scholarly journals Spearing High Net Wealth Individuals

2013 ◽  
Vol 7 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Nigel Martin ◽  
John Rice

Every day dangerous criminals are targeting high net wealth members of our community as they venture onto the internet. Statements from twenty-nine community organizations and mature age internet users were analyzed using structured coding techniques in order to identify the major criminal risks and threats, and key protective safeguards. The study warns that mature users, particularly those with high net wealth, are critically vulnerable to internet fraud, and personal data and identification theft through spear phishing email and remote access trojan malicious software attacks. The major implication for countries with aging populations, and rising numbers of mature internet users, is the urgent need for ongoing development and resourcing of internet security skills and awareness programs; consumer protection laws and law enforcement assistance; affordable protective internet technologies and complementary support schemes; and the strengthening of online business codes and standards, particularly in dealings with older people.

2020 ◽  
Author(s):  
Fahad Alanezi

UNSTRUCTURED E-health system is emerging and providing health services and solutions through different electronic gadgets. Saudi Arabia has launched a program called Saudi Arabia vision 2030, in which providing state-of-the-art health facilities to their citizen is of topmost priority. After all the efforts, the residents of Saudi Arabia are still reluctant for the adaptation of e-health system. The current study was conducted to evaluate the obstacle in adoption of the e-health system through the mobile phones. The current study was cross-sectional survey and was conducted by developing a self-administered structured questionnaire asking the utilization of mobile phone in state of health emergency prior to ask any medical history. Majority of the participants was married and doing jobs in different firms and have their personal mobile phones (p = 0.100, > 0.05) which indicates easily access to the e-health apps. The majority of the participants suffers from either obesity or high blood pressure (p = 0.018, < 0.05) regardless of either history of mental disorder or other family history of mental diseases. The pattern of diseases with mental disorders correlate well with adoption of e-health in government policies. The obstacles in adopting e-health includes fear of the loss of personal data and information (p = 0.0401, < 0.05). Moreover, they did not trust on online medications as the doctor cannot prescribe medicines without seeing physical health of the patient. The current study concluded that by making improvement in policies and proper commercializing the e-health apps together with awareness programs can boast the adoption of e-health in Saudi Arabia.


2016 ◽  
Vol 15 (3) ◽  
Author(s):  
Yann Balgobin ◽  
David Bounie ◽  
Martin Quinn ◽  
Patrick Waelbroeck

AbstractThe protection of financial personal data has become a major concern for Internet users in the digital economy. This paper investigates whether the consumers’ use of non-bank payment instruments that preserve financial privacy from banks and relatives may increase their online purchases. We analyze the purchasing decisions and the use of bank and non-bank payment instruments of a representative sample of French Internet consumers in 2015. Using two econometric methods, namely a two-step regression and a Bayesian Markov Chain Monte Carlo model to account for a potential endogeneity problem, we find evidence that the use of a non-bank payment instrument positively influences consumers’ online purchases.


2021 ◽  
Vol 3 (1) ◽  
pp. 1-38
Author(s):  
Paul Graßl ◽  
Hanna Schraffenberger ◽  
Frederik Zuiderveen Borgesius ◽  
Moniek Buijzen

Dark patterns are (evil) design nudges that steer people’s behaviour through persuasive interface design. Increasingly found in cookie consent requests, they possibly undermine principles of EU privacy law. In two preregistered online experiments we investigated the effects of three common design nudges (default, aesthetic manipulation, obstruction) on users’ consent decisions and their perception of control over their personal data in these situations. In the first experiment (N = 228) we explored the effects of design nudges towards the privacy-unfriendly option (dark patterns). The experiment revealed that most participants agreed to all consent requests regardless of dark design nudges. Unexpectedly, despite generally low levels of perceived control, obstructing the privacy-friendly option led to more rather than less perceived control. In the second experiment (N = 255) we reversed the direction of the design nudges towards the privacy-friendly option, which we title “bright patterns”. This time the obstruction and default nudges swayed people effectively towards the privacy-friendly option, while the result regarding perceived control stayed the same compared to Experiment 1. Overall, our findings suggest that many current implementations of cookie consent requests do not enable meaningful choices by internet users, and are thus not in line with the intention of the EU policymakers. We also explore how policymakers could address the problem.


