scholarly journals Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions

Information ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 217
Author(s):  
Heider A. M. Wahsheh ◽  
Flaminia L. Luccio

The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceive the users by providing security and privacy protections that are weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized them based on the real security features they provide, or on their popularity. From the analysis, we extracted a set of recommendations that developers should follow in order to build usable, secure and privacy-friendly barcode scanning applications. Based on them, we also implemented BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a user experience test on our app and we compared it with DroidLa, the most popular/secure QR code reader app. The results show that our app has nice features, such as ease of use, provides security trust, is effective and efficient.

10.2196/19487 ◽  
2020 ◽  
Vol 8 (8) ◽  
pp. e19487
Author(s):  
Yuan Wang ◽  
Yuqiao Liu ◽  
Yancui Shi ◽  
Yanjun Yu ◽  
Jucheng Yang

Background Virtual hospital apps are mobile apps that offer functionalities of online consultation, medical guidance, health community forums, referrals, outpatient appointments or virtual hospital-to-home care services. With an increasing number of online medical and health care consulting services, virtual hospital apps have made health care more accessible and fairer for all, especially in China. However, they have occurred without control or regulation. User evaluation can provide directions to help apps optimize identification, lower risks, and guarantee service quality. Objective We aimed to conduct a systematic search for virtual hospital apps in China. To get a global view, virtual hospital apps were assessed and characterized by means of quantitative analysis. To get a local view, we conducted a content feedback analysis to explore user requirements, expectations, and preferences. Methods A search was conducted of the most popular Apple and Android app stores in China. We characterized and verified virtual hospital apps and grouped apps according to quantification analysis. We then crawled apps and paid attention to corresponding reviews to incorporate users’ involvement, and then performed aspect-based content labeling and analysis using an inductive approach. Results A total of 239 apps were identified in the virtual hospital app markets in China, and 2686 informative corresponding reviews were analyzed. The evidence showed that usefulness and ease of use were vital facts for engagement. Users were likely to trust a consulting service with a high number of downloads. Furthermore, users expected frequently used apps with more optimization to improve virtual service. We characterized apps according to 4 key features: (1) app functionalities, including online doctor consultation, in-app purchases, tailored education, and community forums; (2) security and privacy, including user data management and user privacy; (3) health management, including health tracking, reminders, and notifications; and (4) technical aspects, including user interface and equipment connection. Conclusions Virtual hospitals relying on the mobile internet are growing rapidly. A large number of virtual hospital apps are available and accessible to a growing number of people. Evidence from this systematic search can help various types of virtual hospital models enhance virtual health care experiences, go beyond offline hospitals, and continuously meet the needs of individual end users.


2020 ◽  
Author(s):  
Yuan Wang ◽  
Yuqiao Liu ◽  
Yancui Shi ◽  
Yanjun Yu ◽  
Jucheng Yang

BACKGROUND Virtual hospital apps are mobile apps that offer functionalities of online consultation, medical guidance, health community forums, referrals, outpatient appointments or virtual hospital-to-home care services. With an increasing number of online medical and health care consulting services, virtual hospital apps have made health care more accessible and fairer for all, especially in China. However, they have occurred without control or regulation. User evaluation can provide directions to help apps optimize identification, lower risks, and guarantee service quality. OBJECTIVE We aimed to conduct a systematic search for virtual hospital apps in China. To get a global view, virtual hospital apps were assessed and characterized by means of quantitative analysis. To get a local view, we conducted a content feedback analysis to explore user requirements, expectations, and preferences. METHODS A search was conducted of the most popular Apple and Android app stores in China. We characterized and verified virtual hospital apps and grouped apps according to quantification analysis. We then crawled apps and paid attention to corresponding reviews to incorporate users’ involvement, and then performed aspect-based content labeling and analysis using an inductive approach. RESULTS A total of 239 apps were identified in the virtual hospital app markets in China, and 2686 informative corresponding reviews were analyzed. The evidence showed that usefulness and ease of use were vital facts for engagement. Users were likely to trust a consulting service with a high number of downloads. Furthermore, users expected frequently used apps with more optimization to improve virtual service. We characterized apps according to 4 key features: (1) app functionalities, including online doctor consultation, in-app purchases, tailored education, and community forums; (2) security and privacy, including user data management and user privacy; (3) health management, including health tracking, reminders, and notifications; and (4) technical aspects, including user interface and equipment connection. CONCLUSIONS Virtual hospitals relying on the mobile internet are growing rapidly. A large number of virtual hospital apps are available and accessible to a growing number of people. Evidence from this systematic search can help various types of virtual hospital models enhance virtual health care experiences, go beyond offline hospitals, and continuously meet the needs of individual end users.


