3,479 research outputs found

    Personal security in travel by public transport : the role of traveller information and associated technologies

    Get PDF
    Acknowledgement This research reported in this paper has been funded by a grant award from the Engineering and Physical Sciences Research Council: EP/I037032/1.Peer reviewedPublisher PD

    Insider Threats in Emerging Mobility-as-a-Service Scenarios

    Get PDF
    Mobility as a Service (MaaS) applies the everything-as- \ a-service paradigm of Cloud Computing to transportation: a MaaS \ provider offers to its users the dynamic composition of solutions of \ different travel agencies into a single, consistent interface. \ Traditionally, transits and data on mobility belong to a scattered \ plethora of operators. Thus, we argue that the economic model of \ MaaS is that of federations of providers, each trading its resources to \ coordinate multi-modal solutions for mobility. Such flexibility comes \ with many security and privacy concerns, of which insider threat is \ one of the most prominent. In this paper, we follow a tiered structure \ — from individual operators to markets of federated MaaS providers \ — to classify the potential threats of each tier and propose the \ appropriate countermeasures, in an effort to mitigate the problems

    Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010

    Get PDF
    It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of ‘security’ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U

    Identity Theft Prevention Measures for State Unemployment Benefits Offices: A Case Study of Workforce West Virginia

    Get PDF
    Identity theft continues to pose an increasingly complex problem for government benefits offices. The purpose of this study was to explore the environmental factors that affected a state unemployment benefits office’s ability to reduce identity theft. Current research focused on protecting information systems’ hardware, software, and related infrastructure, focusing on cyberattacks such as phishing, Trojan horses, or illegal access. The U.S. government focuses on informing the consumer and assisting small businesses through risk assessments, strategic plans, and regulations for cybersecurity. Researchers have not conducted a thorough investigation of the environment that makes state government benefit offices susceptible to identity theft. The theoretical framework for this study was open systems theory using the six dimensions of digital governance. The research question involved the identification of the barriers to a state unemployment benefits office’s ability to reduce identity theft. A qualitative case study approach concentrated on the external environmental factors that affect the system. Data collection included documents, archival records, and artifacts from multiple sources. The outcome of this research may help to inform state governments to improve policies and procedures by providing administrative, operational, and technical controls. This study has implications for positive social change to inform efforts to reduce human costs (identity theft) and financial costs (government program fraud and individual recovery)

    Conceivable security risks and authentication techniques for smart devices

    Get PDF
    With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
    corecore