Academic literature on the topic '4604 Cybersecurity and privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '4604 Cybersecurity and privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "4604 Cybersecurity and privacy"

1

Bojanova, Irena, Jeffrey Voas, Morris Chang, and Linda Wilbanks. "Cybersecurity or Privacy [Guest editors' introduction]." IT Professional 18, no. 5 (September 2016): 16–17. http://dx.doi.org/10.1109/mitp.2016.80.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mishra, Neha. "Privacy, Cybersecurity, and GATS Article XIV: A New Frontier for Trade and Internet Regulation?" World Trade Review 19, no. 3 (May 2, 2019): 341–64. http://dx.doi.org/10.1017/s1474745619000120.

Full text
Abstract:
AbstractMeasures restricting data flows outside one's borders, including mandatory data/server localization measures, are not only a barrier to trade, but also largely ineffective in achieving better internet security or trust. Nevertheless, governments deploy such measures, primarily on grounds of cybersecurity and privacy, potentially violating their obligations under the General Agreement on Trade in Services (GATS). In this article, I investigate whether GATS-inconsistent measures may be justified under GATS Art. XIV when aimed at ensuring privacy or cybersecurity, and, if so, whether GATS Art. XIV effectively balances trade and internet policy. As the internet governance framework is complex and somewhat ambiguous, applying GATS Art. XIV to cybersecurity/privacy measures necessitates balancing of trade liberalization principles and domestic internet policy. This exercise can be effective in weeding out data localization measures disguised as privacy/cybersecurity measures, particularly by employing relevant technical and factual evidence. However, given the lack of binding international law/norms on these issues, GATS Art. XIV has a limited role, particularly in cases involving direct conflict between multistakeholder/transnational internet norms and domestic internet policies, or where the measures are founded on contentious standards/benchmarks on privacy/cybersecurity. Ultimately, ensuring free and secure data flows requires a multidimensional policy response, including strengthening linkages between trade law and internet governance.
APA, Harvard, Vancouver, ISO, and other styles
3

Barth, Susanne, Menno D. T. de Jong, and Marianne Junger. "Lost in privacy? Online privacy from a cybersecurity expert perspective." Telematics and Informatics 68 (March 2022): 101782. http://dx.doi.org/10.1016/j.tele.2022.101782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pehlivan, Ceyhun Necati. "Global Privacy News." Global Privacy Law Review 1, Issue 1 (March 1, 2020): 63–76. http://dx.doi.org/10.54648/gplr2020009.

Full text
Abstract:
This article tracks significant developments in some of the key jurisdictions in the area of privacy, data protection, and cybersecurity. It provides concise reports to keep the reader up to date with some of the most recent developments across the globe. privacy, data protection, cyber security, global, news
APA, Harvard, Vancouver, ISO, and other styles
5

Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and Privacy Solutions in Smart Cities." IEEE Communications Magazine 55, no. 3 (March 2017): 51–59. http://dx.doi.org/10.1109/mcom.2017.1600297cm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Landwehr, C., D. Boneh, J. C. Mitchell, S. M. Bellovin, S. Landau, and M. E. Lesk. "Privacy and Cybersecurity: The Next 100 Years." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1659–73. http://dx.doi.org/10.1109/jproc.2012.2189794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 1, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.752.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
8

Pattanasri, Thanaphol. "Mandatory Data Breach Notification and Hacking the Smart Home: A Legal Response to Cybersecurity?" QUT Law Review 18, no. 2 (March 5, 2019): 268. http://dx.doi.org/10.5204/qutlr.v18i2.770.

Full text
Abstract:
This paper will investigate whether the Australian legal and regulatory framework sufficiently addresses cybersecurity concerns particular to the smart home. Specifically, the paper will analyse the extent to which the introduction of the data breach notification scheme in Australia will apply to smart home device manufacturers regulated by the federal Privacy Act 1988 (Cth) regarding device breaches. By examining Australian Privacy Principle 11 and the introduction of mandatory data breach notification, the paper aims to determine whether the Australian privacy model of Principles-Based Regulation is capable of providing a market-based solution to cybersecurity concerns in the smart home.
APA, Harvard, Vancouver, ISO, and other styles
9

Jofre, Marc, Diana Navarro-Llobet, Ramon Agulló, Jordi Puig, Gustavo Gonzalez-Granadillo, Juan Mora Zamorano, and Ramon Romeu. "Cybersecurity and Privacy Risk Assessment of Point-of-Care Systems in Healthcare—A Use Case Approach." Applied Sciences 11, no. 15 (July 21, 2021): 6699. http://dx.doi.org/10.3390/app11156699.

