期刊文献+
共找到40篇文章
< 1 2 >
每页显示 20 50 100
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:4
1
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
在线阅读 下载PDF
Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection
2
作者 You Lu Linqian Cui +2 位作者 YunzheWang Jiacheng Sun Lanhui Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期717-732,共16页
Most studies have conducted experiments on predicting energy consumption by integrating data formodel training.However, the process of centralizing data can cause problems of data leakage.Meanwhile,many laws and regul... Most studies have conducted experiments on predicting energy consumption by integrating data formodel training.However, the process of centralizing data can cause problems of data leakage.Meanwhile,many laws and regulationson data security and privacy have been enacted, making it difficult to centralize data, which can lead to a datasilo problem. Thus, to train the model while maintaining user privacy, we adopt a federated learning framework.However, in all classical federated learning frameworks secure aggregation, the Federated Averaging (FedAvg)method is used to directly weight the model parameters on average, which may have an adverse effect on te model.Therefore, we propose the Federated Reinforcement Learning (FedRL) model, which consists of multiple userscollaboratively training the model. Each household trains a local model on local data. These local data neverleave the local area, and only the encrypted parameters are uploaded to the central server to participate in thesecure aggregation of the global model. We improve FedAvg by incorporating a Q-learning algorithm to assignweights to each locally uploaded local model. And the model has improved predictive performance. We validatethe performance of the FedRL model by testing it on a real-world dataset and compare the experimental results withother models. The performance of our proposed method in most of the evaluation metrics is improved comparedto both the centralized and distributed models. 展开更多
关键词 Energy consumption forecasting federated learning data privacy protection Q-LEARNING
在线阅读 下载PDF
To Whom Do Data Belong?——Data Ownership and Protection in the Context of Web-Crawlers
3
作者 Ding Xiaodong Ryan(翻译) 《Contemporary Social Sciences》 2020年第6期134-155,共22页
Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belon... Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belonging to a platform,belonging to some combinations of the two,or can be seen as a form of Internet-based public data.Analysis of legal clauses and doctrines as well as analysis based in legitimacy and consequentialism both fail to completely delineate data ownership.One potential reason for this is that there are many types of platform data,and that each type is highly dependent on circumstances.The determination of rights in regard to platform data should be done in a way which revolves around a contextual regulatory framework,one in which the rules of reason is applied on a case-by-case basis and in which gradual changes are done in a bottom-up manner,and not one which seeks to establish a universal set of data regulations.In actual judgments,factors such as the nature of the platform and the nature of the data crawling behavior should be comprehensively considered while ensuring a balance of data circulation and data protection. 展开更多
关键词 data ownership data protection web-crawling unfair competition
在线阅读 下载PDF
Cyber Security-Protecting Personal Data
4
作者 Kevin McCormack Mary Smyth 《Journal of Mathematics and System Science》 2021年第2期18-29,共12页
Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This... Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users. 展开更多
关键词 data protection big data identity correlation approach cyber security data privacy.
在线阅读 下载PDF
Development of data acquisition and over-current protection systems for a suppressor-grid current with a neutral-beam ion source
5
作者 刘伟 胡纯栋 +5 位作者 刘胜 宋士花 汪金新 王艳 赵远哲 梁立振 《Plasma Science and Technology》 SCIE EI CAS CSCD 2017年第12期154-158,共5页
Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheatin... Neutral beam injection is one of the effective auxiliary heating methods in magnetic-confinementfusion experiments. In order to acquire the suppressor-grid current signal and avoid the grid being damaged by overheating, a data acquisition and over-current protection system based on the PXI(PCI e Xtensions for Instrumentation) platform has been developed. The system consists of a current sensor, data acquisition module and over-current protection module. In the data acquisition module,the acquired data of one shot will be transferred in isolation and saved in a data-storage server in a txt file. It can also be recalled using NBWave for future analysis. The over-current protection module contains two modes: remote and local. This gives it the function of setting a threshold voltage remotely and locally, and the forbidden time of over-current protection also can be set by a host PC in remote mode. Experimental results demonstrate that the data acquisition and overcurrent protection system has the advantages of setting forbidden time and isolation transmission. 展开更多
关键词 neutral beam injection high-current ion source suppression grid current data acquisition and protection system
在线阅读 下载PDF
The COVID-19 and the“European Solution”of Data-based Approach to Governance:Public Security or Data Protection?
