Results for 'Data Security'

991 found
Order:
  1.  29
    The (Big) Data-security assemblage: Knowledge and critique.Tobias Blanke & Claudia Aradau - 2015 - Big Data and Society 2 (2).
    The Snowden revelations and the emergence of ‘Big Data’ have rekindled questions about how security practices are deployed in a digital age and with what political effects. While critical scholars have drawn attention to the social, political and legal challenges to these practices, the debates in computer and information science have received less analytical attention. This paper proposes to take seriously the critical knowledge developed in information and computer science and reinterpret their debates to develop a critical intervention (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  2.  45
    Ethical concerns around privacy and data security in AI health monitoring for Parkinson’s disease: insights from patients, family members, and healthcare professionals.Itai Bavli, Anita Ho, Ravneet Mahal & Martin J. McKeown - forthcoming - AI and Society:1-11.
    Artificial intelligence (AI) technologies in medicine are gradually changing biomedical research and patient care. High expectations and promises from novel AI applications aiming to positively impact society raise new ethical considerations for patients and caregivers who use these technologies. Based on a qualitative content analysis of semi-structured interviews and focus groups with healthcare professionals (HCPs), patients, and family members of patients with Parkinson’s Disease (PD), the present study investigates participant views on the comparative benefits and problems of using human versus (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  24
    Use of Official Data of State Institutions in the Scientific Research of the Population Security.Vidmantas Egidijus Kurapka & Viktoras Justickis - 2010 - Jurisprudencija: Mokslo darbu žurnalas 121 (3):283-294.
    The paper discusses the problems in the detection of security information in legal and other administrative data. The authors analyse the prospects of the use of datamining in the solution of two key problems: abundance and indirectness of these data. Security research uses two kinds of data. The first one is scientific data, designed and gathered specially for the verification of certain security theories. They are the data of criminological, sociological, psychological surveys, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  26
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  49
    Security Assessment of Teachers' Right to Healthy and Safe Working Environment: Data from a Mass Written Survey (article in Lithuanian).Gediminas Merkys, Algimantas Urmonas & Daiva Bubelienė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):575-594.
    This paper presents the results of an empirical study that reflects monitoring and evaluation of the implementation of some legal acts on the labour of the Republic of Lithuania. The analysis of legal documents at the national and international level is provided. A review of cognate studies conducted by foreign and Lithuanian researchers is presented and the professional situation of a Lithuanian teacher from the employee rights perspective is highlighted. The professional activities contexts and sectors, wherein systematic violations of teachers’ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  33
    Apriori Algorithm for the Data Mining of Global Cyberspace Security Issues for Human Participatory Based on Association Rules.Zhi Li, Xuyu Li, Runhua Tang & Lin Zhang - 2021 - Frontiers in Psychology 11.
    This study explored the global cyberspace security issues, with the purpose of breaking the stereotype of people’s cognition of cyberspace problems, which reflects the relationship between interdependence and association. Based on the Apriori algorithm in association rules, a total of 181 strong rules were mined from 40 target websites and 56,096 web pages were associated with global cyberspace security. Moreover, this study analyzed support, confidence, promotion, leverage, and reliability to achieve comprehensive coverage of data. A total of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  7. Secure and Scalable Data Mining Technique over a Restful Web Services.Solar Francesco & Oliver Smith - forthcoming - International Journal of Research and Innovation in Applied Science.
    Scalability, efficiency, and security had been a persistent problem over the years in data mining, several techniques had been proposed and implemented but none had been able to solve the problem of scalability, efficiency and security from cloud computing. In this research, we solve the problem scalability, efficiency and security in data mining over cloud computing by using a restful web services and combination of different technologies and tools, our model was trained by using different (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  7
    5G Security Features, Vulnerabilities, Threats, and Data Protection in IoT and Mobile Devices: A Systematic Review.Alexandre Sousa & Manuel J. C. S. Reis - forthcoming - Evolutionary Studies in Imaginative Culture:414-427.