Full text
Abstract:
Point-of-care systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information; and consequently, their cybersecurity and privacy requirements are of crucial importance. While, assessing these requirements is a significant task. In this work, we propose a use case approach to assess specifications of cybersecurity and privacy requirements of POC systems in a structured and self-contained form. Such an approach is appropriate since use cases are one of the most common means adopted by developers to derive requirements. As a result, we detail a use case approach in the framework of a real-based healthcare IT infrastructure that includes a health information system, integration engines, application servers, web services, medical devices, smartphone apps and medical modalities (all data simulated) together with the interaction with participants. Since our use case also sustains the analysis of cybersecurity and privacy risks in different threat scenarios, it also supports decision making and the analysis of compliance considerations.
APA, Harvard, Vancouver, ISO, and other styles
10

Landwehr, Carl. "Prolog to the Section on Privacy and Cybersecurity." Proceedings of the IEEE 100, Special Centennial Issue (May 2012): 1657–58. http://dx.doi.org/10.1109/jproc.2012.2189820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "4604 Cybersecurity and privacy"

1

Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.

Full text
Abstract:
Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well as organizations. In recent years, we have seen a sharp increase in data breaches and cyber security threats that have targeted social media users. Hence, it is imperative that we try to better understand factors that affect an end-user’s adoption of effective security safeguards and privacy protection practices. In this research, we propose and validate a theoretical model that posits several determinants of end-user security and privacy practices on social media. We hypothesize relationships among various cognitive, affective and behavioral factors identified under the themes of posture, proficiency, and practices. These constructs and hypotheses are validated through empirical research comprising an online survey questionnaire, and structural equation modeling (SEM) analysis. The key findings of this study highlight the importance of cyber threat awareness and social media security and privacy self-efficacy, which have a direct impact on end-user security and privacy practices. Additionally, our research shows that use of general technology applications for security and privacy impacts the adoption of security and privacy practices on social media. In totality, our research findings indicate that proficiency is a better predictor or security and privacy practices as compared to the posture of an end-user. Factors such as privacy disposition, privacy concerns, and perceived risk of privacy violations do not have as significant or direct effect on security and privacy practices. Based on our research findings, we provide some key take-aways in the form of theoretical contributions, suggestions for future research, as well as recommendations for organizational security awareness training programs.
APA, Harvard, Vancouver, ISO, and other styles
2

Dell'Elce, Martina. "Industria 4.0 ed Internet of Things, nuove sfide per la cybersecurity." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Find full text
Abstract:
Al giorno d'oggi siamo sempre più circondati da dispositivi interconnessi tra loro, i quali sono costantemente esposti ad attacchi informatici. In questo elaborato, dopo aver introdotto l'Internet of Things e i suoi molteplici ambiti applicativi, verrà svolta un'attenta analisi dei rischi e delle sfide riguardanti la cybersecurity che le aziende 4.0 dovranno affrontare. Verranno proposte delle possibili soluzioni attraverso l'impiego di tecnologie sempre più sofisticate ed innovative.
APA, Harvard, Vancouver, ISO, and other styles
3

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applied theory from social psychology to understand how these social consequences affect people’s security behaviors. Likewise, little systems work in usable security has taken social factors into consideration. To bridge these gaps in literature and practice, I begin to build a theory of social cybersecurity and apply those theoretical insights to create systems that encourage better cybersecurity behaviors. First, through a series of interviews, surveys and a large-scale analysis of how security tools diffuse through the social networks of 1.5 million Facebook users, I empirically model how social influences affect the adoption of security behaviors and systems. In so doing, I provide some of the first direct evidence that security behaviors are strongly driven by social influence, and that the design of a security system strongly influences its potential for social spread. Specifically, security systems that are more observable, inclusive, and stewarded are positively affected by social influence, while those that are not are negatively affected by social influence. Based on these empirical results, I put forth two prescriptions: (i) creating socially grounded interface “nudges” that encourage better cybersecurity behaviors, and (ii) designing new, more socially intelligent end-user facing security systems. As an example of a social “nudge”, I designed a notification that informs Facebook users that their friends use optional security systems to protect their own accounts. In an experimental evaluation with 50,000 Facebook users, I found that this social notification was significantly more effective than a non-social control notification at attracting clicks to improve account security and in motivating the adoption of promoted, optional security tools. As an example of a socially intelligent cybersecurity system, I designed Thumprint: an inclusive authentication system that authenticates and identifies individual group members of a small, local group through a single, shared secret knock. Through my evaluations, I found that Thumprint is resilient to casual but motivated adversaries and that it can reliably differentiate multiple group members who share the same secret knock. Taken together, these systems point towards a future of socially intelligent cybersecurity that encourages better security behaviors. I conclude with a set of descriptive and prescriptive takeaways, as well as a set of open problems for future work. Concretely, this thesis provides the following contributions: (i) an initial theory of social cybersecurity, developed from both observational and experimental work, that explains how social influences affect security behaviors; (ii) a set of design recommendations for creating socially intelligent security systems that encourage better cybersecurity behaviors; (iii) the design, implementation and comprehensive evaluation of two such systems that leverage these design recommendations; and (iv) a reflection on how the insights uncovered in this work can be utilized alongside broader design considerations in HCI, security and design to create an infrastructure of useful, usable and socially intelligent cybersecurity systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Bheemanathini, Sai Nikhil. "A Systematic Review of Blockchain Technology: Privacy Concerns, Security Challenges, and Solutions." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1563273858006378.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Doyle, Marc. "Comprehending the Safety Paradox and Privacy Concerns with Medical Device Remote Patient Monitoring." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1090.

