12 research outputs found

    Flow analysis based on role and pattern matching

    Get PDF
    Flow analysis has always been a great concern for a network system. An attacker can gain important information through several ways by monitoring the frequency and timing of network packets or by impersonating another user through remote access. Access to a network system based on single-factor authentication is nothing but monitoring the perimeter around the network leaving a company\u27s a network wide open for the inside threat. There is a necessity to develop a classic network to reduce or eliminate threats within the organization. This thesis will analyze the flows to inspect every activity performed within the network in order for the untrusted flows to earn their way in becoming trusted flows based on notion of flow activity matching a specified pattern affiliated with the role

    Unauthorized Access

    Get PDF
    Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security

    Conceptual metaphor in English popular technology and Greek translation

    Get PDF
    This research project studies the metaphorical conceptualisation of technology in English popular technology magazines and in translation in the respective Greek editions. The focus is on the cognitive linguistic view of metaphor initially presented by Lakoff and Johnson (1980), on the metaphor identification procedure (Pragglejaz Group 2007), and critical metaphor analysis (Charteris-Black 2004). The analysis of the English data identifies 14 main metaphors and 29 submetaphors which contribute to the structure of the target domain of technology. It distinguishes between conventional and novel metaphors, and common and original metaphorical expressions, motivated by correlations in experience between diverse source domains and by the widespread diffusion and impact of technology. The English data also provide insight into the functions of these metaphors in popular technology discourse and reveal evidence to thinking, values and attitudes about technology in the English language. The analysis of the Greek data examines similarities and differences in the conceptualisations between the English and Greek languages and cultures, and finds similarities in the categories of metaphors, frequency of and preference for metaphor use in the source and target languages, and in the majority of metaphorical expressions. Similarities are based on common experiences stemming from experiential co-occurrence or experiential similarity, and on translated experience. Differences are restricted to specific-level metaphors and expressions, motivated by alternative conceptualisations of terminology, cultural specificity and preferential conceptualisations. A set of translation strategies and a number of possible translation effects are also identified. These strategies and effects add to the possibilities of translation variations and the range of translation options, and are used to draw conclusions regarding the similarities and differences between the English and Greek languages and cultures. Consequently, through the identification and description of metaphors in technology magazines and in translation, the study attempts to highlight aspects of the culture of technology, which views technology as a cultural artefact and a producer of its own culture.EThOS - Electronic Theses Online ServiceGreek State Scholarship Foundation (IKY)GBUnited Kingdo

    Deep Learning -Powered Computational Intelligence for Cyber-Attacks Detection and Mitigation in 5G-Enabled Electric Vehicle Charging Station

    Get PDF
    An electric vehicle charging station (EVCS) infrastructure is the backbone of transportation electrification. However, the EVCS has various cyber-attack vulnerabilities in software, hardware, supply chain, and incumbent legacy technologies such as network, communication, and control. Therefore, proactively monitoring, detecting, and defending against these attacks is very important. The state-of-the-art approaches are not agile and intelligent enough to detect, mitigate, and defend against various cyber-physical attacks in the EVCS system. To overcome these limitations, this dissertation primarily designs, develops, implements, and tests the data-driven deep learning-powered computational intelligence to detect and mitigate cyber-physical attacks at the network and physical layers of 5G-enabled EVCS infrastructure. Also, the 5G slicing application to ensure the security and service level agreement (SLA) in the EVCS ecosystem has been studied. Various cyber-attacks such as distributed denial of services (DDoS), False data injection (FDI), advanced persistent threats (APT), and ransomware attacks on the network in a standalone 5G-enabled EVCS environment have been considered. Mathematical models for the mentioned cyber-attacks have been developed. The impact of cyber-attacks on the EVCS operation has been analyzed. Various deep learning-powered intrusion detection systems have been proposed to detect attacks using local electrical and network fingerprints. Furthermore, a novel detection framework has been designed and developed to deal with ransomware threats in high-speed, high-dimensional, multimodal data and assets from eccentric stakeholders of the connected automated vehicle (CAV) ecosystem. To mitigate the adverse effects of cyber-attacks on EVCS controllers, novel data-driven digital clones based on Twin Delayed Deep Deterministic Policy Gradient (TD3) Deep Reinforcement Learning (DRL) has been developed. Also, various Bruteforce, Controller clones-based methods have been devised and tested to aid the defense and mitigation of the impact of the attacks of the EVCS operation. The performance of the proposed mitigation method has been compared with that of a benchmark Deep Deterministic Policy Gradient (DDPG)-based digital clones approach. Simulation results obtained from the Python, Matlab/Simulink, and NetSim software demonstrate that the cyber-attacks are disruptive and detrimental to the operation of EVCS. The proposed detection and mitigation methods are effective and perform better than the conventional and benchmark techniques for the 5G-enabled EVCS