    The evolution of wireless communications, from the first to the fifth generation, has driven Internet of Things (IoT) advancements. IoT is transforming sectors like agriculture, healthcare, and transportation, but also presents challenges like spectrum bandwidth demand, speed requirements, and security issues. IoT environments, with embedded sensors and actuators, connect to other devices to transmit and receive data over the internet. These data are processed locally or in the cloud, enabling decision-making and automation. Various wireless technologies, including Bluetooth, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  10
    Application of data mining technology in detecting network intrusion and security maintenance.Mehedi Masud, Roobaea Alroobaea, Fahad M. Almansour, Gurjot Singh Gaba & Yongkuan Zhu - 2021 - Journal of Intelligent Systems 30 (1):664-676.
    In order to correct the deficiencies of intrusion detection technology, the entire computer and network security system are needed to be more perfect. This work proposes an improved k-means algorithm and an improved Apriori algorithm applied in data mining technology to detect network intrusion and security maintenance. The classical KDDCUP99 dataset has been utilized in this work for performing the experimentation with the improved algorithms. The algorithm’s detection rate and false alarm rate are compared with the experimental (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  10. Using Open, Public Data for Security Provision: Ethical Perspectives on Risk-Based Border Checks in the EU.Sebastian Weydner-Volkmann - 2023 - European Journal for Security Research 8:25–42.
    This article explores the use of open-source intelligence (OSINT) techniques as part of data-driven border checks in the EU. While the idea to group travelers into risk categories in order to differentiate the intensity of border checks has been criticized for its likely impact on privacy and other fundamental rights, the exclusive use of “open,” “public” data was proposed as an alternative that mitigates these issues. However, OSINT remains a rather vague term, as it is unclear what constitutes (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  17
    Security and Sharing of NIPT Data Are the Basis of Ethical Decision-Making Related to Non-Medical Traits.Wenke Yang, Zhenglong Guo, Weili Shi, Litao Qin, Xiaoliang Xia, Bingtao Hao & Shixiu Liao - 2023 - American Journal of Bioethics 23 (3):29-31.
    Bowman-Smart et al. (2023) outlined the scenario that with the content expansion of noninvasive prenatal testing (NIPT) in the future, its application is not limited to the screening for aneuploidi...
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  16
    Cultivating famine: data, experimentation and food security, 1795–1848.John Lidwell-Durnin - 2020 - British Journal for the History of Science 53 (2):159-181.
    Collecting seeds and specimens was an integral aspect of botany and natural history in the eighteenth century. Historians have until recently paid less attention to the importance of collecting, trading and compiling knowledge of their cultivation, but knowing how to grow and maintain plants free from disease was crucial to agricultural and botanical projects. This is particularly true in the case of food security. At the close of the eighteenth century, European diets (particularly among the poor) began shifting from (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  14
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social (...) funds are analyzed. This article focuses on the construction of the cloud audit platform for social security funds. The general idea of using fuzzy data mining algorithm to build the social security fund audit cloud platform is to compress the knowledge contained in a large number of data into the weights between nodes and optimize the weights through the learning of the neural network system. Through the optimization function, the information contained in the neural network is stored in a few weights as far as possible. The main information is further highlighted by network clipping and removing weights that have little impact on the output. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  49
    Dynamics of Crimes against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
    The development of an information society and information technologies does not result in positive consequences only. Individuals with criminal intent also find their niche. Information security includes the creation of the input, processing and output processes of protection. The objective of information security is to protect the system of values, to protect and ensure accuracy and integrity and to minimize losses that may be incurred if the information is modified or destroyed. In the development of an information society, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  17
    Study on data mining method of network security situation perception based on cloud computing.Rahul Neware, Vishal Jagota, Arshpreet Kaur & Yan Zhang - 2022 - Journal of Intelligent Systems 31 (1):1074-1084.
    In recent years, the network has become more complex, and the attacker’s ability to attack is gradually increasing. How to properly understand the network security situation and improve network security has become a very important issue. In order to study the method of extracting information about the security situation of the network based on cloud computing, we recommend the technology of knowledge of the network security situation based on the data extraction technology. It converts each (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  11
    Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining.Zhibin Yang, Gang Wang, Shuheng Xu, Yaodong Tao, Defeng Chen & Shuai Ren - 2022 - Journal of Intelligent Systems 31 (1):817-834.
