116,282 research outputs found

    Users’ Behavior of Identity Protection and Online Data Security Management

    Get PDF
    The objective of this study was to understand the user’s IT knowledge to account and data management practices related to personal, social, and business. Internet is global and the vulnerability is global too. The Internet has become part of the people who are engaged with it. The purpose of the study was to learn the level of users’ IT knowledge through the account, identity protection, and online data management practices to understand the relationship and design the needed programs to enhance their knowledge for better protection. With the increase in users of mobile phones, laptops, desktops emerge issues and development measures. The identified gap was between the users’ IT knowledge and their practices on account and data management. This gap was identified to help design programs to help the users to develop strategies through various alternatives to prevent identity and data theft. The population of data was collected in AIU for strengthening in protecting identity theft and data theft of our faculty members, staff members, students, and other stakeholders. Two samples Chi-Square was used for the analysis of data for the rejection or acceptance of null or alternate hypotheses based on critical value using Microsoft excel. The analysis was individually done for all the 27 factors considered in this research. Results show eight factors had a significant relationship, and 19 factors do not significantly relate between users’ IT knowledge and data management and practices. A follow-up study will be conducted on the sub-ordinate level of users’ behavior and practice of identity theft and data protection. Keywords: User experience, identity protection, online data management and practice

    Perceived risk and sensitive data on mobile devices

    Get PDF
    This paper reports on a survey to investigate the behaviour and assumptions of smartphone users, with reference to the security practices adopted by such users. The primary objective was to shed light on the level of information security awareness in smartphone users and determine the extent of sensitive information such users typically hold on these mobile devices

    Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities

    Get PDF
    Authentication and authorization are critical security layers to protect a wide range of online systems, services and content. However, the increased prevalence of wearable and mobile devices, the expectations of a frictionless experience and the diverse user environments will challenge the way users are authenticated. Consumers demand secure and privacy-aware access from any device, whenever and wherever they are, without any obstacles. This paper reviews emerging trends and challenges with frictionless authentication systems and identifies opportunities for further research related to the enrollment of users, the usability of authentication schemes, as well as security and privacy trade-offs of mobile and wearable continuous authentication systems.Comment: published at the 11th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2017

    Online privacy: towards informational self-determination on the internet : report from Dagstuhl Perspectives Workshop 11061

    Get PDF
    The Dagstuhl Perspectives Workshop "Online Privacy: Towards Informational Self-Determination on the Internet" (11061) has been held in February 6-11, 2011 at Schloss Dagstuhl. 30 participants from academia, public sector, and industry have identified the current status-of-the-art of and challenges for online privacy as well as derived recommendations for improving online privacy. Whereas the Dagstuhl Manifesto of this workshop concludes the results of the working groups and panel discussions, this article presents the talks of this workshop by their abstracts

    InShopnito: an advanced yet privacy-friendly mobile shopping application

    Get PDF
    Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and binding existing ones to a retailer's services, existing MSAs have several shortcomings. The data collection practices involved in MSAs and the lack of transparency thereof are important concerns for many customers. This paper presents inShopnito, a privacy-preserving mobile shopping application. All transactions made in inShopnito are unlinkable and anonymous. However, the system still offers the expected features from a modern MSA. Customers can take part in loyalty programs and earn or spend loyalty points and electronic vouchers. Furthermore, the MSA can suggest personalized recommendations even though the retailer cannot construct rich customer profiles. These profiles are managed on the smartphone and can be partially disclosed in order to get better, customized recommendations. Finally, we present an implementation called inShopnito, of which the security and performance is analyzed. In doing so, we show that it is possible to have a privacy-preserving MSA without having to sacrifice practicality
    • 

    corecore