    Untangling the Web: A Guide To Internet Research

    Get PDF
    [Excerpt] Untangling the Web for 2007 is the twelfth edition of a book that started as a small handout. After more than a decade of researching, reading about, using, and trying to understand the Internet, I have come to accept that it is indeed a Sisyphean task. Sometimes I feel that all I can do is to push the rock up to the top of that virtual hill, then stand back and watch as it rolls down again. The Internet—in all its glory of information and misinformation—is for all practical purposes limitless, which of course means we can never know it all, see it all, understand it all, or even imagine all it is and will be. The more we know about the Internet, the more acute is our awareness of what we do not know. The Internet emphasizes the depth of our ignorance because our knowledge can only be finite, while our ignorance must necessarily be infinite. My hope is that Untangling the Web will add to our knowledge of the Internet and the world while recognizing that the rock will always roll back down the hill at the end of the day

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    Modern Socio-Technical Perspectives on Privacy

    Get PDF
    This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern topics (e.g., privacy in social media, IoT) and underexplored areas (e.g., privacy accessibility, privacy for vulnerable populations, cross-cultural privacy). The book is structured in four parts, which follow after an introduction to privacy on both a technical and social level: Privacy Theory and Methods covers a range of theoretical lenses through which one can view the concept of privacy. The chapters in this part relate to modern privacy phenomena, thus emphasizing its relevance to our digital, networked lives. Next, Domains covers a number of areas in which privacy concerns and implications are particularly salient, including among others social media, healthcare, smart cities, wearable IT, and trackers. The Audiences section then highlights audiences that have traditionally been ignored when creating privacy-preserving experiences: people from other (non-Western) cultures, people with accessibility needs, adolescents, and people who are underrepresented in terms of their race, class, gender or sexual identity, religion or some combination. Finally, the chapters in Moving Forward outline approaches to privacy that move beyond one-size-fits-all solutions, explore ethical considerations, and describe the regulatory landscape that governs privacy through laws and policies. Perhaps even more so than the other chapters in this book, these chapters are forward-looking by using current personalized, ethical and legal approaches as a starting point for re-conceptualizations of privacy to serve the modern technological landscape. The book’s primary goal is to inform IT students, researchers, and professionals about both the fundamentals of online privacy and the issues that are most pertinent to modern information systems. Lecturers or teacherscan assign (parts of) the book for a “professional issues” course. IT professionals may select chapters covering domains and audiences relevant to their field of work, as well as the Moving Forward chapters that cover ethical and legal aspects. Academicswho are interested in studying privacy or privacy-related topics will find a broad introduction in both technical and social aspects

    Bringing light into the dark side of digitalization : consequences, antecedents, and mitigation mechanisms