    The power grid is an important connection between power sources and users, responsible for supplying and distributing electric energy to users. Modern power grids are widely distributed and large in scale, and their security faces new problems and challenges. Information entropy theory is an objective weighting method that compares the information order of each evaluation index to judge the weight value. With the wide application of entropy theory in various disciplines, the subject of introducing entropy into the power system (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  34
    Politics of prediction: Security and the time/space of governmentality in the age of big data.Tobias Blanke & Claudia Aradau - 2017 - European Journal of Social Theory 20 (3):373-391.
    From ‘connecting the dots’ and finding ‘the needle in the haystack’ to predictive policing and data mining for counterinsurgency, security professionals have increasingly adopted the language and methods of computing for the purposes of prediction. Digital devices and big data appear to offer answers to a wide array of problems of (in)security by promising insights into unknown futures. This article investigates the transformation of prediction today by placing it within governmental apparatuses of discipline, biopower and big (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  18.  18
    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication.Banghua Wu, Shah Nazir & Neelam Mukhtar - 2020 - Complexity 2020:1-12.
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  9
    The Emergence of State Data Privacy and Security Laws Affects Employers.Joseph J. Lazzarotti - unknown - Emergence: Complexity and Organization 1:1-2008.
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  16
    Research on data mining method of network security situation awareness based on cloud computing.Rajan Miglani, Abdullah M. Baqasah, Roobaea Alroobaea, Guodong Zhao & Ying Zhou - 2022 - Journal of Intelligent Systems 31 (1):520-531.
    Due to the complexity and versatility of network security alarm data, a cloud-based network security data extraction method is proposed to address the inability to effectively understand the network security situation. The information properties of the situation are generated by creating a set of spatial characteristics classification of network security knowledge, which is then used to analyze and optimize the processing of hybrid network security situation information using cloud computing technology and co-filtering technology. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
    I will argue that one class of issues in computer ethics oftenassociated with privacy and a putative right to privacy isbest-analyzed in terms that make no substantive reference toprivacy at all. These issues concern the way that networkedinformation technology creates new ways in which conventionalrights to personal security can be threatened. However onechooses to analyze rights, rights to secure person and propertywill be among the most basic, the least controversial, and themost universally recognized. A risk-based approach to theseissues provides (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  22.  24
    The Schengen Information System and Data Retention. On Surveillance, Security and Legitimacy in the European Union.Elisa Orrù - 2017 - In Elisa Orrù, Maria Grazia Porcedda & Sebastian Weydner-Volkmann (eds.), Rethinking Surveillance and Control. Beyond the 'Security vs. Privacy' Debate. Baden-Baden: Nomos. pp. 115-136.
    As a technique of social control based on the collection of information, surveillance has been a central instrument of any administrative power since the modern era. Surveillance, however, can be carried out in different ways and these can provide important information on the basic features of a particular political system. Indeed, the introduction of surveillance measures has an impact on key relationships of a political system, such as liberty and security, autonomy and authority. When a political system is, like (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  23.  24
    The Problem of Proliferation: Guidelines for Improving the Security of Qualitative Data in a Digital Age.Judith Aldridge, Juanjo Medina & Robert Ralphs - 2010 - Research Ethics 6 (1):3-9.
    High profile breaches of data security in government and other organizations are becoming an increasing concern amongst members of the public. Academic researchers have rarely discussed data security issues as they affect research, and this is especially the case for qualitative social researchers, who are sometimes disinclined to technical solutions. This paper describes 14 guidelines developed to help qualitative researchers improve the security of their digitally-created and stored data. We developed these procedures after the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  44
    “Who is watching the watchdog?”: ethical perspectives of sharing health-related data for precision medicine in Singapore.Tamra Lysaght, Angela Ballantyne, Vicki Xafis, Serene Ong, Gerald Owen Schaefer, Jeffrey Min Than Ling, Ainsley J. Newson, Ing Wei Khor & E. Shyong Tai - 2020 - BMC Medical Ethics 21 (1):1-11.
    Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research. Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages and analysed with qualitative content and thematic analysis. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  25.  16
    Is it becoming harder to secure reviewers for peer review? A test with data from five ecology journals.Timothy H. Vines, Alison Cobra, Jennifer L. Gow & Arianne Y. K. Albert - 2016 - Research Integrity and Peer Review 1 (1).