2020 ◽  
Vol 12 (6) ◽  
pp. 15-25
Author(s):  
Jonatas S. de Souza ◽  
Jair M. Abe ◽  
Luiz A. de Lima ◽  
Nilson A. de Souza

Rapid technological change and globalization have created new challenges when it comes to the protection and processing of personal data. In 2018, Brazil presented a new law that has the proposal to inform how personal data should be collected and treated, to guarantee the security and integrity of the data holder. The General Law Data Protection - LGPD, was sanctioned on September 18th, 2020. Now, the citizen is the owner of his personal data, which means that he has rights over this information and can demand transparency from companies regarding its collection, storage, and use. This is a major change and, therefore, extremely important that everyone understands their role within LGPD. The purpose of this paper is to emphasize the principles of the General Law on Personal Data Protection, informing real cases of leakage of personal data and thus obtaining an understanding of the importance of gains that meet the interests of Internet users on the subject and its benefits to the entire Brazilian society.


2020 ◽  
pp. 146144482097495
Author(s):  
Tal Morse ◽  
Michael Birnhack

Scholars have observed a gap between users’ stated preferences to protect their privacy and their actual behavior. This is the privacy paradox. This article queries the persistence of the privacy paradox after death. A survey of a representative sample of Israeli Internet users inquired of perceptions, preferences, and actions taken by users regarding their digital remains. The analysis yielded three distinct groups: (1) users interested in preserving privacy posthumously but do not act accordingly; for these users, the privacy paradox persists posthumously; (2) users who match their behavior to their preferences; for these users, the privacy paradox is resolved; and (3) users interested in sharing their personal data posthumously but do not make the appropriate provisions. This scenario is the inverted privacy paradox. This new category has yet to be addressed in the literature. We present some explanations for the persistence of the posthumous privacy paradox and for the inverted privacy paradox.


2011 ◽  
Vol 1 (2) ◽  
pp. 24-42 ◽  
Author(s):  
Horst Treiblmaier ◽  
Larry Neale ◽  
Sandy Chong

As online business thrives, a company’s Web presence holds enormous importance as a source of information, entertainment, and customer service for Internet users. Besides being user-friendly, a Web site should offer interesting and enjoyable content to attract online visitors in an ever-changing multimedia environment. Companies that operate globally must know how cultural differences influence the way potential customers perceive their sites. This paper presents a model that highlights the importance of ease of use, enjoyment, content, and brand trust for Web site loyalty. The model is subsequently tested in four countries: Australia, Japan, Mongolia, and the USA. The results show that perceptual differences exist: while ease of use is crucial for Web site loyalty in all four countries, the importance of content, perceived enjoyment, and brand trust varies across different cultures.


Author(s):  
Dewa Gede Sudika Mangku ◽  
Ni Putu Rai Yuliartini ◽  
I. Nengah Suastika ◽  
I. Gusti Made Arya Suta Wirawan

The emergence and rapid development of information and communication technology has brought about various opportunities and challenges. One of them is the active interaction between individuals and the digital-based information service providers. In modern economic development, related information including personal data or also known as digital dossier—the collection of large amounts of an individual’s information using digital technology—are valuable assets due to their high economic value since they are widely utilized by businesses. In this regard and due to the increasing number of cellphone and internet users, there is a need to study the issues on the importance of protecting one’s personal data. In Indonesia, there is no specific regulation regarding the protection of personal data. Therefore, it is essential to come up with specific and comprehensive legislation related to personal data protection as legal basis for better implementation of personal data protection in Indonesia in the future. The purpose of this research is to find out and analyze the current policies on protection of personal data of internet users in Indonesia. This study uses a normative juridical method with a statutory approach and utilizes literature study. The result shows that the concept of personal data protection implies that individuals have the right to determine whether one will join an online community, share or exchange personal data with another, and the conditions that must be met in order to do so. The study likewise found that the threat of personal data leakage is increasingly occurring because of the development of the e-commerce sector in Indonesia.


2021 ◽  
Vol 1 (13) ◽  
pp. 29-38
Author(s):  
Serhii Krivenko ◽  
Natalya Rotaniova ◽  
Yulianna Lazarevska ◽  
Ulyana Karpenko

The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as &quot;Man in the middle&quot; (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing &quot;Man in the middle&quot; attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network


2011 ◽  
Vol 1 (2) ◽  
pp. 72-75
Author(s):  
Gabriel Hudson Nkotagu

Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing opportunities for fraudsters while at the same time placing more unsuspecting internet users at risk of falling prey to these schemes. There exists a thriving economy online with large sums of money changing hands online. It is therefore important for any internet user to easily identify when they are exposed to internet fraud schemes and as such avoid being a victim.


Sign in / Sign up

Export Citation Format

Share Document