7,191 research outputs found

    Privacy, Security and Trust in the Internet of Neurons

    Get PDF
    Arpanet, Internet, Internet of Services, Internet of Things, Internet of Skills. What next? We conjecture that in 15-20 years from now we will have the Internet of Neurons, a new Internet paradigm in which humans will be able to connect bi-directionally to the net using only their brain. The Internet of Neurons will provide new, tremendous opportunities thanks to constant access to unlimited information. It will empower all those outside of the technical industry, actually it will empower all human beings, to access and use technological products and services as everybody will be able to connect, even without possessing a laptop, a tablet or a smartphone. The Internet of Neurons will thus ultimately complete the currently still immature democratization of knowledge and technology. But it will also bring along several enormous challenges, especially concerning security (as well as privacy and trust). In this paper we speculate on the worldwide deployment of the Internet of Neurons by 2038 and brainstorm about its disruptive impact, discussing the main technological (and neurological) breakthroughs required to enable it, the new opportunities it provides and the security challenges it raises. We also elaborate on the novel system models, threat models and security properties that are required to reason about privacy, security and trust in the Internet of Neurons.Comment: 8 pages, 7 figure

    Smart Humans... WannaDie?

    Get PDF
    It won't be long until our prostheses, ECG personal monitors, subcutaneous insulin infusors, glasses, etc. become devices of the Internet of Things (IoT), always connected for monitoring, maintenance, charging and tracking. This will be the dawn of the Smart Human, not just a user of the IoT but a Thing in the Internet. How long would it then take for hackers to attack us like they have been attacking IoT devices? What would happen if hackers were able to blackmail us threatening our IoT body parts? Smart Humans may become victims of the devastating attack of WannaDie, a new ransomware that could provide the plot-line for a possible future episode of the Black Mirror TV series.Comment: 5 pages, 3 figures, Accepted at the "Re-Coding Black Mirror" workshop of the International Conference Data Protection and Democracy (CPDP

    Memories for Life: A Review of the Science and Technology

    No full text
    This paper discusses scientific, social and technological aspects of memory. Recent developments in our understanding of memory processes and mechanisms, and their digital implementation, have placed the encoding, storage, management and retrieval of information at the forefront of several fields of research. At the same time, the divisions between the biological, physical and the digital worlds seem to be dissolving. Hence opportunities for interdisciplinary research into memory are being created, between the life sciences, social sciences and physical sciences. Such research may benefit from immediate application into information management technology as a testbed. The paper describes one initiative, Memories for Life, as a potential common problem space for the various interested disciplines

    Understanding and Predicting the Determinants of Consumers’ Acceptance and Usage of M-commerce Application: Hybrid SEM and Neural Network Approach

    Get PDF
    In m-commerce, privacy and security are major concerns. Existing research has examined the privacy and relationship, security, and intention to use. However, the determinants of privacy and security in mobile commerce remain largely unexplored. A study based on UTAUT2 and trust examines the factors that influence mobile commerce privacy and security. By using the approach of hybrid SEM/ANN analysis, it is possible to detect non-linear and non-compensatory relationships. According to linear and compensatory models, the absence of one determinant can be compensated for by another. The decision-making process of consumers is actually quite complex, and non-compensatory or linear models tend to simplify it. The sample is collected by using a mobile commerce application in order to gather 890 datasets on mobile commerce consumers. Findings: (1) Two determinants of M-commerce acceptance and use had an explicit and significant positive effect. Security and individual are two of these factors. (2) Privacy concerns have a severe negative impact on M-commerce acceptance and use. (3) Trust is found to partially mediate the effect on behavioral intentions of Security Factors (SCF), Privacy Factors (PRF), and Individual Factors (INF) on m-commerce in Jordan (INTENTION). According to the integrated model, m-commerce offers 71% privacy, security, and trust. Doi: 10.28991/ESJ-2022-06-06-018 Full Text: PD
    corecore