39,364 research outputs found

    How to design browser security and privacy alerts

    Get PDF
    Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research. Papers were analysed quantitatively and qualitatively to formulate a comprehensive set of guidelines. Our findings seek to provide developers and designers with guidance as to how to construct security and privacy alerts. We conclude by providing an alert template, highlighting its adherence to the derived guidelines

    Future consumer mobile phone security: a case study using the data centric security model

    Get PDF
    In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security threats, a number of solutions have been suggested,\ud mostly aiming at securing data rather than whole systems or networks.\ud However, these visions (such as proposed by the Jericho Forum [9] and IBM\ud [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is\ud unclear what data-centric security could mean for other systems and environments.\ud One particular category of systems that has been neglected is that of\ud consumer mobile phones. Currently, data security is usually limited to a PIN\ud number on startup and the option to disable wireless connections. The lack of\ud protection does not seem justified, as these devices have steadily increased in\ud capabilities and capacity; they can connect wirelessly to the Internet and have\ud a high risk of being lost or stolen [8]. This not only puts end users at risk, but\ud also their contacts, as phones can contain privacy sensitive data of many others.\ud For example, if birth dates and addresses are kept with the contact records, in\ud many cases a thief will have enough information to impersonate a contact and\ud steal his identity.\ud Could consumer mobile phones benefit from data-centric security? How\ud useful is data-centric security in this context? These are the core questions we\ud will try to address here

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure

    Corporate social responsibility in European football

    Get PDF

    CERT strategy to deal with phishing attacks

    Full text link
    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy is presented to deal with phishing and studying some anti-phishing

    Some Special Fields of Data Security

    Get PDF
    Our age is called information age which shows the importance of any kind of data. Because of this one should protect their (digital) data to prevent non-wanted entities accessing them.This is a permanent problem of enterprises and private persons as well. The technical prerequisites are given not only for eavesdropping the data of others but for securing our data as well. In this paper I show a possible and a low cost technical solution for a typical situation: how one can hide the digital footprints of his or her browsing the internet.SSH, portforward, privacy, data security

    Mental Health First Aid Training for VCU Faculty and Staff

    Get PDF
    Mental Health First Aid (MHFA), an international training program, teaches participants to notice and support individuals experiencing a mental health or substance use issue and connects them to appropriate resources. While resources exist for students, this project aims to implement MHFA as a professional development opportunity for VCU faculty and staff. A successful pilot training held this summer demonstrates the need and desire for training in the VCU community. Evidence shows mental health issues lead to absenteeism, employee turnover and increased healthcare costs, costing organizations billions in recruitment that may have been avoided. Through state partnerships, trainers are available to offer this one-day program multiple times a year

    National research and development project on healthy universities: final report

    Get PDF
    This report presents the findings of a National Research and Development Project, undertaken by the Healthy Settings Development Unit at the University of Central Lancashire and funded by the Higher Education Academy Health Sciences and Practice Subject Centre and the Department of Health. The aim of the project was to scope and report on the potential for a national programme on Healthy Universities that could contribute to health, well-being and sustainable development. The project comprised four strands: - Literature Review: A rapid review of relevant academic and policy-related literature conducted in order to clarify theory, scope practice and distil key contextual issues. - HEI-level Research: Comprising an overview audit and follow-up mapping and consultative research, this strand of the project provided an overview of Healthy University activity across English HEIs, generated in-depth data from a purposive sample of universities and explored perspectives on the potential development of a national programme on Healthy Universities. - National-Level Stakeholder Research: Using semi-structured interviews with nine key national stakeholder organisations, this strand of the project mapped current health-related roles and responsibilities and explored views regarding the potential development of a national programme on Healthy Universities. - Joint Action Planning and Reporting: In addition to reporting interim findings at relevant conferences and events, an interactive workshop was held with members of the English National Healthy Universities Network to present findings, validate data, inform the action planning process and secure further buy-in. The project highlighted that higher education offers enormous potential to impact positively on the health and well-being of students, staff and the wider community through education, research, knowledge exchange and institutional practice. It also suggested that investment for health within the sector will further contribute to core agendas such as staff and student recruitment, experience and retention; and institutional and societal productivity and sustainability. The research revealed the richness of activity taking place within HEIs and evidenced a rapid increase in interest in the Healthy University approach, pointing to a growing appreciation of the need for a comprehensive whole system approach that can map and understand interrelationships, interactions and synergies within higher education settings – with regard to different groups of the population, different components of the system and different health issues. There is a clear challenge involved in introducing and integrating ‘health’ within a sector that does not have this as its central aim, is characterised by ‘initiative overload’, is experiencing resource constraints and comprises fiercely autonomous institutions. However, there is also a widening recognition that such a system-based approach has significant added value – offering the potential to address health in a coherent and joined-up way and to forge connections to both health-related targets and core drivers within higher education. The report concludes that there is clear demand for national-level stakeholder organisations to demonstrate leadership through championing and resourcing a Healthy Universities Programme that not only adds value within the higher education sector, but also helps to build consistency of approach across the entire spectrum of education. It issues a number of recommendations with a view to responding to the findings and moving forward
    • 

    corecore