116,282 research outputs found
Usersâ Behavior of Identity Protection and Online Data Security Management
The objective of this study was to understand the userâs IT knowledge to account and data management practices related to personal, social, and business. Internet is global and the vulnerability is global too. The Internet has become part of the people who are engaged with it. The purpose of the study was to learn the level of usersâ IT knowledge through the account, identity protection, and online data management practices to understand the relationship and design the needed programs to enhance their knowledge for better protection. With the increase in users of mobile phones, laptops, desktops emerge issues and development measures. The identified gap was between the usersâ IT knowledge and their practices on account and data management. This gap was identified to help design programs to help the users to develop strategies through various alternatives to prevent identity and data theft. The population of data was collected in AIU for strengthening in protecting identity theft and data theft of our faculty members, staff members, students, and other stakeholders. Two samples Chi-Square was used for the analysis of data for the rejection or acceptance of null or alternate hypotheses based on critical value using Microsoft excel. The analysis was individually done for all the 27 factors considered in this research. Results show eight factors had a significant relationship, and 19 factors do not significantly relate between usersâ IT knowledge and data management and practices. A follow-up study will be conducted on the sub-ordinate level of usersâ behavior and practice of identity theft and data protection.
Keywords: User experience, identity protection, online data management and practice
Perceived risk and sensitive data on mobile devices
This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices
Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Authentication and authorization are critical security layers to protect a
wide range of online systems, services and content. However, the increased
prevalence of wearable and mobile devices, the expectations of a frictionless
experience and the diverse user environments will challenge the way users are
authenticated. Consumers demand secure and privacy-aware access from any
device, whenever and wherever they are, without any obstacles. This paper
reviews emerging trends and challenges with frictionless authentication systems
and identifies opportunities for further research related to the enrollment of
users, the usability of authentication schemes, as well as security and privacy
trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security
Information, Systems and Technologies (SECURWARE 2017
Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061
The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts
InShopnito: an advanced yet privacy-friendly mobile shopping application
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and binding existing ones to a retailer's services, existing MSAs have several shortcomings. The data collection practices involved in MSAs and the lack of transparency thereof are important concerns for many customers. This paper presents inShopnito, a privacy-preserving mobile shopping application. All transactions made in inShopnito are unlinkable and anonymous. However, the system still offers the expected features from a modern MSA. Customers can take part in loyalty programs and earn or spend loyalty points and electronic vouchers. Furthermore, the MSA can suggest personalized recommendations even though the retailer cannot construct rich customer profiles. These profiles are managed on the smartphone and can be partially disclosed in order to get better, customized recommendations. Finally, we present an implementation called inShopnito, of which the security and performance is analyzed. In doing so, we show that it is possible to have a privacy-preserving MSA without having to sacrifice practicality
- âŠ