Full text
Abstract:
Medical literature identifies a number of technology-driven improvements in disease management such as implantable medical devices (IMDs) that are a standard treatment for candidates with specific diseases. Among patients using implantable cardiac defibrillators (ICD), for example, problems and issues are being discovered faster compared to patients without monitoring, improving safety. What is not known is why patients report not feeling safer, creating a safety paradox, and why patients identify privacy concerns in ICD monitoring. There is a major gap in the literature regarding the factors that contribute to perceived safety and privacy in remote patient monitoring (RPM). To address this gap, the research goal of this study was to provide an interpretive account of the experience of RPM patients. This study investigated two research questions: 1) How did RPM recipients perceive safety concerns?, and 2) How did RPM recipients perceive privacy concerns? To address the research questions, in-depth, semi-structured interviews were conducted with six participants to explore individual perceptions in rich detail using interpretative phenomenological analysis (IPA). Four themes were identified and described based on the analysis of the interviews that include — comfort with perceived risk, control over information, education, and security — emerged from the iterative review and data analysis. Participants expressed comfort with perceived risk, however being scared and anxious were recurrent subordinate themes. The majority of participants expressed negative feelings as a result of an initial traumatic event related to their devices and lived in fear of being shocked in inopportune moments. Most of these concerns stem from lack of information and inadequate education. Uncertainties concerning treatment tends to be common, due to lack of feedback from ICD RPM status. Those who knew others with ICD RPM became worrisome after hearing about incidences of sudden cardiac death (SCD) when the device either failed or did not work adequately to save their friend’s life. Participants also expressed cybersecurity concerns that their ICD might be hacked, maladjusted, manipulated with magnets, or turned off. They believed ICD RPM security was in place but inadequate as well as reported feeling a lack of control over information. Participants expressed wanting the right to be left alone and in most cases wanted to limit others’ access to their information, which in turn, created conflict within families and loved ones. Geolocation was a contentious node in this study, with most of participants reporting they did not want to be tracked under any circumstances. This research was needed because few researchers have explored how people live and interact with these newer and more advanced devices. These findings have implications for practice relating to RPM safety and privacy such as identifying a gap between device companies, practitioners, and participants and provided directions for future research to discover better ways to live with ICD RPM and ICD shock.
APA, Harvard, Vancouver, ISO, and other styles
6

Santos, Susana Isabel da Silva. "“Estudo das perceções de cibersegurança e cibercrime e das implicações na formulação de Políticas Públicas - estudo exploratório do caso português." Master's thesis, Instituto Superior de Ciências Sociais e Políticas, 2018. http://hdl.handle.net/10400.5/16235.

