A Model for Privacy and Security Risks Analysis

Author(s):  
Ebenezer Paintsil
2013 ◽  
Vol 734-737 ◽  
pp. 3214-3219
Author(s):  
Hai Dong Zhong ◽  
Ping Li ◽  
Shao Zhong Zhang ◽  
Wen Ting Yuan ◽  
Xu Dong Zhao ◽  
...  

With the tremendous advances in mobile computing and communication capabilities, rapid proliferation of mobile devices, increasing powerful functions, and decreasing device costs, we are seeing a explosively growth in mobile e-commerce in various consumer and business markets. On the basis of analyzing demands of both buyers and seller in mobile e-commerce, the paper put forward a novel concept and technological framework of Location Based Services (LBS) driven mobile e-commerce. Some LBS related functions, in mobile device terminal, of the prototype system based on the architecture put forward are implemented. Also, some key issues of LBS based mobile e-commerce, such as positioning accuracy and new privacy and security risks, are discussed in detail.


Author(s):  
Willem De Groef ◽  
Dominique Devriese ◽  
Tom Reynaert ◽  
Frank Piessens

An important recent innovation on social networking sites is the support for plugging in third-party social applications. Together with the ever-growing number of social network users, social applications come with privacy and security risks for those users. While basic mechanisms for isolating applications are well understood, these mechanisms fall short for social-enabled applications. It is an interesting challenge to design and develop application platforms for social networks that enable the necessary functionality of social applications without compromising both users’ security and privacy. This chapter will identify and discuss the current security and privacy problems related to social applications and their platforms. Next, it will zoom in on proposals on how to address those problems.


Author(s):  
Muhammad Ikram ◽  
Narseo Vallina-Rodriguez ◽  
Suranga Seneviratne ◽  
Mohamed Ali Kaafar ◽  
Vern Paxson

Author(s):  
Daniel L. Ruggles

Multiple levels of potential security risk affect all the elements of an e-commerce site. Truly complete security protects three areas: (1) internal network and application services, (2) perimeter network access and application services, and (3) external network and services. To minimize security risks in these areas as well as to raise overall confidence in the e-commerce service, businesses must address problems with practical solutions involving privacy and security. Establishing an e-commerce trust infrastructure encompasses confidentiality, data integrity, non-repudiation and authentication. Striking the right balance between functionality and accessibility in e-commerce demands technical security measures. It also requires management vigilance with non-technical measures such as routine assessments of vulnerabilities, policies, education and a focus on making processes and policies easy to understand and simple to implement and monitor compliance.


Author(s):  
Mohamed A Eltayeb

In the contemporary world, we are surrounded by a complex network of interconnected sensors. These allows us to share, collate, transmit, and store vast amounts of data. These systems are known as the Internet of Things (IoT), and this technological offering has attracted a large amount of interest from academics, researchers, and developers in recent years due to its highly scalable and agile nature. However, while the IoT delivers significant benefits, it also poses some risks. The data that is stored and exchanged via the IoT is extremely valuable to individuals who have malevolent intent. In more recent years, the increasing popularity of the IoT as a means of sharing information has been associated with privacy and security risks that have undermined users' trust in the IoT. This paper examines what these risks are and some of the actions that can be taken to mitigate them.


Sign in / Sign up

Export Citation Format

Share Document