145 research outputs found

    Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets

    Get PDF
    Children data privacy must be considered as integral and factored into the system design of Smart Connected Toy (SCT). The challenge is that SCTs are capable to gather significant amount volunteered and non-volunteered data, which lacks privacy considerations. It is imperative to adopt a modeling technique that autonomously preserves privacy and secure children’s data in SCT transactions. This paper surveys the current data flow modeling techniques, which most of them do not have elements to address the privacy of Personal Identifiable Information (PII). This paper shows a Petri-Net simulation which provides privacy assurance in order to minimize the risk of privacy violation of a child’s PII and related data

    HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets

    Get PDF
    Children data privacy must be considered as integral and factored into the system design of Smart Connected Toy (SCT). The challenge is that SCTs are capable to gather significant amount volunteered and non-volunteered data, which lacks privacy considerations. It is imperative to adopt a modeling technique that autonomously preserves privacy and secure children’s data in SCT transactions. This paper surveys the current data flow modeling techniques, which most of them do not have elements to address the privacy of Personal Identifiable Information (PII). This paper shows a Petri-Net simulation which provides privacy assurance in order to minimize the risk of privacy violation of a child’s PII and related data

    A Literature Survey on Smart Toy-related Children\u27s Privacy Risks

    Get PDF
    Smart toys have become popular as technological solutions offer a better experience for children. However, the technology used increases the risks to children\u27s privacy, which does not seem to have become a real concern for toy makers. Most researchers in this domain are vague in defining their motivations due to lack of an expert survey to support them. We conducted a literature survey to find papers on smart toy-related children\u27s privacy risks and mitigation solutions. We analyzed 26 papers using a taxonomy for privacy principles and preserving techniques adapted from the IoT context. Our analysis shows that some types of risks received more attention, especially (a) confidentiality, (b) use, retention and disclosure limitation, (c) authorization, (d) consent and choice, (e) openness, transparency and notice and (f) authentication. As for solutions, few were effectively presented; the vast majority related to data restriction -- (a) access control and (b) cryptographic

    Computer Science & Technology Series : XXI Argentine Congress of Computer Science. Selected papers

    Get PDF
    CACIC’15 was the 21thCongress in the CACIC series. It was organized by the School of Technology at the UNNOBA (North-West of Buenos Aires National University) in Junín, Buenos Aires. The Congress included 13 Workshops with 131 accepted papers, 4 Conferences, 2 invited tutorials, different meetings related with Computer Science Education (Professors, PhD students, Curricula) and an International School with 6 courses. CACIC 2015 was organized following the traditional Congress format, with 13 Workshops covering a diversity of dimensions of Computer Science Research. Each topic was supervised by a committee of 3-5 chairs of different Universities. The call for papers attracted a total of 202 submissions. An average of 2.5 review reports werecollected for each paper, for a grand total of 495 review reports that involved about 191 different reviewers. A total of 131 full papers, involving 404 authors and 75 Universities, were accepted and 24 of them were selected for this book.Red de Universidades con Carreras en Informática (RedUNCI

    Computer Science & Technology Series : XXI Argentine Congress of Computer Science. Selected papers

    Get PDF
    CACIC’15 was the 21thCongress in the CACIC series. It was organized by the School of Technology at the UNNOBA (North-West of Buenos Aires National University) in Junín, Buenos Aires. The Congress included 13 Workshops with 131 accepted papers, 4 Conferences, 2 invited tutorials, different meetings related with Computer Science Education (Professors, PhD students, Curricula) and an International School with 6 courses. CACIC 2015 was organized following the traditional Congress format, with 13 Workshops covering a diversity of dimensions of Computer Science Research. Each topic was supervised by a committee of 3-5 chairs of different Universities. The call for papers attracted a total of 202 submissions. An average of 2.5 review reports werecollected for each paper, for a grand total of 495 review reports that involved about 191 different reviewers. A total of 131 full papers, involving 404 authors and 75 Universities, were accepted and 24 of them were selected for this book.Red de Universidades con Carreras en Informática (RedUNCI

    Strategies to Protect Against Security Violations During the Adoption of the Internet of Things by Manufacturers

    Get PDF
    Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with corporate-level IT leaders (n = 6) and examination of company documents (n = 10). The data analysis process involved searching patterns for words, codes, or themes and their relationships to confirm the findings. During analysis, four major themes emerged: relevance of securing IoT devices in IoT adoption, identifying and separating personal and confidential data from analytical data, adequate budget for securing IoT network devices and infrastructure as key factors in IoT adoption, and risk mitigation policy relevant to securing IoT devices. The implications for positive social change include the potential for corporate-level IT leaders to develop tools that will detect threats, prevent malicious attacks, and monitor IoT networks for any IoT device vulnerabilities. Improved protection from security violations may result in more efficient ways for people to use natural resources. Additionally, there may be a wider usage of smartphones connected to IoT to simplify people’s lives

    Preface

    Get PDF

    How digital data are used in the domain of health: A short review of current knowledge

    Get PDF
    In the era of digitalization, digital data is available about every aspect of our daily lives, including our physical and mental health. Digital data has been applied in the domain of healthcare for the detection of an outbreak of infectious diseases, clinical decision support, personalized care, and genomics. This paper will serve as a review of the rapidly evolving field of digital health. More specifically, we will discuss (1) big data and physical health, (2) big data and mental health, (3) digital contact tracing during the COVID-19 pandemic, and finally, (4) ethical issues with using digital data for health-related purposes. With this review, we aim to stimulate a public debate on the appropriate usage of digital data in the health sector
    corecore