2,273 research outputs found

    CERT strategy to deal with phishing attacks

    Full text link
    Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain phishing, and why an organization should deal with it and its challenges of providing. In addition, different kinds of this attack and classification of security approaches for organizational and lay users are addressed in this article. Finally, the CERT strategy is presented to deal with phishing and studying some anti-phishing

    Google dorks: Use cases and adoption study

    Get PDF
    The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals. In this usability study, we will measure the significance of 5 variables in the innovation diffusion model (IDT) namely Complexity, Compatibility, Relative advantage, Trialability, and observability in the adoption of Google dorks for searchrelated tasks for cybersecurity professionals. Keywords: Google dorks, Cybercriminal forums, Information gathering, Dark web, Defaced sites, Innovation diffusion theor

    E-Health: Value Proposition and Technologies Enabling Collaborative Healthcare

    Get PDF
    E-health, enabled by ubiquitous computing and communication technologies, is facilitating a fundamental shift in the age old praxis of healthcare. It is revolutionizing healthcare in the 21st century in much the same way as the arrival of modern medicine and vaccines did in the 19th century. E-health lies at the intersection of diverse disciplines including healthcare, computer science, information systems, economics, and political science. The broad impact of E-health on diverse domains, complexity of supporting technologies, and the dizzying interplay of theories bridging multiple disciplines creates a rich problem space for information system researchers and calls on to conduct cross-disciplinary research. In the current paper we present salient characteristics of e-health and discuss its value proposition. The value proposition of e-health presents the entire range of processes supporting the healthcare sector. We also present research opportunities as e-health takes center stage in the delivery of healthcare

    Medical data, digital health and ethical perspective

    Get PDF

    Visions and Challenges in Managing and Preserving Data to Measure Quality of Life

    Full text link
    Health-related data analysis plays an important role in self-knowledge, disease prevention, diagnosis, and quality of life assessment. With the advent of data-driven solutions, a myriad of apps and Internet of Things (IoT) devices (wearables, home-medical sensors, etc) facilitates data collection and provide cloud storage with a central administration. More recently, blockchain and other distributed ledgers became available as alternative storage options based on decentralised organisation systems. We bring attention to the human data bleeding problem and argue that neither centralised nor decentralised system organisations are a magic bullet for data-driven innovation if individual, community and societal values are ignored. The motivation for this position paper is to elaborate on strategies to protect privacy as well as to encourage data sharing and support open data without requiring a complex access protocol for researchers. Our main contribution is to outline the design of a self-regulated Open Health Archive (OHA) system with focus on quality of life (QoL) data.Comment: DSS 2018: Data-Driven Self-Regulating System

    HCI in e-Government and e-Democracy

    Full text link
    This chapter introduces the application of HCI design processes and design principles in e-government and e-democracy. We elaborate on HCI design processes and six HCI design principles in the context of e-government and e-democracy, including citizen-centered design, usability, accessibility, access to information, transaction efficiency, and security and privacy. Then, we present two cases to demonstrate the value of applying the HCI processes and design principles in developing and deploying e-government and e-democracy. Finally, we highlight the challenges faced by e-government and e-democracy as well as the future trends. In conclusion, HCI can help the success of e-government and e-democracy and their future growth

    User Perception of the U.S. Open Government Data Success Factors

    Get PDF
    This quantitative correlational study used the information systems success model to examine the relationship between the U.S. federal departments\u27 open data users\u27 perception of the system quality, perception of information quality, perception of service quality, and the intent to use open data from U.S. federal departments. A pre-existing information system success model survey instrument was used to collect data from 122 open data users. The result of the standard multiple linear regression was statistically significant to predict the intent to use the U.S. open government data F(3,99) = 6479.916, p \u3c0.01 and accounted for 99% of the variance in the intent to use the U.S. open government data (R²= .995), adjusted R²= .995. The interdependent nature of information quality, system quality, and service quality may have contributed to the value of the R². Cronbach\u27s alpha for this study is α=.99, and the value could be attributed to the fact that users of open data are not necessarily technical oriented, and were not able to distinguish the differences between the meanings of the variables. The result of this study confirmed that there is a relationship between the user\u27s perception of the system quality, perception of information quality, perception of service quality, and the intent to use open data from U.S. federal departments. The findings from this study might contribute to positive social change by enabling the solving of problems in the healthcare, education, energy sector, research community, digitization, and preservation of e-government activities. Using study, the results of this study, IT software engineers in the US federal departments, may be able to improve the gathering of user specifications and requirements in information system design

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems
    corecore