6
作者 刘洋 李益斌 NIU Huizi(Translated) 《The Journal of Human Rights》 2022年第3期483-503,共21页
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio... To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection. 展开更多
关键词 European solution data-based approach to governance data protection public security
原文传递
Changing the whole game:effects of the COVID-19 pandemic's accelerated digitalization on European bank staff's data protection capabilities
7
作者 Ine van Zeeland Jo Pierson 《Financial Innovation》 2024年第1期3296-3323,共28页
The COVID-19 pandemic accelerated the acceptance of digital banking services such as online payment and banking apps.As bank clients become more likely to use online services and contactless payment,the amount of cons... The COVID-19 pandemic accelerated the acceptance of digital banking services such as online payment and banking apps.As bank clients become more likely to use online services and contactless payment,the amount of consumer data available for banks’digitalization strategies has increased.This acceleration in digital banking has placed a spotlight on retail banks’efforts to protect personal data.Bank staff are on the frontlines of both protecting personal data and communicating their banks’efforts in this respect to maintain consumer trust.Our study aimed to answer the following question:How did the sudden increase in digitalization during the pandemic affect bank staff’s capabilities in protecting personal data?In a two-stage qualitative study,we collected empirical data on bank staff’s data protection efforts during accelerated digitalization.Analyzing our findings from the perspective of technological mediation theory,which focuses on the relationships between technologies,practices,and social arrangements,we found that in banking platformization,bank staff are disempowered in supporting clients,who are responsibilized for protecting themselves from fraud.Competitive pressures push retail banks into using client data in ways beyond sector norms,endangering the contextual integrity of data flows.Further,our findings show that digitalization presents bank clients with new risks,of which they are informed only after changing their banking practices,and it may be difficult to return to former arrangements.The application of mediation theory,combined with contextual integrity theory,clarified the shifting positions of different digital technology users in the infrastructural network of platformized banking and allowed for an in-depth analysis of conflicting interests.By clarifying these interests,difficulties were identified that need to be addressed in public policy and digital innovation projects to prevent loss of trust among bank clients. 展开更多
关键词 DIGITALIZATION PANDEMIC BANKS Privacy and data protection Bank staff
在线阅读 下载PDF
On the Right to the Protection of Personal Data as a Constitutional Right
8
作者 戴激涛 LIU Zhao(Translated) 《The Journal of Human Rights》 2021年第5期851-874,共24页
The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of speci... The right to the protection of personal data is an important human right in the era of big data and a constitutional right based on the national protection obligation and the theory of human dignity,making it of special significance for the realization of citizenship in a digital society.It can be seen from an examination of the constitutional texts of various countries in the world that the right to the protection of personal data as a constitutional right has rich normative connotations,and the key legal link to realize this right lies in the national legislature actively fulfilling its obligation to shape and specify the protection of personal data in accordance with the entrustment of the constitutional norms.Given the constitutional principles of fundamental rights protection,i.e.,realizing the constitutional status of the right to the protection of personal data as a basic right by means of institutional guarantees,the legislature should first adhere to the constitutionality principle of data protection legislation.Second,a multi-level data protection legal system centered on the right to the protection of personal data should be established.Finally,the institutional guarantee mechanism for the protection of personal data should be continuously improved through constitutional interpretation. 展开更多
关键词 the right to the protection of personal data constitutional rights institutional guarantees constitutional principles constitutional interpretations
原文传递
Thoughts on the Construction of Pediatric Exclusivity Policy in China
9
作者 Zhang Ke Tian Lijuan 《Asian Journal of Social Pharmacy》 2025年第4期345-354,共10页
