13 research outputs found

    Privacy Violation and Detection Using Pattern Mining Techniques

    Get PDF
    Privacy, its violations and techniques to bypass privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have become conscious of the implications of privacy violation and its impact on them and to other stakeholders. Moreover, nations across the world are coming out with privacy protecting legislations to prevent data privacy violations. Such legislations however expose organizations to the issues of intentional or unintentional violation of privacy data. A violation by either malicious external hackers or by internal employees can expose the organizations to costly litigations. In this paper, we propose PRIVDAM; a data mining based intelligent architecture of a Privacy Violation Detection and Monitoring system whose purpose is to detect possible privacy violations and to prevent them in the future. Experimental evaluations show that our approach is scalable and robust and that it can detect privacy violations or chances of violations quite accurately. Please contact the author for full text at [email protected]

    Mobile Governance in Indian Urban Local Bodies: An Exploratory Study

    No full text
    Part 7: e-Government and Civic EngagementInternational audienceThis paper attempts to collate and derive insights from various initiatives on mobile governance by Urban and local bodies in India. The first generation e-governance initiatives by urban local bodies resulted in computerization of the legacy systems/practices in government with limited ability to internalize the advances in information and communication technologies (ICT). The paradigm shift from e-governance tom-governance results in radical differences in the key processes of creating, maintenance and usage of knowledge, creation of secure mobile transaction and delivery system, establishment of the appropriate infrastructural support for multi-mode direct citizen interface and delivery mechanisms. The paper identifies the various mobile app use case scenarios for residents, urban local body managers, system integrators, telcos, data services provider, and other stakeholders. Based on these mobile apps, it is attempted to classify the cities in various categories

    Utilizing network features for privacy violation detection

    No full text
    Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have become conscious of the implications of privacy violation and its impact on them and to other stakeholders. Moreover, nations across the world are coming out with privacy protecting legislations to prevent data privacy violations. Such legislations however expose organizations to the issues of intentional or unintentional violation of privacy data. A violation by either malicious external hackers or by internal employees can expose the organizations to costly litigations. In this paper, we propose PRIVDAM; a data mining based intelligent architecture of a Privacy Violation Detection and Monitoring system whose purpose is to detect possible privacy violations and to prevent them in the future. This paper elaborates on the use of network characteristics for differentiating between normal network traffic and potential malicious attacks. These attacks are usually hidden in common network services lik

    Layout of the eHC.

    No full text
    <p>Two 20×8 feet containers were used in the proof-of-concept eHC. The telemedicine container (left) has provision for a small laboratory. The second container (top) is used for registration and pharmacy and also has space for a future minor operation theatre. The telemedicine container can be used by itself for basic eHC operations. Pictures of the deployment, exterior, and interior of the telemedicine container are shown.</p
    corecore