Search results for "Computer security"
showing 10 items of 433 documents
Key drivers of internet banking services use
2009
PurposeThe purpose of this paper is to analyse the determinants of internet banking use, paying special attention to the role of product involvement, perceived risk and trust.Design/methodology/approachThe impact of trust, perceived risks, product involvement and TAM beliefs (ease of use and usefulness) on internet banking adoption is tested through structural equation modelling techniques. The sample consists of 511 Spanish internet banking services users and the data are collected through an internet survey. Risk is measured as a formative construct.FindingsData analysis shows that TAM beliefs and perceived risks (security, privacy, performance and social) have a direct influence on e‐ban…
Security of information in IT systems
2005
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
A Secure Spontaneous Ad-Hoc Network to Share Internet Access
2009
In this paper, we propose a secure spontaneous ad-hoc network to grant the access of the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system and the designed messages. We also validate the success of our proposal through several simulations and comparisons with a regular architecture. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low resource communities.
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
2021
Abstract Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for attackers trying to take control over the critical processes. Attackers use various vulnerabilities of such systems including specific vulnerabilities of AI components. It is important to make sure that inappropriate adversarial content will not break the security walls and will not harm the decision logic of critical systems. We believe that the corresponding security toolset must be organized as a trainable self-protection mechanism similar to immunity. We found cer…
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
2020
The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and doxing. Internet users have a variety of attitudes towards the security and privacy risks involved with using the internet and distinct concerns and behaviors with regard to expressing themselves online. In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices. They may also have different attitudes towards personal spending of money for cybersecurity prod…
Transparency in transactive energy at distribution level
2017
A recent report from the German Energy Agency analyzes the possible introduction of the blockchain technology in energy transactions in power distribution. The issue deserves attention since the extensive digitalization of business models puts new challenges to utilities in the power sector. The German decision makers in the energy field claim that blockchain appears as a close perspective and, at the same time, the Gartner hypecycle puts this technology at the peak of inflated expectations in 2016. Diffuse perception however provides hints for further investigation on the topic. This paper provides insight into the problem of peer-to-peer energy exchange from a technical perspective, provi…
Context-sensitive distraction warnings : effects on drivers' visual behavior and acceptance
2016
In this study, we investigated the effects of context-sensitive distraction warnings on drivers' in-car glance behaviors and acceptance. The studied prototype warning application functions on a smart phone. The novelty of the application is its proactive and context-sensitive approach to the adjustment of warning thresholds according to the estimated visual demands of the driving situation ahead. In our study, novice and experienced drivers conducted in-car tasks with a smart phone on a test track with and without the warnings. The application gave a warning if the driver's gaze was recognized to remain on the smart phone over a situation-specific threshold time, or if the driver was approa…
An Initial Security Analysis of the Personal Transaction Protocol
2003
Our society is becoming increasingly dependent on the rapid access and processing of information. The number of handheld mobile devices with access to the Internet and network-based software and services is exploding. Research indicates [1] that by the end of 2002 there will be over 1 billion mobile phone owners globally with Internet access, and that this number is going to grow exponentially in the nearest future. By 2006 the number of interconnected mobile device users is expected exceed the worldwide Internet subscriber population. It is estimated that in a few years there will be three times as many of these devices worldwide as personal computers.
A general framework for group authentication and key exchange protocols
2014
Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…
Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture
2021
To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…