214 research outputs found

    Reengineering the user: Privacy concerns about personal data on smartphones.

    Get PDF
    Purpose: This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed. Design/methodology/approach: The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed. Findings: The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices. Research limitations/implications: The proposed approach was evaluated through an examination of the Android’s permission model, although issues arise in other operating systems. The authors’ future intention is to conduct a user study to measure the user’s awareness and concepts surrounding privacy concerns to empirically investigate the above-mentioned suggestions. Practical implications: The proposed suggestions in this paper, if adopted in practice, could significantly improve the situation and mitigate privacy concerns of users of smart devices. Social implications: The recommendations proposed in this paper would strongly enhance the control of users over their personal data and improve their ability to distinguish legitimate apps from malware or grayware. Originality/value: This paper emphasises two shortcomings of the permissions models of mobile operating systems which, in authors’ view, have not been adequately addressed to date and propose an inherent way for apps and other entities of the mobile computing ecosystem to commit to responsible and transparent practices on mobile users’ privacy

    A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description protocol

    Get PDF
    In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if appropriate forensic readiness processes and controls are in place, a wealth of evidence can be obtained. The type of the end user equipment of the internal users, the private IP, the software that is used can help build a reliable baseline information database. On the other hand the private IP addresses of the potential attacker even during the presence of NAT services, as well as and the attack tools employed by the malicious parties are logged for further analysis

    Effect of polydispersity and bubble clustering on the steady shear viscosity of dilute bubble suspensions in Newtonian media

    Get PDF
    This work examines the steady shear viscosity of dilute polydisperse bubble suspensions generated in a mixture of mineral oil and span 80. We proved theoretically that, in polydisperse bubble suspensions, the shear-thinning behavior spans a capillary number (Ca) range between 0.01 and 100, instead of occurring at Ca~1, which is the case for monodisperse suspensions. However, for the effect of polydispersity to become apparent, the bubble size distribution should be bimodal, with very small and very large bubbles having similar volume fractions. In any other case, we can consider the polydisperse suspension as monodisperse, with a volume-weighted average diameter (d43). To confirm the theoretical results, we carried out steady shear rheological tests. Our measurements revealed an unexpected double power-law decay of the relative viscosity. To investigate this behavior further, we visualized the produced bubble suspensions under shear. The visualization experiments revealed that bubbles started forming clusters and threads at average capillary number around 0.01, where we observed the first decay of viscosity. CFD simulations confirmed that under the presence of bubble clusters and threads the fluid streamlines distort less, thus resulting in a decrease of the suspension viscosity. Consequently, we can attribute the first decay of the relative viscosity to the formation of bubble clusters and threads, proving that the novel shear-thinning behavior we observed is due to a combination of bubble clustering and deformation

    Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment

    Get PDF
    Purpose – This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the effectiveness of audio CAPTCHA systems by adapting the challenges to the user characteristics. Design/methodology/approach – A prototype has been designed, called PrivCAPTCHA, to offer privacy-preserving, user-centric CAPTCHA challenges. Anonymous credential proofs are integrated into the Session Initiation Protocol (SIP) protocol and the approach is evaluated in a real-world Voice over Internet Protocol (VoIP) environment. Findings – The results of this work indicate that it is possible to create VoIP CAPTCHA services offering privacy-preserving, user-centric challenges while maintaining sufficient efficiency. Research limitations/implications – The proposed approach was evaluated through an experimental implementation to demonstrate its feasibility. Additional features, such as appropriate user interfaces and efficiency optimisations, would be useful for a commercial product. Security measures to protect the system from attacks against the SIP protocol would be useful to counteract the effects of the introduced overhead. Future research could investigate the use of this approach on non-audio CAPTCHA services. Practical implications – PrivCAPTCHA is expected to achieve fairer, non-discriminating CAPTCHA services while protecting the user’s privacy. Adoption success relies upon the general need for employment of privacy-preserving practices in electronic interactions. Social implications – This approach is expected to enhance the quality of life of users, who will now receive CAPTCHA challenges closer to their characteristics. This applies especially to users with disabilities. Additionally, as a privacy-preserving service, this approach is expected to increase trust during the use of services that use it. Originality/value – To the best of authors’ knowledge, this is the first comprehensive proposal for privacy-preserving CAPTCHA challenge adaptation. The proposed system aims at providing an improved CAPTCHA service that is more appropriate for and trusted by human users

