4 research outputs found

    Privacy in Location based Systems

    Get PDF
    Recent advancements in technology have opened new avenues for services like the Location based services. Location based services are applications of mobile technology that utilize the information about the location of the user. It uses the Global Positioning System GPS to acquire and transmit user location. Billions of people create an unprecedented amount of data that either includes or allows the inference of highly sensitive information amidst which user location is one of them. However, this information is shared with third party without the knowledge or consent of the user. This is a violation of privacy as some users will or may not want to disclose their location to some people. This paper aims to raise awareness about privacy issues created as a result of location based services. History of location based services were discussed, information privacy and privacy issue surrounding the location based service were also discussed. Despite the myriad opportunities location based services provides, it is required to ensure security of user’s private data, and data protection laws be put in place to enforce this

    Implications of Over-The-Top (OTT) Services on National Security

    Get PDF
    The telecom industry is an industry that has to deal with a continuous rapid changing business and technological environment, unlike other industries. Traditionally, the principal revenue streams for telecom operators have been the voice and messaging (SMS) with data coming in at a far third till recently. The internet explosion has led to the inception of diverse internet applications and services amidst which, OTT is one. The proliferation of Internet-based services and applications has given rise to data traffic increase for telecom operators. The growing impact of OTT services on telcos’ voice and messaging revenue is a widely accepted phenomenon that is making telecom operators lose revenue in a rapid manner. Other than the challenges OTT pose on telecom industries, the threat it also poses to national security as a result of its operation under net neutrality is a critical point that needs to be considered. This article highlights the wide adoption of OTT services, its’ devastating impact on telecom operators and its impact on national security. Keywords: Telecom, OTT, Net Neutrality, National Security

    Structuring Challenges in Requirement Engineering Techniques

    Get PDF
    Experts in the field of requirement engineering have called for advancement in requirement structuring techniques as majority of the techniques are inadequate and give inconsistent results. This paper reviews the advancement in these techniques by answering the following questions: What is requirement structuring? What are the benefits of requirements structuring in the software engineering process? Who are the stakeholders involved the requirements structuring process? When do we structure requirements and what are the techniques and methods involved in requirements structuring? Addressing these questions from the requirement structuring perspectives, issues on software engineering were highlighted and discussed

    Application of Artificial Intelligence in User Interfaces Design for Cyber Security Threat Modeling

    Get PDF
    In recent years, Cyber Security threat modeling has been discovered to have the capacity of combatting and mitigating against online threats. In order to minimize the associated risk, these threats need to be modelled with appropriate Intelligent User Interface (IUI) design and consequently the development and evaluation of threat metrics. Artificial Intelligence (AI) has revolutionized every facet of our daily lives and building a responsive Cyber Security Threat Model requires an IUI. The current threat models lack IUI, hence they cannot deliver convenience and efficiency. However, as the User Interface (UI) functionalities and User Experience (UX) continue to increase and deliver more astonishing possibilities, the present threat models lack the predictability capacity thus Machine Learning paradigms must be incorporated. Meanwhile, this deficiency can only be handled through AI-enabled UI that utilizes baseline principles in the design of interfaces for effective Human-Machine Interaction (HMI) with lasting UX. IUI helps developers or designers enhance flexibility, usability, and the relevance of the interaction to improving communication between computer and human. Baseline principles must be applied for developing threat models that will ensure fascinating UI-UX. Application of AI in UI design for Cyber Security Threat Modeling brings about reduction in critical design time and ensures the development of better threat modeling applications and solutions
    corecore