    BackgroundThere is concern in the academic publishing community that it is becoming more difficult to secure reviews for peer-reviewed manuscripts, but much of this concern stems from anecdotal and rhetorical evidence.MethodsWe examined the proportion of review requests that led to a completed review over a 6-year period (2009–2015) in a mid-tier biology journal (Molecular Ecology). We also re-analyzed previously published data from four other mid-tier ecology journals (Functional Ecology, Journal of Ecology, Journal of Animal Ecology, and Journal of Applied (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  11
    Reforming European Data Protection Law.Paul de Hert, Serge Gutwirth & Ronald Leenes (eds.) - 2015 - Dordrecht: Imprint: Springer.
    This book on privacy and data protection offers readers conceptual analysis as well as thoughtful discussion of issues, practices, and solutions. It features results of the seventh annual International Conference on Computers, Privacy, and Data Protection, CPDP 2014, held in Brussels January 2014. The book first examines profiling, a persistent core issue of data protection and privacy. It covers the emergence of profiling technologies, on-line behavioral tracking, and the impact of profiling on fundamental rights and values. Next, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  43
    Genomic Data-Sharing Practices.Angela G. Villanueva, Robert Cook-Deegan, Jill O. Robinson, Amy L. McGuire & Mary A. Majumder - 2019 - Journal of Law, Medicine and Ethics 47 (1):31-40.
    Making data broadly accessible is essential to creating a medical information commons. Transparency about data-sharing practices can cultivate trust among prospective and existing MIC participants. We present an analysis of 34 initiatives sharing DNA-derived data based on public information. We describe data-sharing practices captured, including practices related to consent, privacy and security, data access, oversight, and participant engagement. Our results reveal that data-sharing initiatives have some distance to go in achieving transparency.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  28.  94
    Online Security and the Protection of Civil Rights: A Legal Overview. [REVIEW]Ugo Pagallo - 2013 - Philosophy and Technology 26 (4):381-395.
    The paper examines the connection between online security and the protection of civil rights from a legal viewpoint, that is, considering the different types of rights and interests that are at stake in national and international law and whether, and to what extent, they concern matters of balancing. Over the past years, the purpose of several laws, and legislative drafts such as ACTA, has been to impose “zero-sum games”. In light of current statutes, such as HADOPI in France, or (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  29.  38
    Unlocking data: Where is the key?María C. Sánchez & Antonio Sarría‐Santamera - 2019 - Bioethics 33 (3):367-376.
    Health‐related data uses and data sharing have been in the spotlight for a while. Since the beginning of the big data era, massive data mining and its inherent possibilities have only increased the debate about what the limits are. Data governance is a relevant aspect addressed in ethics guidelines. In this context, the European project BRIDGE Health (BRidging Information and Data Generation for Evidence‐based Health policy and research) strove to achieve a comprehensive, integrated and (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  11
    Ai Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws.Max Parasol - 2021 - Cambridge University Press.
    The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws affect innovation in artificial intelligence. The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  28
    Anticipatory Governance in Biobanking: Security and Risk Management in Digital Health.Dagmar Rychnovská - 2021 - Science and Engineering Ethics 27 (3):1-18.
    Although big-data research has met with multiple controversies in diverse fields, political and security implications of big data in life sciences have received less attention. This paper explores how threats and risks are anticipated and acted on in biobanking, which builds research repositories for biomedical samples and data. Focusing on the biggest harmonisation cluster of biomedical research in Europe, BBMRI-ERIC, the paper analyses different logics of risk in the anticipatory discourse on biobanking. Based on document analysis, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  14
    Balancing security and care: Gender relations of nursing staff in forensic psychiatric care.Esa Kumpula, Per Ekstrand & Lena-Karin Gustafsson - 2022 - Nursing Inquiry 29 (4):e12478.
    This study departs from the built-in tension of the dual goals of forensic psychiatric care in Sweden, which are to protect society as well as to care for patients. The majority of violence that takes place is perpetrated by men. Therefore, the views of nursing staff on violence as a gendered phenomenon have an impact on the care provision. There is a need for further knowledge of how norms of violence are intertwined with the construction of gender. The aim of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  73
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection and cyber (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  19
    Genomic Data as a National Strategic Resource: Implications for the Genomic Commons and International Data Sharing for Biomedical Research and Innovation.Kyle McKibbin & Mahsa Shabani - 2023 - Journal of Law, Medicine and Ethics 51 (2):301-313.