Full text
Abstract:
Dissertação de Mestrado em Gestão e Políticas Públicas
Os serviços online tornaram-se uma parte importante das nossas vidas, nomeadamente porque permitem o acesso à informação em qualquer sítio, a qualquer momento. Por assim ser, este tipo de serviços é útil não apenas para os utilizadores, mas para qualquer empresa ou instituição pública, nomeadamente por ajudar a reduzir os seus custos operacionais – por via da redução da infraestrutura física, da menor necessidade de recursos humanos, apresentando-se ainda menos dispendiosa, mais célere e cômoda para qualquer utente, se pensarmos por exemplo nos serviços públicos. Posto isso, este projeto de dissertação procurou descrever as perceções de cibercrime e cibersegurança dos cidadãos portugueses. Os dados necessários à elaboração da investigação foram recolhidos entre os dias 6 de julho e 6 de setembro de 2015, totalizando um total de 431 respostas, de inquiridos nacionais. Os resultados obtidos demonstram a preocupação com a privacidade, nomeadamente com os dados pessoais. Das três dimensões encontradas, com impacto na dimensão depende – Perceção da Ação do Estado – salienta-se “Segurança de Dados e Familiarização” o que leva a crer que maiores níveis de conhecimento e consciencialização levam a melhores níveis de satisfação. A formação de dois clusters permitiu verificar que a característica mais evidente é o género do indivíduo, razão pela qual, posteriormente, foram analisas as variáveis com diferenças estatisticamente significantes. Desta análise, salientam-se as variáveis relativas ao entendimento sobre a matéria, e à satisfação com a Ação do Estado.
Online services have become an important part of our lives, in particular, because they allow access to information anywhere, anytime. Because of that, this type of service is useful not only for mere users but for any company or public institution, in particular by helping to reduce its operating costs – by reducing physical infrastructure, the need for human resources, for being even cheaper, faster and comfortable for any user, if we think, for example, of public services. Thus, this dissertation project aims to describe the perceptions of cybercrime and cybersecurity of Portuguese citizens. The data was collected between July 6 and September 6, 2015, with a total of 431 responses, from national respondents. The results obtained prove the concern for privacy, particularly with personal data. Of the three dimensions found, with impact on the dimension depends - State Action Perception - highlights "Data Security and Familiarization" which leads to believe that higher levels of knowledge and awareness lead to better levels of satisfaction. The formation of two clusters allowed us to verify that the most obvious characteristic is the gender of the individual, reason why, afterward, differences in the means of variables were analyzed. From this analysis, we highlight the variables related to the understanding of the subject and the satisfaction with the State Action.
N/A
APA, Harvard, Vancouver, ISO, and other styles
7

Conzo, Naomi. "Privacy e "Social dilemma": aspetti etico-informatici legati al trattamento online dei dati personali sui social media." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Il fine di questo elaborato di tesi è analizzare per quali scopi e secondo quali metodologie le piattaforme online di Social Media trattano i nostri dati online. L'analisi sarà incentrata in primo luogo in luce delle regolamentazioni vigenti, quali tipi e come tutelano i dati in ambito privacy; seguirà un approfondimento delle informative sui dati (privacy policy) di alcuni importanti Social dal quale verranno estrapolati e riconosciuti concetti come la profilazione. Lo studio di che cosa è la profilazione avrà come scopo l'introduzioni di questioni molto importanti riguardo i sistemi utilizzati per profilare - sistemi che sono nel modo più assoluto automatizzati, composti da algoritmi sviluppati sulla base di "deep learning" e "machine learning" in modo da non richiedere l'intervento umano - le conseguenze sul piano etico-sociale e i problemi di sicurezza informatica che me derivano. Nella parte finale, in particolare, verrà fatto notare come l'atto dell'invio di contenuti personalizzati non sia stato seriamente considerato e come il GDPR tratta questa situazione.
APA, Harvard, Vancouver, ISO, and other styles
8

Raad, Eliana. "Towards better privacy preservation by detecting personal events in photos shared within online social networks." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS079/document.