Objective To study the 6-month patent exclusivity rule in the US and provide reference for designing pediatric exclusivity policy in China.Methods In this paper,summarize the development history and status of pediatri... Objective To study the 6-month patent exclusivity rule in the US and provide reference for designing pediatric exclusivity policy in China.Methods In this paper,summarize the development history and status of pediatric exclusivity in the US was summarized to analyze its effect for pediatric drugs research and development incentive and information improvement.Then,we can learn from its experience to construct pediatric exclusivity policy in China.Results and Conclusion Pediatric exclusivity policy in the US has obvious incentive effects,but the scope is limited to patented or other data protected drugs.Based on the successful experience of the United States,we can fully evaluate the impact of patents and other data protection policies on the exclusive marketing rights.In addition,we should conduct in-depth study on the applicable objects,authorization scope,protection mode and time limit of the pediatric exclusivity so that we can introduce supporting measures for China’s pediatric exclusivity as soon as possible. 展开更多
关键词 pediatric drug data protection market exclusivity
暂未订购
Toward next-generation networks:A blockchain-based approach for core network architecture and roaming identity verification
10
作者 Yi Gong Boyuan Yu +4 位作者 Lei Yang Fanke Meng Lei Liu Xinjue Hu Zhan Xu 《Digital Communications and Networks》 2025年第2期326-336,共11页
With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN ... With the evolution of next-generation communication networks,ensuring robust Core Network(CN)architecture and data security has become paramount.This paper addresses critical vulnerabilities in the architecture of CN and data security by proposing a novel framework based on blockchain technology that is specifically designed for communication networks.Traditional centralized network architectures are vulnerable to Distributed Denial of Service(DDoS)attacks,particularly in roaming scenarios where there is also a risk of private data leakage,which imposes significant operational demands.To address these issues,we introduce the Blockchain-Enhanced Core Network Architecture(BECNA)and the Secure Decentralized Identity Authentication Scheme(SDIDAS).The BECNA utilizes blockchain technology to decentralize data storage,enhancing network security,stability,and reliability by mitigating Single Points of Failure(SPoF).The SDIDAS utilizes Decentralized Identity(DID)technology to secure user identity data and streamline authentication in roaming scenarios,significantly reducing the risk of data breaches during cross-network transmissions.Our framework employs Ethereum,free5GC,Wireshark,and UERANSIM tools to create a robust,tamper-evident system model.A comprehensive security analysis confirms substantial improvements in user privacy and network security.Simulation results indicate that our approach enhances communication CNs security and reliability,while also ensuring data security. 展开更多
关键词 Blockchain Core network Privacy data protection Decentralized identity Roaming identity verification
在线阅读 下载PDF
Access and Privacy Control for Healthcare Decision Support System:A Smart Medical Data Exchange Engine(SMDEE)
11
作者 Imran Khan Javed Rashid +3 位作者 Anwar Ghani Muhammad Shoaib Saleem Muhammad Faheem Humera Khan 《CAAI Transactions on Intelligence Technology》 2025年第6期1616-1632,共17页
Secure and automated sharing of medical information among different medical entities/stakeholders like patients,hospitals,doctors,law enforcement agencies,health insurance companies etc.,in a standard format has alway... Secure and automated sharing of medical information among different medical entities/stakeholders like patients,hospitals,doctors,law enforcement agencies,health insurance companies etc.,in a standard format has always been a challenging problem.Current methods for ensuring compliance with medical privacy laws require specialists who are deeply familiar with these laws'complex requirements to verify the lawful exchange of medical information.This article introduces a Smart Medical Data Exchange Engine(SDEE)designed to automate the extracting of logical rules from medical privacy legislation using advanced techniques.These rules facilitate the secure extraction of information,safeguarding patient privacy and confidentiality.In addition,SMDEE can generate standardised clinical documents according to Health Level 7(HL7)standards and also standardise the nomenclature of requested medical data,enabling accurate decision-making when accessing patient data.All access requests to patient information are processed through SMDEE to ensure authorised access.The proposed system's efficacy is evaluated using the Health Insurance Portability and Accountability Act(HIPAA),a fundamental privacy law in the United States.However,SMDEE's flexibility allows its application worldwide,accommodating various medical privacy laws.Beyond facilitating global information exchange,SMDEE aims to enhance international patients'timely and appropriate treatment. 展开更多
关键词 data protection decision making information retrieval intelligent information processing medical applications privacy issues security security of data
在线阅读 下载PDF
An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship 被引量:1
12
作者 K.Meenakshi K.Sashi Rekha 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期111-128,共18页
Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve ... Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network.Both transactions in the system are carried out by consensus processes and to preserve confidentiality all thefiles contained cannot be changed.Blockchain technology is the fundamental software behind digital currencies like Bitcoin,which is common in the marketplace.Cloud computing is a method of using a network of external machines to store,monitor,and process information,rather than using the local computer or a local personal computer.The software is currently facing multiple problems including lack of data protection,data instability,and reliability.This paper aims to give the highest security for multiple user environments in cloud for storing and accessing the data in blocks.The users who are legitimate are only allowed for storing and accessing the data as like a secured block chain approach.As like the Blockchain which does not require a centralized system for transactions,the proposed system is also independent on centralized network interface.The decentralized system is developed in such a way to avoid counterfeiting.The system enables the fabricator to spend less or null resources to perform the validations for its direct operated stores.This ensures the product fabricator to avoid the circulation of its duplicate products.The customer as an end-user is also ensured to have only the genuine products from the fabricator.The Fabricator(F),Merchant(M)and consumer(C)forms an interconnected triangular structure without allowing any counterfeiting agents in their secured cloud chain.The pro-posed approach provides the stability in the security system of the cloud using the chaining mechanism within different blocks at each node.It takes roughly 4.7,6.2,and 7.5 ms,respectively,to register each node in the proposed system for 5,10,and 15 nodes.The overall registration time for each scenario is 11.9,26.2,and 53.1 ms,despite the fact that each node’s registration time was greatest for 10 nodes.By looking at the data,it’s clear that the number of nodes is a func-tion of time. 展开更多
关键词 Blockchain bitcoin CUSTOMER MERCHANT data protection digital currencies TRANSACTION
在线阅读 下载PDF
Dynamics analysis and cryptographic implementation of a fractional-order memristive cellular neural network model
13
作者 周新卫 蒋东华 +4 位作者 Jean De Dieu Nkapkop Musheer Ahmad Jules Tagne Fossi Nestor Tsafack 吴建华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期418-433,共16页
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop... Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance. 展开更多
关键词 cellular neural network MEMRISTOR hardware circuit compressive sensing privacy data protection
原文传递
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
14
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 Cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
在线阅读 下载PDF
Robust Deep Image Watermarking:A Survey
15
作者 Yuanjing Luo Xichen Tan Zhiping Cai 《Computers, Materials & Continua》 SCIE EI 2024年第10期133-160,共28页
In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of d... In the era of internet proliferation,safeguarding digital media copyright and integrity,especially for images,is imperative.Digital watermarking stands out as a pivotal solution for image security.With the advent of deep learning,watermarking has seen significant advancements.Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces,resilient to various attacks.These methods,characterized by a streamlined encoder-decoder architecture,have shown enhanced performance through the incorporation of novel training modules.This article offers an in-depth analysis of deep watermarking’s core technologies,current status,and prospective trajectories,evaluating recent scholarly contributions across diverse frameworks.It concludes with an overview of the technical hurdles and prospects,providing essential insights for ongoing and future research endeavors in digital image watermarking. 展开更多
关键词 Deep image watermarking multimedia security data protection deep neural network
在线阅读 下载PDF
U.S.and International Legal Perspectives Affecting Cybersecurity Corporate Governance
16
作者 Paul J.Morrow Thomas M.Fitzpatrick 《International Relations and Diplomacy》 2020年第6期231-239,共9页
International and U.S.corporations must be well advised regarding specific regulations and laws that affect cybersecurity decisions because the Board of Directors must perform due diligence to avoid regulatory neglige... International and U.S.corporations must be well advised regarding specific regulations and laws that affect cybersecurity decisions because the Board of Directors must perform due diligence to avoid regulatory negligence and lawsuit liability.Depending on the standards and the regulations that do define reasonable care,the corporate director is faced with the challenge of determining how and what cybersecurity laws apply.Then,directors can institute best cybersecurity management practices.This paper provides guidance regarding the application of the law in the areas of cyber security for the international corporations interacting with