and other relevant areas—generational and cultural differences, the philosophical framework, the postinternet condition, the possibilities of processing and (mis)using personal data, and privacy policy—the authors present their perspective on the issue, drawing implications for individuals and organizations based on their own research and other relevant studies. The authors discuss the possible implications in terms of a prospective use of personal data by companies (e.g. for marketing and management) and possibility of processing user data. Such perspective will allow them to formulate a critical basis for further assessment of social networking and Generation Y's attitudes to privacy. The chapter concludes by outlining several recommendations concerning the commercialization of social networking services with respect to the constantly changing conception of privacy.


Author(s):  
Laura Aymerich-Franch

This chapter analyses privacy concerns of students and faculty resulting from the adoption of social media as teaching resources in higher education. In addition, the chapter focuses on privacy concerns that social media can cause to faculty when they are used for social networking. A trans-cultural study was carried out which involved three Spanish universities, a Colombian university, and an American university. A focus group was organized with PhD students to brainstorm the topic. Afterwards, 94 undergraduate students completed a survey and 18 lecturers participated in a written interview. Results indicate that social media are widely adopted in the university and are perceived as valuable resources for teaching. However, privacy concerns can easily emerge among students and faculty when these applications are used for this purpose. Concerns may appear when social media are used for social networking as well. The text also offers some guidelines to overcome them.


Sign in / Sign up

Export Citation Format

Share Document