Full text
Abstract:
De nos jours, les réseaux sociaux ont considérablement changé la façon dont les personnes prennent des photos qu’importe le lieu, le moment, le contexte. Plus que 500 millions de photos sont partagées chaque jour sur les réseaux sociaux, auxquelles on peut ajouter les 200 millions de vidéos échangées en ligne chaque minute. Plus particulièrement, avec la démocratisation des smartphones, les utilisateurs de réseaux sociaux partagent instantanément les photos qu’ils prennent lors des divers événements de leur vie, leurs voyages, leurs aventures, etc. Partager ce type de données présente un danger pour la vie privée des utilisateurs et les expose ensuite à une surveillance grandissante. Ajouté à cela, aujourd’hui de nouvelles techniques permettent de combiner les données provenant de plusieurs sources entre elles de façon jamais possible auparavant. Cependant, la plupart des utilisateurs des réseaux sociaux ne se rendent même pas compte de la quantité incroyable de données très personnelles que les photos peuvent renfermer sur eux et sur leurs activités (par exemple, le cas du cyberharcèlement). Cela peut encore rendre plus difficile la possibilité de garder l’anonymat sur Internet dans de nombreuses situations où une certaine discrétion est essentielle (politique, lutte contre la fraude, critiques diverses, etc.).Ainsi, le but de ce travail est de fournir une mesure de protection de la vie privée, visant à identifier la quantité d’information qui permettrait de ré-identifier une personne en utilisant ses informations personnelles accessibles en ligne. Premièrement, nous fournissons un framework capable de mesurer le risque éventuel de ré-identification des personnes et d’assainir les documents multimédias destinés à être publiés et partagés. Deuxièmement, nous proposons une nouvelle approche pour enrichir le profil de l’utilisateur dont on souhaite préserver l’anonymat. Pour cela, nous exploitons les évènements personnels à partir des publications des utilisateurs et celles partagées par leurs contacts sur leur réseau social. Plus précisément, notre approche permet de détecter et lier les évènements élémentaires des personnes en utilisant les photos (et leurs métadonnées) partagées au sein de leur réseau social. Nous décrivons les expérimentations que nous avons menées sur des jeux de données réelles et synthétiques. Les résultats montrent l’efficacité de nos différentes contributions
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. However, social networks users do not realize the wealth of information gathered from image data and which could be used to track all their activities at every moment (e.g., the case of cyberstalking). Therefore, in many situations (such as politics, fraud fighting and cultural critics, etc.), it becomes extremely hard to maintain individuals’ anonymity when the authors of the published data need to remain anonymous.Thus, the aim of this work is to provide a privacy-preserving constraint (de-linkability) to bound the amount of information that can be used to re-identify individuals using online profile information. Firstly, we provide a framework able to quantify the re-identification threat and sanitize multimedia documents to be published and shared. Secondly, we propose a new approach to enrich the profile information of the individuals to protect. Therefore, we exploit personal events in the individuals’ own posts as well as those shared by their friends/contacts. Specifically, our approach is able to detect and link users’ elementary events using photos (and related metadata) shared within their online social networks. A prototype has been implemented and several experiments have been conducted in this work to validate our different contributions
APA, Harvard, Vancouver, ISO, and other styles
9

Chenthara, Shekha. "Privacy Preservation of Electronic Health Records Using Blockchain Technology: Healthchain." Thesis, 2021. https://vuir.vu.edu.au/42459/.

Full text
Abstract:
The right to privacy is the most fundamental right of a citizen in any country. Electronic Health Records (EHRs) in healthcare has faced problems with privacy breaches, insider outsider attacks and unauthenticated record access in recent years, the most serious being related to the privacy and security of medical data. Ensuring privacy and security while handling patient data is of the utmost importance as a patient’s information should only be released to others with the patient’s permission or if it is allowed by law. Electronic health data (EHD) is an emerging health information exchange model that enables healthcare providers and patients to efficiently store and share their private healthcare information from any place and at any time as required. Generally, cloud services provide the infrastructure by reducing the cost of storing, processing and updating information with improved efficiency and quality. However, the privacy of EHRs is a significant hurdle when outsourcing private health data in the cloud because there is a higher risk of health information being leaked to unauthorized parties. Several existing techniques can analyse the security and privacy issues associated with e-healthcare services. These methods are designed for single databases, or databases with an authentication centre and thus cannot adequately protect the data from insider attacks. In fact, storing EHRs on centralized databases increases the security risk footprint and requires trust in a single authority. Therefore, this research study mainly focuses on how to ensure patient privacy and security while sharing sensitive data between the same or different organisations as well as healthcare providers in a distributed environment. This research successfully proposes and implements a permissioned blockchain framework named Healthchain, which maintains the security, privacy, scalability and integrity of the e-health data. The blockchain is built on Hyperledger Fabric, a permissioned distributed ledger solution by employing Hyperledger Composer and stores EHRs by utilizing InterPlanetary File System (IPFS) to build the decentralized web applications. Healthchain builds a two-pronged solution (i) an on-chain solution implemented on the secure network of Hyperledger Fabric which utilizes the state database Couch DB, (ii) an off-chain solution to securely store encrypted data via IPFS. The Healthchain architecture employs Practical Byzantine Fault Tolerance (PBFT) as the distributed network consensus processes to determine which block is to be added to the blockchain. Healthchain Hyperledger Fabric leverages container technology to host smart contracts called “chaincode” that comprises the application logic of this system. This research aimed at contributing towards the scalability in blockchain by storing the data hashes of health records on chain and the actual data is stored cryptographically off chain in IPFS, the decentralized storage. Moreover, the data stored in the IPFS will be encrypted by using special public key cryptographic algorithms to create robust blockchain solutions for EHD. This research study develops a privacy preserving framework with three main core contributions to the e-Health ecosystem: (i) it contributes a privacy preserving patient-centric framework namely Healthchain; (ii) introduces an efficient referral mechanism for the effective sharing of healthcare records; and (iii) prevents prescription drug abuse by performing drug tracking transactions employing smart contract functionality to create a smart health care ecosystem. The results demonstrates that the developed prototype ensures that healthcare records are not traceable to illegal disclosure as the model only stores the encrypted hash of records and is proven to be effective in terms of enhanced data privacy, data security, improved data scalability, interoperability and data integrity when accessing and sharing medical records among stakeholders across the Healthchain network. This research develops a foolproof security solution against cyber-attacks by exploiting the inherent features of the blockchain, thereby contributing to the robustness of healthcare information sharing systems and also unravels the potential for blockchain in health IT solutions.
APA, Harvard, Vancouver, ISO, and other styles
10