    This article provides a critical review of new policies in China, the United States, and the European Union that characterize genomic data as a national strategic resource. Specifically, we review policies that regulate human genomic data for economic, national security, or other strategic purposes rather than ethical or individual rights purposes.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Surveillance, security, and AI as technological acceptance.Yong Jin Park & S. Mo Jones-Jang - 2023 - AI and Society 38 (6):2667-2678.
    Public consumption of artificial intelligence (AI) technologies has been rarely investigated from the perspective of data surveillance and security. We show that the technology acceptance model, when properly modified with security and surveillance fears about AI, builds an insight on how individuals begin to use, accept, or evaluate AI and its automated decisions. We conducted two studies, and found positive roles of perceived ease of use (PEOU) and perceived usefulness (PU). AI security concern, however, negatively affected (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  43
    Patients’ and public views and attitudes towards the sharing of health data for research: a narrative review of the empirical evidence.Shona Kalkman, Johannes van Delden, Amitava Banerjee, Benoît Tyl, Menno Mostert & Ghislaine van Thiel - 2022 - Journal of Medical Ethics 48 (1):3-13.
    IntroductionInternational sharing of health data opens the door to the study of the so-called ‘Big Data’, which holds great promise for improving patient-centred care. Failure of recent data sharing initiatives indicates an urgent need to invest in societal trust in researchers and institutions. Key to an informed understanding of such a ‘social license’ is identifying the views patients and the public may hold with regard to data sharing for health research.MethodsWe performed a narrative review of the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  37.  17
    Clouded data: Privacy and the promise of encryption.Liam Magee, Tsvetelina Hristova & Luke Munn - 2019 - Big Data and Society 6 (1).
    Personal data is highly vulnerable to security exploits, spurring moves to lock it down through encryption, to cryptographically ‘cloud’ it. But personal data is also highly valuable to corporations and states, triggering moves to unlock its insights by relocating it in the cloud. We characterise this twinned condition as ‘clouded data’. Clouded data constructs a political and technological notion of privacy that operates through the intersection of corporate power, computational resources and the ability to obfuscate, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  13
    Security in advanced metering infrastructures: Lightweight cryptography.Luis Hernández-Álvarez, Juan José Bullón Pérez & Araceli Queiruga-Dios - forthcoming - Logic Journal of the IGPL.
    Smart grids are designed to revolutionize the energy sector by creating a smarter, more efficient and reliable power supply network. The rise of smart grids is a response to the need for a more comprehensive and sophisticated energy system that caters to the needs of homes and businesses. Key features of smart grids include the integration of renewable energy sources, decentralized generation and advanced distribution networks. At the heart of smart grids is a sophisticated metering system, consisting of intelligent electronic (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  14
    Job Security and Organizational Citizenship Behaviors in Chinese Hybrid Employment Context: Organizational Identification Versus Psychological Contract Breach Perspective Differences Across Employment Status.Wenzhu Lu, Xiaolang Liu, Shanshi Liu & Chuanyan Qin - 2021 - Frontiers in Psychology 12.
    The goal of the present research was to identify the mechanism through which job security exerts its different effects on organizational citizenship behaviors among contract and permanent employees from social identity and social exchange perspectives. Our research suggests two distinct, yet related explanatory mechanisms: organizational identification and psychological contract breach, to extend the job security literature by examining whether psychological contract breach and organization identity complement each other and explaining the mechanism of different behaviors response to job (...) across employment status. Data were collected from 211 Chinese employees and 61 supervisory ratings of OCBs. Our results showed that relative to psychological contract breach, organizational identification plays a stronger mediating role in the association between job security and OCBs. Evidence from multi-group analyses also suggested employment status moderated the mediation mechanism of organizational identification between job security and OCB. Implications for job security and hybrid employment management are discussed. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  28
    Internet security – technology and social awareness of the dangers.Piotr Paweł Laskowski - 2017 - Studies in Logic, Grammar and Rhetoric 50 (1):239-252.