    Get PDF
    As digital technologies permeate all aspects of our professional and private lives, digitalization causes profound changes for individuals, organizations, and societies. The use of digital technologies makes many activities easier, safer, faster, or more comfortable. In addition to many positive changes, digital technologies are also associated with numerous risks and side effects. The use of digital technologies might come along with severe negative consequences for individuals, organizations, and societies. The negative consequences can be triggered by various antecedents. In addition to identifying the negative consequences of digitalization and their antecedents, it is particularly important to develop appropriate mitigation mechanisms. This dissertation provides novel insights for IS researchers to better understand the negative consequences of using digital technologies. It contains a broad overview of the risks and side effects of digitalization and investigates related antecedents and mitigation mechanisms. To reach this goal, regarding research methods, this dissertation relies on the structured analysis of (scientific) literature and (expert) interviews as well as the analysis and interpretation of empirical data. Chapter 2 contributes to the research on the negative consequences of digitalization. Section 2.1 provides a comprehensive multi-level taxonomy of the risks and side effects of digitalization (RSEDs). Section 2.2 builds on Section 2.1 and is a substantial expansion and improvement of Section 2.1. The iterative taxonomy development process was complemented by four additional cycles. The final taxonomy comprises 11 RSEDs and their 39 subtypes. Both articles show that there is a wide range of risks and side effects of digitalization that need to be explored in more detail in the future. Chapter 3 focuses on the antecedents of digitalizations negative consequences. Section 3.1 sheds light on individuals concerns towards automated decision-making. The concerns are derived from academic literature and semi-structured interviews with potential users of algorithm-based technologies. Section 3.2 focuses on the evaluation of specific mHealth app features by potential users in Germany and Denmark. The study draws on survey data from both countries analyzed using the Kano method. Further, it comprises a quartile-based sample split approach to identify the underlying relationships between users characteristics and their perceptions of the mHealth app features. The results show significant differences between Germans and Danes in the evaluation of the app features and demonstrate which of the user characteristics best explain these differences. Both articles shed light on possible antecedents of negative consequences (i.e., user dissatisfaction, non-use) and thus contribute to a better understanding of the occurrence of negative consequences. Chapter 4 shows exemplary mitigation mechanisms to cope with the negative consequences of digitalization. Section 4.1 takes an organizational perspective and identifies data privacy measures that can be implemented by organizations to protect the personal data of their customers and address their privacy concerns. These measures were evaluated by analyzing data from two independent online surveys with the help of the Kano method. Section 4.2 focuses on an individual perspective by presenting the concept of a privacy bot that contributes to strengthening the digital sovereignty of internet users. With the help of the privacy bot, page-long privacy statements can be checked against previously stored individual data protection preferences. Both articles provide appropriate mitigation mechanisms to cope with users privacy concerns. These two examples show that there are a variety of ways to counter the risks and side effects of digitalization. The research articles included in this dissertation identify various risks and side effects of digitalization that need to be explored in more detail in future research. The two articles on antecedents help to better understand the occurrence of negative consequences of digitalization. The development of appropriate countermeasures, two of which are exemplified in this dissertation, should result in the benefits of digital technologies outweighing their risks.Da digitale Technologien alle Bereiche unseres beruflichen und privaten Lebens durchdringen, bewirkt die Digitalisierung tiefgreifende Veränderungen für Individuen, Organisationen und Gesellschaften. Viele Aktivitäten werden durch den Einsatz digitaler Technologien einfacher, sicherer, schneller