AfzaliSeresht, Neda. "Explainable Intelligence for Comprehensive Interpretation of Cybersecurity Data in Incident Management." Thesis, 2022. https://vuir.vu.edu.au/44414/.

Full text
Abstract:
On a regular basis, a variety of events take place in computer systems: program launches, firewall updates, user logins, and so on. To secure information resources, modern organisations have established security management systems. In cyber incident management, reporting and awareness-raising are a critical to identify and respond to potential threats in organisations. Security equipment operation systems record ’all’ events or actions, and major abnormalities are signaling via alerts based on rules or patterns. Investigation of these alerts is handled by specialists in the incident response team. Security professionals rely on the information in alert messages to respond appropriately. Incident response teams do not audit or trace the log files until an incident happens. Insufficient information in alert messages, and machine-friendly rather than human-friendly format cause cognitive overload on already limited cybersecurity human resources. As a result, only a smaller number of threat alerts are investigated by specialist staff and security holes may be left open for potential attacks. Furthermore, incident response teams have to derive the context of incidents by applying prior knowledge, communicate with the right people to understand what has happened, and initiate the appropriate actions. Insufficient information in alert messages and stakeholders’ participation raise challenges for the incident management process, which may result in late responses. In other words, cybersecurity resources are overburdened due to a lack of information in alert messages that provide an incomplete picture of a subject (incident) to assist with necessary decision making. The need to identify and track local and global sources in order to process and understand the critical elements of threat information causes cognitive overload on the company’s currently limited cybersecurity professionals. This problem can be overcome with a fully integrated report that clarifies the subject (incident) in order to reduce overall cognitive burden. Instead of spending additional time to investigating each subject of incident, which is dependent on the person’s expertise and the amount of time he has, a detailed report of incident can be utilised as an input of human-analyst. If cyber experts’ cognitive loads can be reduced, their response time efficiency may improves. The relationship between achieving incident management agility through contextual analytical with a comprehensive report and reducing human cognition overload is still being studied. There is currently a research gap in determining the key relationships between explainable Artificial Intelligence (AI) models and other technologies used in security management to gain insight into how explainable contextual analytics can provide distinct response capabilities. When using an explainable AI model for event modelling, research is necessary on how to improve self and shared insight about cyber data by gathering and interpreting security knowledge to reduce cognitive burden on analysts. Due to the fact that the level of cyber security expertise depends on prior knowledge or the results of a thorough report as an input, explainable intelligent models for understanding the inputs have been proposed. By enriching and interpreting security data in a comprehensive humanreadable report, analysts can get a better understanding of the situation and make better decisions. Explainable intelligent models are proposed in cyber incident management by interpreting security logs and cybersecurity alerts, and include a model which can be used in fraud detection where a large number of financial transactions necessitates the involvement of a human in the analysis process. In cyber incident management application, a wide and diverse amount of data are digested, and a report in natural language is developed to assist cyber analysts’ understanding of the situation. The proposed model produced easy-to-read reports/stories by presenting supplementary information in a novel narrative framework to communicate the context and root cause of the alert. It has been confirmed that, when compared to baseline reports, a more comprehensive report that answers core questions about the actor (who), riskiness (what), evidence (why), mechanism (how), time (when), and location (where) that support making real-time decisions by providing incident awareness. Furthermore, a common understanding of an incident and its consequences was established through a graph, resulting in Shared Situation Awareness (SSA) capability (the acquisition of cognition through collaboration with others). A knowledge graph, also known as a graph to semantic knowledge, is a data structure that represents various properties and relationships between objects. It has been widely researched and utilised in information processing and organisation. The knowledge graph depicts the various connections between the alert and relevant information from local and global knowledge bases. It interpreted knowledge in a human-readable format to enable more engagement in the cyber incident management. The proposed models are also known as explainable intelligence because they can reduce the cognitive effort required to process a large amount of security data. As a result, self-awareness and shared awareness of what is happening in cybersecurity incidents have been accomplished. The analyses and survey evaluation empirically demonstrated the models’ success in reducing significant overload on expert cognition, bringing more comprehensive information about the incident, and interpreting knowledge in a human-readable format to enable greater participation in cyber incident management. Finally, the intelligent model of knowledge graph is provided for transaction visualisation for fraud detection, an important challenge in security research. As with the same incident management challenges, fraud detection methods need to be more transparent by explaining their results in more detail. Despite the fact that fraudulent practices are always evolving, investigating money laundering based on an explainable AI that uses graph analysis, assist in the comprehension of schemes. A visual representation of the complex interactions that occur in transactions between money sender and money receiver, with explanations of human-readable aspects for easier digestion is provided. The proposed model, which was used in transaction visualisation and fraud detection, was highly regarded by domain experts. The Digital Defense Hackathon in December 2020 demonstrated that the model is adaptable and widely applicable (received first place in the Hackathon competition).
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "4604 Cybersecurity and privacy"