    The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  23
    Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma.H. M. Verhelst, A. W. Stannat & G. Mecacci - 2020 - Science and Engineering Ethics 26 (6):2975-2984.
    Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass surveillance techniques that use bulk data collection and machine learning algorithms, we show why these methods are unlikely to pinpoint terrorists in order to prevent attacks. The diverse characteristics of terrorist attacks—especially (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42. Privacy, Security, and Government Surveillance: Wikileaks and the New Accountability.Adam Moore - 2011 - Public Affairs Quarterly 25 (2):141-156.
    In times of national crisis, citizens are often asked to trade liberty and privacy for security. And why not, it is argued, if we can obtain a fair amount of security for just a little privacy? The surveillance that enhances security need not be overly intrusive or life altering. It is not as if government agents need to physically search each and every suspect or those connected to a suspect. Advances in digital technology have made such surveillance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  30
    National Security Intelligence and Ethics.Seumas Miller, Mitt Regan & Patrick Walsh (eds.) - 2021 - Routledge.
    This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new technologies enable the collection, communication, and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as: privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  44. Personal privacy and electronic data transfers.David Perry - manuscript
    From a speech given at a conference sponsored by the Electronic Funds Transfer Association (EFTA) on "The Puzzle of Data Security and Consumer Privacy," Washington, DC, 16 November 1992. At that time, Dr. Perry was a Consultant in Advisory Services for the Ethics Resource Center.
     
    Export citation  
     
    Bookmark  
  45.  29
    Punishment by Securities Regulators, Corporate Social Responsibility and the Cost of Debt.Guangming Gong, Xin Huang, Sirui Wu, Haowen Tian & Wanjin Li - 2020 - Journal of Business Ethics 171 (2):337-356.
    This study examines whether penalties issued to Chinese listed companies by securities regulators for violations of corporate law affect the cost of debt, and the moderating role of corporate social responsibility fulfillment on this relationship. Our sample consists of firms listed on Shanghai and Shenzhen stock exchanges from 2011 to 2017 and the data are collected from the announcements of China Securities Regulatory Commission. The findings are as follows: punishment announcements by regulatory authorities increase the cost of debt; and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  46.  20
    Significant Differences in Personality Styles of Securely and Insecurely Attached Psychotherapists: Data, Reflections and Implications.Burkhard Peter & Eva Böbel - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  18
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  26
    Cyber security threats: A never-ending challenge for e-commerce.Xiang Liu, Sayed Fayaz Ahmad, Muhammad Khalid Anser, Jingying Ke, Muhammad Irshad, Jabbar Ul-Haq & Shujaat Abbas - 2022 - Frontiers in Psychology 13.
    This study explores the challenge of cyber security threats that e-commerce technology and business are facing. Technology applications for e-commerce are attracting attention from both academia and industry. It has made what was not possible before for the business community and consumers. But it did not come all alone but has brought some challenges, and cyber security challenge is one of them. Cyber security concerns have many forms, but this study focuses on social engineering, denial of services, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  21
    Cracking the Code: Using Data to Combat the Opioid Crisis.Catherine Martinez - 2018 - Journal of Law, Medicine and Ethics 46 (2):454-471.
    The goal of this article is to understand the value of data and to call for efforts to explore improved data sharing and collection among local, state, and federal agencies. It discusses the data available and existing barriers to sharing it. It also looks at examples of data sharing initiatives and analysis, such as mapping and visualization tools. The article then examines relevant regulations and calls for reforms. Finally, the article considers objections, including privacy interests, (...) security, and the costs and benefits of data sharing initiatives. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  31
    Reflections on Turkish Personal Data Protection Law and Genetic Data in Focus Group Discussions.Özlem Özkan, Melike Şahinol, Arsev Umur Aydinoglu & Yesim Aydin Son - 2022 - NanoEthics 16 (3):297-312.
    Since the 1970s and more rigorously since the 1990s, many countries have regulated data protection and privacy laws in order to ensure the safety and privacy of personal data. First, a comparison is made of different acts regarding genetic information that are in force in the EU, the USA, and China. In Turkey, changes were adopted only recently following intense debates. This study aims to explore the experts’ opinions on the regulations of the health information systems, data (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 991