the European General Data Protection Regulations(GDPR),the California Consumer Privacy Act(CCPA),and recent Federal Trade Commission(FTC)administrative agency rulings.Reading this paper is worth your time because it will inform you of the legal challenges that international and domestic corporations face in making decisions about spending capital to manage cybersecurity and at the same time perform due diligence.In other words,if there is a cybersecurity breach,this paper will provide insights into what law must be followed by the corporation enabling the best management decisions assuring adequate response,compliance,thereby avoiding unnecessary liability risk.The paper also provides reflections about whether the GDPR serves as a better legal comprehensive regulatory model rather than the recently enacted laws in the U.S. 展开更多
关键词 cybersecurity compliance General data Protection Regulation California Consumer Privacy Act data privacy Federal Trade Commission
在线阅读 下载PDF
A Literature Review: Potential Effects That Health Apps on Mobile Devices May Have on Patient Privacy and Confidentiality
17
作者 Anna Sheri George Jomin George Judy Jenkins 《E-Health Telecommunication Systems and Networks》 2024年第3期23-44,共22页
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec... Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides. 展开更多
关键词 Mobile Devices Patient Privacy Confidentiality Breaches data Security data Protection Regulatory Compliance User Consent data Encryption Third-Party Integration User Awareness
在线阅读 下载PDF
Detecting Phishing Using a Multi-Layered Social Engineering Framework
18
作者 Kofi Sarpong Adu-Manu Richard Kwasi Ahiable 《Journal of Cyber Security》 2023年第1期13-32,共20页
As businesses develop and expand with a significant volume of data,data protection and privacy become increasingly important.Research has shown a tremendous increase in phishing activities during and after COVID-19.Th... As businesses develop and expand with a significant volume of data,data protection and privacy become increasingly important.Research has shown a tremendous increase in phishing activities during and after COVID-19.This research aimed to improve the existing approaches to detecting phishing activities on the internet.We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs.In the algorithm,we considered technical dimensions of phishing attack prevention and mitigation on the internet.In our approach,we merge,Phishtank,Blacklist,Blocklist,and Whitelist to form our framework.A web application system and browser extension were developed to implement the algorithm.The multi-layer phish detector evaluated ten thousandURLs gathered randomly from the internet(five thousand phishing and five thousand legitimate URLs).The system was estimated to detect levels of accuracy,true-positive and false-positive values.The system level accuracy was recorded to be 98.16%.Approximately 49.6%of the websites were detected as illegitimate,whilst 49.8%were seen as legitimate. 展开更多
关键词 PHISHING social engineering multi-layer framework data protection PRIVACY
在线阅读 下载PDF
International Cybersecurity Breach Detection Risk, Prosecution and Resolution
19
作者 Paul J.Morrow Thomas M.Fitzpatrick 《International Relations and Diplomacy》 2021年第5期173-181,共9页
The U.S.and the international business community is in a crisis regarding ransomware attacks and cybersecurity policing/regulation.Based on recent events,state sponsored cyber hackers have made it their mission to hol... The U.S.and the international business community is in a crisis regarding ransomware attacks and cybersecurity policing/regulation.Based on recent events,state sponsored cyber hackers have made it their mission to hold the information security world hostage extorting money for a returning of data systems to normal functioning.This paper examines the challenges for the global business community regarding the scope of the attacks,the current state of the law in the U.S.intended to provide current information to the international business community,illustrate the challenges for regulators and the courts,illustrate the recent progress of the criminal investigatory aspects of apprehending cybercriminals,report on the non-delegable duties of decision makers in the international community doing business in the U.S.,and demonstrate the potential solutions to this evolving international crisis.It is worth your time to read this paper for the following reasons:1.Understanding the risks and the scope of the problem moving forward with doing business in the U.S.;2.communicating recent developments fostering cooperation and contributing to mediating cybersecurity events for international corporations;and 3.providing information on the current state of the law by the U.S.Supreme Court pointing out the relevant and the consequential outcomes of the legal system leading to potential smart solutions for planning business decisions. 展开更多
关键词 cybersecurity compliance general data protection regulation California Consumer Privacy Act data privacy Federal Trade Commission
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部