oder bequemer. Neben vielen positiven Veränderungen sind digitale Technologien aber auch mit zahlreichen Risiken und Nebenwirkungen verbunden. Der Einsatz digitaler Technologien kann mit schwerwiegenden negativen Folgen für Individuen, Organisationen und Gesellschaften einhergehen. Diese negativen Folgen können durch verschiedene Einflussfaktoren ausgelöst werden. Zusätzlich zur Identifizierung der negativen Folgen der Digitalisierung und ihrer Ursachen ist es besonders wichtig, geeignete Schutzmaßnahmen zu entwickeln. Diese Dissertation liefert neue Erkenntnisse für IS-Forscher:innen, um die negativen Folgen der Nutzung digitaler Technologien besser zu verstehen. Sie enthält einen breiten Überblick über die Risiken und Nebenwirkungen der Digitalisierung und untersucht die damit verbundenen Ursachen und Schutzmaßnahmen. Um dieses Ziel zu erreichen, stützt sich die Dissertation forschungsmethodisch auf die strukturierte Analyse von (wissenschaftlicher) Literatur und (Expert:innen-)Interviews sowie auf die Auswertung und Interpretation empirischer Daten. Kapitel 2 leistet einen Beitrag zur Forschung über die negativen Folgen der Digitalisierung. Abschnitt 2.1 liefert eine umfassende mehrstufige Taxonomie der Risiken und Nebenwirkungen der Digitalisierung (RSEDs). Abschnitt 2.2 baut auf Abschnitt 2.1 auf und ist eine wesentliche Erweiterung und Verbesserung von Abschnitt 2.1. Der iterative Taxonomieentwicklungsprozess wurde durch vier weitere Zyklen ergänzt. Die endgültige Taxonomie umfasst 11 RSED und 39 Untertypen. Beide Artikel zeigen, dass es ein breites Spektrum an Risiken und Nebenwirkungen der Digitalisierung gibt, das in Zukunft noch genauer erforscht werden muss. Kapitel 3 befasst sich mit den Ursachen der negativen Folgen der Digitalisierung. Abschnitt 3.1 beleuchtet die Bedenken von Individuen gegenüber automatisierten Entscheidungen. Die Bedenken wurden aus wissenschaftlicher Literatur und halbstrukturierten Interviews mit potenziellen Nutzer:innen algorithmusbasierter Technologien abgeleitet. Abschnitt 3.2 konzentriert sich auf die Bewertung spezifischer Funktionen von mHealth-Apps durch potenzielle Nutzer in Deutschland und Dänemark. Die Studie basiert auf Umfragedaten aus beiden Ländern, die mit der Kano-Methode analysiert wurden. Darüber hinaus umfasst sie einen quartil-basierten Stichproben-Split-Ansatz, um die zugrundeliegenden Beziehungen zwischen den Merkmalen der Nutzer (z.B. Bedenken hinsichtlich des Datenschutzes) und ihrer Wahrnehmung der Funktionen von mHealth-Apps zu ermitteln. Die Ergebnisse zeigen signifikante Unterschiede zwischen Deutschen und Dänen bei der Bewertung der App-Funktionen und zeigen, welche der Nutzermerkmale diese Unterschiede am besten erklären. Beide Artikel beleuchten mögliche Ursachen negativer Folgen (z.B. Unzufriedenheit der Nutzer, Nichtnutzung) und tragen so zu einem besseren Verständnis des Auftretens negativer Folgen bei. Kapitel 4 zeigt beispielhafte Schutzmaßnahmen zur Bewältigung der negativen Folgen der Digitalisierung. Abschnitt 4.1 nimmt eine organisationale Perspektive ein und identifiziert Datenschutzmaßnahmen, die von Unternehmen umgesetzt werden können, um die personenbezogenen Daten ihrer Kund:innen zu schützen und deren Datenschutzbedenken zu berücksichtigen. Diese Maßnahmen wurden durch die Analyse von Daten aus zwei unabhängigen Online-Umfragen mit Hilfe der Kano-Methode evaluiert. In Abschnitt 4.2 wird eine individuelle Perspektive eingenommen, indem das Konzept eines Privacy Bots vorgestellt wird, der zur Stärkung der digitalen Souveränität von Internetnutzer:innen beiträgt. Mithilfe des Privacy Bots können seitenlange Datenschutzerklärungen mit zuvor gespeicherten individuellen Datenschutzpräferenzen abgeglichen werden. Beide Artikel beschreiben geeignete Schutzmaßnahmen, um den Datenschutzbedenken der Nutzer:innen gerecht zu werden. Diese beiden Beispiele zeigen, dass es eine Vielzahl von Möglichkeiten gibt, den Risiken und Nebenwirkungen der Digitalisierung zu begegnen. Die in dieser Dissertation enthaltenen Forschungsartikel zeigen verschiedene Risiken und Nebenwirkungen der Digitalisierung auf, die in der zukünftigen Forschung noch genauer untersucht werden müssen. Die beiden Artikel zu den Ursachen helfen, das Auftreten von negativen Konsequenzen der Digitalisierung besser zu verstehen. Die Entwicklung geeigneter Schutzmaßnahmen, von denen zwei in dieser Dissertation beispielhaft vorgestellt werden, sollte dazu führen, dass die Vorteile der digitalen Technologien ihre Risiken überwiegen

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security
    corecore