    Negotiating the EU data protection reform: reflections on the household exemption

    Get PDF
    The re-drafting of the household exemption comprises one of the main areas of dispute in the ongoing negotiations for the EU data protection reform. The aim of this paper is twofold: First, we present and critically assess the wording proposals that have been put forward mainly at EU institutional level and identify the particular areas which cause tension. Second, we concomitantly ask which is the most appropriate wording for the exemption in question and in particular, whether the household exemption should comprise a set of decisive criteria or whether it should provide a more general framework. We eventually argue for a broad wording of the Article 2(2)(d) coupled with the addition of further non-determinative criteria at Recital 15, i.e. the non-operative part of the proposed Regulation

    The Structure of Stellar Coronae in Active Binary Systems

    Get PDF
    A survey of 28 stars using EUV spectra has been conducted to establish the structure of stellar coronae in active binary systems from the EMD, electron densities, and scale sizes. Observations obtained by the EUVE during 9 years of operation are included for the stars in the sample. EUVE data allow a continuous EMD to be constructed in the range log T~5.6-7.4, using iron emission lines. These data are complemented with IUE observations to model the lower temperature range. Inspection of the EMD shows an outstanding narrow enhancement, or ``bump'' peaking around log T~6.9 in 25 of the stars, defining a fundamental coronal structure. The emission measure per unit stellar area decreases with increasing orbital (or photometric) periods of the target stars; stars in binaries generally have more material at coronal temperatures than slowly rotating single stars. High electron densities (Ne>10^12 cm^-3) are derived at ~10 MK for some targets, implying small emitting volumes. The observations suggest the magnetic stellar coronae of these stars are consistent with two basic classes of magnetic loops: solar-like loops with maximum temperature around log T~6.3 and lower electron densities (Ne>10^9-10.5), and hotter loops peaking around log T~6.9 with higher electron densities (Ne>10^12). For the most active stars, material exists at much higher temperatures (log T>6.9) as well. However, current ab initio stellar loop models cannot reproduce such a configuration. Analysis of the light curves of these systems reveals signatures of rotation of coronal material, as well as apparent seasonal changes in the activity levels.Comment: 45 pages, 9 figures (with 20 eps files). Accepted for its publication in ApJ

    Operationalizing the 2018 World Cancer Research Fund/American Institute for Cancer Research (WCRF/AICR) Cancer Prevention Recommendations: A Standardized Scoring System

    Get PDF
    Background: Following the publication of the 2018 World Cancer Research Fund (WCRF) and American Institute for Cancer Research (AICR) Third Expert Report, a collaborative group was formed to develop a standardized scoring system and provide guidance for research applications. Methods: The 2018 WCRF/AICR Cancer Prevention Recommendations, goals, and statements of advice were examined to define components of the new Score. Cut-points for scoring were based on quantitative guidance in the 2018 Recommendations and other guidelines, past research that operationalized 2007 WCRF/AICR Recommendations, and advice from the Continuous Update Project Expert Panel. Results: Eight of the ten 2018 WCRF/AICR Recommendations concerning weight, physical activity, diet, and breastfeeding (optional), were selected for inclusion. Each component is worth one point: 1, 0.5, and 0 points for fully, partially, and not meeting each recommendation, respectively (Score: 0 to 7–8 points). Two recommendations on dietary supplement use and for cancer survivors are not included due to operational redundancy. Additional guidance stresses the importance of accounting for other risk factors (e.g., smoking) in relevant models. Conclusions: The proposed 2018 WCRF/AICR Score is a practical tool for researchers to examine how adherence to the 2018 WCRF/AICR Recommendations relates to cancer risk and mortality in various adult populations.
    • 

    corecore