2018 ◽  
Vol 3 (2) ◽  
pp. 103
Author(s):  
Gede Wira Astawa ◽  
I Gusti Lanang Agung Raditya Putra ◽  
I Gede Putu Krisna Juliharta

AbstrakLukisan Wayang Kamasan merupakan salah satu kerajinan yang merupakan warisan budaya Bali. Salah satu startup yaitu Way’K menginovasikan Lukisan Wayang Kamasan menjadi produk modern seperti lukisan jam dinding, lukisan lampu LED, dan souvenir berupa plakat. Namun hal tersebut belum cukup untuk meningkatkan daya jual dari seni lukis wayang kamasan karena berdasarkan hasil wawancara terhadap owner startup Way’K wisatawan kurang tertarik membeli karena wisatawan tidak mengetahui dari makna dan cerita yang terdapat dalam lukisan tersebut, selain itu promosi dan penjualan masih dilakukan secara konvensional mengingat perkembangan zaman memasuki era digital.  Maka dari itu penulis membuat suatu aplikasi seni lukis Wayang Kamasan berbasis Android yang dapat menampilkan cerita lukisan melalui kode QR yang dipindai pada lukisan serta terdapat fitur informasi dan pembelian produk secara online melalui aplikasi. Pada pembuatan aplikasi menggunakan metode pendekatan software waterfall dan menggunakan pemodelan Use Case serta Class Diagram dalam perancangan aplikasi. Aplikasi dibangun menggunakan framework React Native dan framework Laravel dan diuji menggunakan metode blackbox testing dan aplikasi telah berhasil dirancang bangun dan berhasil di uji coba dengan hasil sesuai dengan yang diharapkan. Untuk mengetahui tingkat kemudahan penggunaan sistem dilakukan dengan metode Usability testing dan didapatkan hasil sangat baik. Kata Kunci : Lukisan Wayang Kamasan, Aplikasi Android, Kode QR AbstractKamasan puppet painting is one of the handicrafts that is a Balinese cultural heritage. One of the startups, Way'K, innovates the Kamasan puppet painting into modern products such as wall clock paintings, LED light paintings, and souvenirs in the form of placards. However, this is not enough to increase the selling power of Kamasan puppet painting because based on the results of interviews with startup owners of Way'K tourists are less interested in buying because tourists do not know the meaning and stories contained in the painting, besides promotion and sales are still done conventional considering the development of the era entering the digital era. Therefore, the author makes an Android-based Kamasan puppet painting application that can display painting stories through scanned QR codes on paintings and there are information features and product purchases online through the application. In making the application using the waterfall software approach method and using Use Case modeling and Class Diagram in application design. The application was built using the React Native framework and Laravel framework and tested using the blackbox testing method and the application was successfully designed to wake up and successfully tested with the results as expected. To determine the level of ease of use of the system carried out by the Usability testing method and obtained very good results. Keywords : Kamasan Puppet Painting, Android Application, QR Code


2016 ◽  
Vol 8 (1) ◽  
pp. 75-91 ◽  
Author(s):  
Shelby Devina ◽  
Waluyo Waluyo

The objective of this research was to examine the effect of perceived usefulness, perceived ease of use, speed, security and privacy and readiness technology tax payers information to e-Filing usage. The object of this study is the individual tax payers in Tangerang City, Karawaci District. The selection of the sample is determined based on convenience sampling method. Data used in this study was primary data, id est: questionnaires. The respondent in this study were 110. Data analysis technique in this study using multiple linear regression. The result of this study were (1) perceived usefulness have a significant impact towards e-Filing usage; (2) perceived ease of use have a significant impact towards e-Filing usage; (3) speed does not have a significant impact towards e-Filing usage; (4) security and privacy does not have a significant impact towards e-Filing usage; (5) readiness technology tax payers information does not have a significant impact towards e-Filing usage; (6) perceived usefulness, perceived ease of use, speed, security and privacy and readiness technology tax payers information all simultaneously, have a significant impact towards e-Filing usage. Keywords: e-Filing usage, perceived usefulness, perceived ease of use, readiness technology tax payers information, security and privacy.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-26
Author(s):  
Georgios Fragkos ◽  
Cyrus Minwalla ◽  
Eirini Eleni Tsiropoulou ◽  
Jim Plusquellic

Electronic cash ( e-Cash ) is a digital alternative to physical currency such as coins and bank notes. Suitably constructed, e-Cash has the ability to offer an anonymous offline experience much akin to cash, and in direct contrast to traditional forms of payment such as credit and debit cards. Implementing security and privacy within e-Cash, i.e., preserving user anonymity while preventing counterfeiting, fraud, and double spending, is a non-trivial challenge. In this article, we propose major improvements to an e-Cash protocol, termed PUF-Cash, based on physical unclonable functions ( PUFs ). PUF-Cash was created as an offline-first, secure e-Cash scheme that preserved user anonymity in payments. In addition, PUF-Cash supports remote payments; an improvement over traditional currency. In this work, a novel multi-trusted-third-party exchange scheme is introduced, which is responsible for “blinding” Alice’s e-Cash tokens; a feature at the heart of preserving her anonymity. The exchange operations are governed by machine learning techniques which are uniquely applied to optimize user privacy, while remaining resistant to identity-revealing attacks by adversaries and trusted authorities. Federation of the single trusted third party into multiple entities distributes the workload, thereby improving performance and resiliency within the e-Cash system architecture. Experimental results indicate that improvements to PUF-Cash enhance user privacy and scalability.


