216 research outputs found
Reengineering the user: Privacy concerns about personal data on smartphones.
Purpose: This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed.
Design/methodology/approach: The impact of the applicationsâ evolutionary increment of permission requests from both the userâs and the developerâs point of view is studied, and finally, a series of remedies against the erosion of usersâ privacy is proposed.
Findings: The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, todayâs smartphone operating systems do not provide an adequate level of protection for the userâs personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices.
Research limitations/implications: The proposed approach was evaluated through an examination of the Androidâs permission model, although issues arise in other operating systems. The authorsâ future intention is to conduct a user study to measure the userâs awareness and concepts surrounding privacy concerns to empirically investigate the above-mentioned suggestions.
Practical implications: The proposed suggestions in this paper, if adopted in practice, could significantly improve the situation and mitigate privacy concerns of users of smart devices.
Social implications: The recommendations proposed in this paper would strongly enhance the control of users over their personal data and improve their ability to distinguish legitimate apps from malware or grayware.
Originality/value: This paper emphasises two shortcomings of the permissions models of mobile operating systems which, in authorsâ view, have not been adequately addressed to date and propose an inherent way for apps and other entities of the mobile computing ecosystem to commit to responsible and transparent practices on mobile usersâ privacy
A method for forensic artifact collection, analysis and incident response in environments running Session Initiation Protocol (SIP) and Session Description protocol
In this paper, we perform an analysis of SIP, a popular voice over IP (VoIP) protocol and propose a framework for capturing and analysing volatile VoIP data in order to determine forensic readiness requirements for effectively
identifying an attacker. The analysis was performed on real attack data and the findings were encouraging. It seems that if appropriate forensic readiness processes and controls are in place, a wealth of evidence can be obtained. The type of the end user equipment of the internal users, the private IP, the software that is used can help build a reliable baseline information database. On the other hand the private IP addresses of the potential attacker even during the presence of NAT services, as well as and the attack tools employed by the malicious parties are logged for further analysis
Effect of polydispersity and bubble clustering on the steady shear viscosity of dilute bubble suspensions in Newtonian media
This work examines the steady shear viscosity of dilute polydisperse bubble suspensions generated in a mixture of mineral oil
and span 80. We proved theoretically that, in polydisperse bubble suspensions, the shear-thinning behavior spans a capillary
number (Ca) range between 0.01 and 100, instead of occurring at Ca~1, which is the case for monodisperse suspensions. However,
for the effect of polydispersity to become apparent, the bubble size distribution should be bimodal, with very small and very
large bubbles having similar volume fractions. In any other case, we can consider the polydisperse suspension as monodisperse,
with a volume-weighted average diameter (d43). To confirm the theoretical results, we carried out steady shear rheological tests.
Our measurements revealed an unexpected double power-law decay of the relative viscosity. To investigate this behavior further,
we visualized the produced bubble suspensions under shear. The visualization experiments revealed that bubbles started forming
clusters and threads at average capillary number around 0.01, where we observed the first decay of viscosity. CFD simulations
confirmed that under the presence of bubble clusters and threads the fluid streamlines distort less, thus resulting in a decrease of
the suspension viscosity. Consequently, we can attribute the first decay of the relative viscosity to the formation of bubble clusters
and threads, proving that the novel shear-thinning behavior we observed is due to a combination of bubble clustering and
deformation
Privacy-preserving, User-centric VoIP CAPTCHA Challenges: an Integrated Solution in the SIP Environment
Purpose
â This work aims to argue that it is possible to address discrimination issues that naturally arise in contemporary audio CAPTCHA challenges and potentially enhance the effectiveness of audio CAPTCHA systems by adapting the challenges to the user characteristics.
Design/methodology/approach
â A prototype has been designed, called PrivCAPTCHA, to offer privacy-preserving, user-centric CAPTCHA challenges. Anonymous credential proofs are integrated into the Session Initiation Protocol (SIP) protocol and the approach is evaluated in a real-world Voice over Internet Protocol (VoIP) environment.
Findings
â The results of this work indicate that it is possible to create VoIP CAPTCHA services offering privacy-preserving, user-centric challenges while maintaining sufficient efficiency.
Research limitations/implications
â The proposed approach was evaluated through an experimental implementation to demonstrate its feasibility. Additional features, such as appropriate user interfaces and efficiency optimisations, would be useful for a commercial product. Security measures to protect the system from attacks against the SIP protocol would be useful to counteract the effects of the introduced overhead. Future research could investigate the use of this approach on non-audio CAPTCHA services.
Practical implications
â PrivCAPTCHA is expected to achieve fairer, non-discriminating CAPTCHA services while protecting the userâs privacy. Adoption success relies upon the general need for employment of privacy-preserving practices in electronic interactions.
Social implications
â This approach is expected to enhance the quality of life of users, who will now receive CAPTCHA challenges closer to their characteristics. This applies especially to users with disabilities. Additionally, as a privacy-preserving service, this approach is expected to increase trust during the use of services that use it.