1

Maleh, Yassine, Mohammad Shojafar, Mamoun Alazab, and Imed Romdhani, eds. Blockchain for Cybersecurity and Privacy. First edition. | Boca Raton, FL : CRC Press, 2020. | Series: Internal audit and it audit: CRC Press, 2020. http://dx.doi.org/10.1201/9780429324932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Choo, Kim-Kwang Raymond, Ali Dehghantanha, and Reza M. Parizi, eds. Blockchain Cybersecurity, Trust and Privacy. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77392-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lukings, Melissa, and Arash Habibi Lashkari. Understanding Cybersecurity Law and Digital Privacy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-88704-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05563-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sørensen, Lene, Knud Erik Skouby, and Samant Khajuria. Cybersecurity and Privacy - Bridging the Gap. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22351-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moallem, Abbas, ed. HCI for Cybersecurity, Privacy and Trust. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cybersecurity litigation: Consumer data protection and privacy. Washington, D.C: Bloomberg BNA, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schünemann, Wolf J., and Max-Otto Baumann, eds. Privacy, Data Protection and Cybersecurity in Europe. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53634-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "4604 Cybersecurity and privacy"

1

Wilbanks, Linda R. "CyberSecurity Privacy Risks." In Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity, 191–98. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79997-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Manjikian, Mary. "The Problem of Privacy." In Cybersecurity Ethics, 69–99. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Qaddoura, Raneem, and Nameer N. El-Emam. "Privacy Preservation Tools and Techniques in Artificial Intelligence." In Cybersecurity, 161–82. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003145042-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Phillips, Joshua, and Mark D. Ryan. "A Future for Privacy." In SpringerBriefs in Cybersecurity, 91–115. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nurse, Jason R. C. "Cybersecurity Awareness." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1596-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hodson, Christopher. "Cybersecurity Skills." In Encyclopedia of Cryptography, Security and Privacy, 1–5. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1577-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lukings, Melissa, and Arash Habibi Lashkari. "Cybersecurity and Cybercrimes." In Understanding Cybersecurity Law and Digital Privacy, 59–96. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88704-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Honglu, Yifeng Gao, S. M. Sarwar, Luis GarzaPerez, and Mahmudul Robin. "Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity." In Silicon Valley Cybersecurity Conference, 33–44. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kilpala, Minna, Tommi Kärkkäinen, and Timo Hämäläinen. "Differential Privacy: An Umbrella Review." In Artificial Intelligence and Cybersecurity, 167–83. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15030-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stalla-Bourdillon, Sophie. "Privacy Versus Security… Are We Done Yet?" In SpringerBriefs in Cybersecurity, 1–90. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-6530-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "4604 Cybersecurity and privacy"