2021 ◽  
Author(s):  
Ayan Chatterjee ◽  
Andreas Prinz

UNSTRUCTURED The Internet of Medical Things (IoMT) combines medical devices and applications connected to healthcare information technology systems using network technologies. With the flourishing adaptation rate of Internet-enabled medical devices in healthcare applications, we need to guarantee the security and privacy of electronic health records (EHRs) and communications among these IoMT devices, exposed web services, and the underlying infrastructure. This research is a proof-of-concept (PoC) study for implementing an integrated security solution with Spring Security and KeyCloak open-access platform (SSK) to safeguard microservice architecture application programming interfaces (APIs). Subsequently, we extended the security solution with a virtual private network (VPN), Bcrypt hash, API key, network firewall, and secure socket layer (SSL) to build up a digital infrastructure following the Norwegian data protection policies and General Data Protection Regulation (GDPR). In this study, we have not proposed any new security solution; however, we have focused on accomplishing a hybrid security solution based on the established frameworks (e.g., Spring Security) and open-access software product (e.g., Keycloak) to protect microservice APIs for a health eCoach system as a PoC study. This study describes the methodological, technical, and practical considerations to protect REST interfaces only and ensuring the privacy of data in the system. We validate our SSK security implementation by theoretical evaluation and experimental testing. In addition, we compare the test results with related studies qualitatively to determine the effectiveness of the hybrid security solution (SSK).


2012 ◽  
Vol 3 (2) ◽  
pp. 36-49 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Osamah Ghaleb

This research extended the Technology Acceptance Model (TAM) with perceived trust and perceived risks (security and privacy concerns) constructs to identify the impact of these factors on Jordanian users’ intentions to adopt mobile commerce (m-commerce). An empirical test was used utilizing 132 responses from students in two public universities in Jordan. Results indicated that perceived trust, perceived usefulness, and perceived ease of use are major influencers of mobile commerce adoption. On the other hand, perceived risk factors (security and privacy concerns) were not significant in this relation. Discussion, conclusion and future work are stated at the end of this paper.


CHIPSET ◽  
2020 ◽  
Vol 1 (01) ◽  
pp. 1-4
Author(s):  
Mohammad Hafiz Hersyah ◽  
Ririn Putri Anedya

This research aims to establish a reservation system or reservation schedule for health services in the health facility class one. This system uses qr code technology to identify health service schedule orders made by users. This system consists of a laptop webcam that functions as a device for reading data in QR codes, Arduino Uno microcontroller as a data processor for reading QR code results, an MP3 player module as a device for storing sound output, speakers functioning as sound output devices for reading QR codes and Android application as a system interface for ordering health service schedules in health facility class one and accessing databases. Ordering a health service schedule starts with the selection of the service schedule by the user on the android application, then the user will get a qr code as proof of the order made to identify the sequence that will later be read by the webcam laptop and the results processed by Arduino followed by the voice output from the speaker. This study shows the success rate of the system in making online schedule bookings by 100%. In the process of identifying the QR code using a webcam with bright lighting conditions it has a 100% success rate and with a reading range of 11-20 cm a 90% success rate is obtained. In testing, the sound output from the speakers obtained a success rate of 100%.


10.28945/3216 ◽  
2008 ◽  
Author(s):  
Tanja Krunic ◽  
Ljiljana Ruzic-Dimitrijevic

The idea of the paper is to investigate how much the online user privacy is respected by website owners, and how online privacy can be improved. We first focus ourselves on issues like possibilities of misusing personal data, data collecting and user-tracking. Then we give a short report about legislation in the EU concerning user privacy. Some facts about user confidence are given as well. They are follows by a brief list of hints for the users to protect their personal data when surfing the Web. Then we give an overview of actions website owners should take in order to support user privacy. Finally, we present the results of our investigation of the condition of user privacy in practice, and give some suggestions on its improvement.


2021 ◽  
Vol 9 (1) ◽  
pp. 20-27
Author(s):  
Dr. Sulaiman Althuwaini ◽  
Dr. Mohamed Saleh Salem

The purpose of the study is to examine the factors that impact the intention of Saudi citizens to use a mobile government smartphone application (Absher). Saudi Arabia seeks to invest and develop the infrastructure of the government’s mobile services, to be one of the leading countries in the region. Smartphone applications backed by mobile technologies have changed mobile services use which permit anywhere at any time access. Drawing on technology acceptance theories and relevant literature, this study developed and tested a structural model that integrates factors perceived usefulness, perceived ease of use, perceived privacy and trust in order to investigate the predictors of Absher use intention in the Saudi Arabia. The proposed model is tested using structural equation model (SEM) on data collected using an online questionnaire. Statistical analysis revealed that intention to use Absher was significantly associated with perceived trust, security and privacy, ease of use, and usefulness. Drawing on the technology acceptance model and trust theory, this study develops and empirically examines a model for users' intention to use mobile government services. This study contributes to the marketing literature by examining the impact of PU, PEOU and trust on mobile government services acceptance in developing countries.


Sign in / Sign up

Export Citation Format

Share Document