Originality/value
â To the best of authorsâ knowledge, this is the first comprehensive proposal for privacy-preserving CAPTCHA challenge adaptation. The proposed system aims at providing an improved CAPTCHA service that is more appropriate for and trusted by human users
Recommended from our members
A conceptual framework for studying collective reactions to events in location-based social media
Events are a core concept of spatial information, but location-based social media (LBSM) provide information on reactions to events. Individuals have varied degrees of agency in initiating, reacting to or modifying the course of events, and reactions include observations of occurrence, expressions containing sentiment or emotions, or a call to action. Key characteristics of reactions include referent events and information about who reacted, when, where and how. Collective reactions are composed of multiple individual reactions sharing common referents. They can be characterized according to the following dimensions: spatial, temporal, social, thematic and interlinkage. We present a conceptual framework, which allows characterization and comparison of collective reactions. For a thematically well-defined class of event such as storms, we can explore differences and similarities in collective attribution of meaning across space and time. Other events may have very complex spatio-temporal signatures (e.g. political processes such as Brexit or elections), which can be decomposed into series of individual events (e.g. a temporal window around the result of a vote). The purpose of our framework is to explore ways in which collective reactions to events in LBSM can be described and underpin the development of methods for analysing and understanding collective reactions to events
Negotiating the EU data protection reform: reflections on the household exemption
The re-drafting of the household exemption comprises one of the main areas of dispute in the ongoing negotiations for the EU data protection reform. The aim of this paper is twofold: First, we present and critically assess the wording proposals that have been put forward mainly at EU institutional level and identify the particular areas which cause tension. Second, we concomitantly ask which is the most appropriate wording for the exemption in question and in particular, whether the household exemption should comprise a set of decisive criteria or whether it should provide a more general framework. We eventually argue for a broad wording of the Article 2(2)(d) coupled with the addition of further non-determinative criteria at Recital 15, i.e. the non-operative part of the proposed Regulation
The Structure of Stellar Coronae in Active Binary Systems
A survey of 28 stars using EUV spectra has been conducted to establish the
structure of stellar coronae in active binary systems from the EMD, electron
densities, and scale sizes. Observations obtained by the EUVE during 9 years of
operation are included for the stars in the sample. EUVE data allow a
continuous EMD to be constructed in the range log T~5.6-7.4, using iron
emission lines. These data are complemented with IUE observations to model the
lower temperature range. Inspection of the EMD shows an outstanding narrow
enhancement, or ``bump'' peaking around log T~6.9 in 25 of the stars, defining
a fundamental coronal structure. The emission measure per unit stellar area
decreases with increasing orbital (or photometric) periods of the target stars;
stars in binaries generally have more material at coronal temperatures than
slowly rotating single stars. High electron densities (Ne>10^12 cm^-3) are
derived at ~10 MK for some targets, implying small emitting volumes. The
observations suggest the magnetic stellar coronae of these stars are consistent
with two basic classes of magnetic loops: solar-like loops with maximum
temperature around log T~6.3 and lower electron densities (Ne>10^9-10.5), and
hotter loops peaking around log T~6.9 with higher electron densities
(Ne>10^12). For the most active stars, material exists at much higher
temperatures (log T>6.9) as well. However, current ab initio stellar loop
models cannot reproduce such a configuration. Analysis of the light curves of
these systems reveals signatures of rotation of coronal material, as well as
apparent seasonal changes in the activity levels.Comment: 45 pages, 9 figures (with 20 eps files). Accepted for its publication
in ApJ
Operationalizing the 2018 World Cancer Research Fund/American Institute for Cancer Research (WCRF/AICR) Cancer Prevention Recommendations: A Standardized Scoring System
Background: Following the publication of the 2018 World Cancer Research Fund (WCRF)
and American Institute for Cancer Research (AICR) Third Expert Report, a collaborative group was
formed to develop a standardized scoring system and provide guidance for research applications.
Methods: The 2018 WCRF/AICR Cancer Prevention Recommendations, goals, and statements of
advice were examined to define components of the new Score. Cut-points for scoring were based
on quantitative guidance in the 2018 Recommendations and other guidelines, past research that
operationalized 2007 WCRF/AICR Recommendations, and advice from the Continuous Update Project
Expert Panel. Results: Eight of the ten 2018 WCRF/AICR Recommendations concerning weight,
physical activity, diet, and breastfeeding (optional), were selected for inclusion. Each component
is worth one point: 1, 0.5, and 0 points for fully, partially, and not meeting each recommendation,
respectively (Score: 0 to 7â8 points). Two recommendations on dietary supplement use and for
cancer survivors are not included due to operational redundancy. Additional guidance stresses the
importance of accounting for other risk factors (e.g., smoking) in relevant models. Conclusions: The
proposed 2018 WCRF/AICR Score is a practical tool for researchers to examine how adherence to the
2018 WCRF/AICR Recommendations relates to cancer risk and mortality in various adult populations.
- âŠ