Search results for " privacy"
showing 10 items of 318 documents
2021
Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020
2010
In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.
Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities
2021
AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…
An attribute based access control scheme for secure sharing of electronic health records
2016
Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Developing the "next generation" of genetic association databases for complex diseases
2012
Tens of thousands of genetic association studies investigating the influence of common polymorphisms on disease susceptibility have been published to date. These include similar to 1,000 genome-wide association studies (GWAS). This vast amount of data in the field of complex genetics is becoming increasingly difficult to follow and interpret. It can be expected that the situation will become even more complex with the advent of association projects using next-generation technologies. One of the aims of the Human Variome Project is to concatenate such data in meaningful ways, for example, within the context of publicly available field synopses. Here, we present various examples of online gen…
Key Drivers of Internet Banking Adoption
2008
The objective of this chapter is to provide students and managers with a holistic view into the different factors that influence online banking adoption and to use the study’s findings to develop strategies for managers on how to maximize the rate of Internet banking adoption. Research done with a sample size of 450 Spanish Internet users, has highlighted that Internet banking adoption is more likely in young, highly educated and high-income consumers. Internet affinity, online use experience and some perceived benefits are also key drivers of online financial services pur chase decision-making. Perceived financial, social and psychological risk negatively influences the use of online-banki…
Do the mobile-rich get richer? Internet use, travelling and social differentiations in Finland
2014
This article investigates the daily travelling practices that are related to mobile-only, fixed-only and combined mobile/fixed use of the Internet, and the social differentiations that are related to these three ways of accessing the Internet. Survey data ( N = 612) collected from Finland in 2011 are analysed. The article shows that mobile-only Internet use is not associated with particularly diverse or frequent daily travelling practices, whereas combined mobile/fixed use is. Mobile-only Internet users are, in fact, in a relatively disadvantaged position – compared with other users, they are more typically unemployed and their household income is lower. The mobility of Internet access as …
Do Dr. Google and Health Apps Have (Comparable) Side Effects? An Experimental Study
2020
Googling and using apps for health-related information are highly prevalent worldwide. So far, little is known about the emotional, body-related, and behavioral effects of using both Google and health-related apps. In our experimental study, bodily symptoms were first provoked by a standardized hyperventilation test. A total of 147 participants (96.6% students) were then randomly assigned to one of three conditions: Googling for the causes of the currently experienced bodily symptoms, using a medical app to diagnose the experienced symptoms, and a waiting control condition. Health-related Internet use for symptoms led to stronger negative affect, increased health anxiety, and increased nee…
On-Demand Security Framework for 5GB Vehicular Networks
2023
Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…