138,116 research outputs found

    Security Concerns of new alternative telecommunication services

    Get PDF
    With the advancing new era of communication, the so-called era of ā€˜being always onlineā€™ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ā€œtheseā€ services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using ā€œfreeā€ services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using ā€œfreeā€ online services, also offering a birdā€™s eye view of numerous recommendations developed by various standard organizations

    Security Concerns of new alternative telecommunication services

    Get PDF
    With the advancing new era of communication, the so-called era of ā€˜being always onlineā€™ many providers offer their services for free. In that sense a small company or a virtual company becomes a huge competitor for different traditional telecommunication providers. Using the same services such as: voice calls, video calls, chat and similar services, the internet technology has made huge changes how users make use of such services . Instead of using these services, users shall install applications that are specialized for offering these services via applications, such as: Viber, WhatsApp, Facebook, Google Talk etc.. During the installation and update of these applications people do not recognize the risks of security and privacy of the information that makes their business vital, and how such information are abused on the fly and reused for unauthorized purposes. Using qualitative and quantitative methods we have conducted an empirical study focused on the usage of ā€œtheseā€ services and we have elaborated further the need for increasing the knowledge of people in the area of security and privacy while using ā€œfreeā€ services. This paper will highlight the challenges by setting a number of privacy and security concerns that are violated while using ā€œfreeā€ online services, also offering a birdā€™s eye view of numerous recommendations developed by various standard organizations

    The true cost of unusable password policies: password use in the wild

    Get PDF
    HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We present a study which re-examined password policies and password practice in the workplace today. 32 staff members in two organisations kept a password diary for 1 week, which produced a sample of 196 passwords. The diary was followed by an interview which covered details of each password, in its context of use. We find that users are in general concerned to maintain security, but that existing security policies are too inflexible to match their capabilities, and the tasks and contexts in which they operate. As a result, these password policies can place demands on users which impact negatively on their productivity and, ultimately, that of the organisation. We conclude that, rather than focussing password policies on maximizing password strength and enforcing frequency alone, policies should be designed using HCI principles to help the user to set an appropriately strong password in a specific context of use

    Learning the lessons from the developed world: e-banking security in Nigeria

    Get PDF
    In the past decade banks invested heavily in internet technology so as to engage in e-business and e-commerce activities. However, this development exposed banks to threats, such as online fraud. Consequently, there was a need to adopt security measures and controls to mitigate such threats. Banks in developed countries have developed a level of ā€˜best practiceā€™ to reduce such online threats. The objective of this study was to explore the extent to which banks in the developing world were benefitting from the experiences of banks in the developed world in terms of how they address online security threats. Case studies of two Nigerian Banks were undertaken using interviews and short questionnaire. The findings show respondents perceived the level of threats to e-banking in Nigeria to be low. When adopting e-banking security controls, the case study banks placed more emphasis on the technical dimension than the human dimension. Senior management commitment is a significant barrier to adopting best practice, which is highlighted in limited financial resources being provided for new investment in training or customer education. The study concludes that senior managers need to change their perceptions and priorities towards IT security to reduce the vulnerability of their e-banking services

    The problems of offenders with mental disorders: A plurality of perspectives within a single mental health care organisation

    Get PDF
    Managers, doctors, nurses, occupational therapists, social workers, psychologists, unqualified staff and service users were interviewed for a qualitative study of risk management and rehabilitation in an inner city medium secure forensic mental health care unit. Different professional orientations to service user problems were identified. Doctors focused primarily on the diagnosis of mental disorder, which they managed mainly through pharmaceutical interventions. Psychologists were principally concerned with personal factors, for example service user insight into their biographical history. Occupational therapists concentrated mainly on daily living skills, and social workers on post-discharge living arrangements. Some front line nurses, held accountable for security lapses, adopted a criminogenic approach. Service users were more likely than professionals to understand their needs in terms of their wider life circumstances. These differences are explored qualitatively in relation to four models of crossdisciplinary relationships: monoprofessional self-organisation combined with restricted communication; hermeneutic reaching out to other perspectives; the establishment of interdisciplinary sub-systems; and transdisciplinary merger. Relationships between professions working in this unit, as portrayed in qualitative interviews, corresponded mainly to the first model of monoprofessional self-organisation. Reasons for restricted crossdisciplinary understanding, particularly the wide power/status differences between the medical and other professions, and between staff and patients, are discussed
    • ā€¦
    corecore