1

Wu, Yuxi, W. Keith Edwards, and Sauvik Das. "SoK: Social Cybersecurity." In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. http://dx.doi.org/10.1109/sp46214.2022.9833757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bonfanti, Matteo E. "Enhancing Cybersecurity by Safeguarding Information Privacy." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bhatia, Jaspreet, Travis D. Breaux, Liora Friedberg, Hanan Hibshi, and Daniel Smullen. "Privacy Risk in Cybersecurity Data Sharing." In CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2994539.2994541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vakilinia, Iman, Deepak K. Tosh, and Shamik Sengupta. "Privacy-preserving cybersecurity information exchange mechanism." In 2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2017. http://dx.doi.org/10.23919/spects.2017.8046783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott, Charles, Devin Wynne, and Chutima Boonthum-Denecke. "Examining the Privacy of Login Credentials Using Web-Based Single Sign-on - Are We Giving Up Security and Privacy for Convenience?" In 2016 Cybersecurity Symposium (CYBERSEC). IEEE, 2016. http://dx.doi.org/10.1109/cybersec.2016.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Beckerle, Matthias, Argyro Chatzopoulou, and Simone Fischer-Hubner. "Towards Cybersecurity MOOC Certification." In 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2021. http://dx.doi.org/10.1109/eurospw54576.2021.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tavakolan, Mona, and Ismaeel A. Faridi. "Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics." In 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI). IEEE, 2020. http://dx.doi.org/10.1109/ccci49893.2020.9256605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Beuran, Razvan, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, and Yoichi Shinoda. "CyTrONE: An Integrated Cybersecurity Training Framework." In 3rd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2017. http://dx.doi.org/10.5220/0006206401570166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hutschenreuter, Helmar, Salva Çakmakçı, Christian Maeder, and Thomas Kemmerich. "Ontology-based Cybersecurity and Resilience Framework." In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010233604580466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Brittany, Christopher Whitfield, and Mohd Anwar. "Extended Abstract: Ethical and Privacy Considerations in Cybersecurity." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514188.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "4604 Cybersecurity and privacy"

1

O'Reilly, Patrick, Kristina Rigopoulos, Larry Feldman, and Greg Witte. 2020 Cybersecurity and Privacy Annual Report. National Institute of Standards and Technology, September 2021. http://dx.doi.org/10.6028/nist.sp.800-214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

O'Reilly, Patrick D. 2021 Cybersecurity and Privacy Annual Report. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.800-220.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mitchell, Matt, and Catalina Vallejo. Cybersecurity, Surveillance, and Privacy: An Interview with Matt Mitchell. Just Tech, Social Science Research Council, March 2022. http://dx.doi.org/10.35650/jt.3031.d.2022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boeckl, Katie, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina N. Megas, Ellen Nadeau, Danna Gabel O'Rourke, Ben Piccarreta, and Karen Scarfone. Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. Gaithersburg, MD: National Institute of Standards and Technology, June 2019. http://dx.doi.org/10.6028/nist.ir.8228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prowell, Stacy, David Manz, Candace Culhane, Sheikh Ghafoor, Martine Kalke, Kate Keahey, Celeste Matarazzo, Chris Oehmen, Sean Peisert, and Ali Pinar. Position Papers for the ASCR Workshop on Cybersecurity and Privacy for Scientific Computing Ecosystems. Office of Scientific and Technical Information (OSTI), November 2021. http://dx.doi.org/10.2172/1843573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pookulangara, Sanjukta. Does Gender Matter: An Exploratory Study of Influence of Cybersecurity, Privacy, and Trust on Purchase Intention. Ames: Iowa State University, Digital Repository, November 2015. http://dx.doi.org/10.31274/itaa_proceedings-180814-52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hakmeh, Joyce, Emily Taylor, Allison Peters, and Sophia Ignatidou. The COVID-19 pandemic and trends in technology. Royal Institute of International Affairs, February 2021. http://dx.doi.org/10.55317/9781784134365.

Full text
Abstract:
Focusing on the dynamics between governments and big tech, on cybercrime, and on disinformation and fake news, this paper examines some of the risks that have been highlighted and aggravated as societies have transitioned at speed to a more virtual way of living. The COVID-19 pandemic has been called the ‘great accelerator’ of digital transformation, with technology at the forefront of countries’ response to the crisis. The experience of the past year has underscored that tech governance must be based on human-centric values that protect the rights of individuals but also work towards a public good. In the case of the development of track-and-trace apps, for instance, a successful solution should simultaneously be both respectful of individual privacy and robust from a cybersecurity perspective, while also effectively serving essential epidemiological goals. Ensuring a sound approach to tech policy has been made all the more complex by the context of the pandemic, as decision-makers have found themselves having to respond swiftly and decisively in a public health emergency. While there is considerable uncertainty as to the long-term consequences of their responses, the paper’s authors emphasize that a whole-of-society approach is needed that will restore and build greater public trust in the ability of governments and public-serving bodies to protect them, respect their rights and ensure the information they receive is solid and reliable.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography