Explore chapters and articles related to this topic
Adversarial Attacks and Defenses against Deep Learning in Cybersecurity
Published in Neeraj Mohan, Surbhi Gupta, Chuan-Ming Liu, Society 5.0 and the Future of Emerging Computational Technologies, 2022
Huge adversaries and cybercrimes are evolving in the field of social engineering attacks. Spam is a type of junk mail sent to an email address. Spam does not only include unsolicited commercial emails; sometimes, they may be fraudulent messages. These dangerous types of spam may clog the information stored and damage the network as well. The filtering of spam can be done based on the textual information of the emails. Many AI algorithms, like Naïve Bayes (NB), term frequency-inverse document frequency (TF-IDF) and SVM, will boost up the filtration of spam mail and prevent fraudulent messages. By using advanced techniques, like deep neural networks (DNNs) and case-based reasoning fuzzy logic systems, these kinds of crimes are being prevented to some extent (Lansley et al. 2019). As an advanced technique, the suspected emails can be analyzed based upon feature vectors, such as attachments, mail size, IP address as well as the address of the recipient and sender of the email. To have such deep analysis of detecting cybercrime, advanced SVM and DNN methods are used in cybersecurity applications.
Digital accumulation behaviours and information management in the workplace: exploring the tensions between digital data hoarding, organisational culture and policy
Published in Behaviour & Information Technology, 2023
Kerry McKellar, Elizabeth Sillence, Nick Neave, Pam Briggs
The General Data Protection Regulation (GDPR) was introduced in Europe in 2018 (Information Commissioners Office 2018). This privacy and data protection legislation regulates the storage of personal data. Personal data refers to any information related to a natural person or ‘Data Subject’, which can be used to directly or indirectly identify the person. It can be anything from a name, a photo, an email address, bank details, posts on social networking websites, medical information, or a computer IP address. The Regulation places much stronger controls on the processing of ‘sensitive’ personal data including health information. Personal data and its protection are key features of GDPR. This includes clear legal details regarding its collection, storage, and use limitations. GDPR also requires disclosure of data breaches, for which a high financial penalty may be applied.
Harder, better, faster, stronger: digitalisation and employee well-being in the operations workforce
Published in Production Planning & Control, 2022
Social desirability is a related concern as employees are asked to provide information about their current workplace and their well-being. In order to mitigate potential bias from social desirability, we provided information about anonymity and confidentiality. This means that there is no collection of identifying information such as name, email address, and IP Address. In addition, it is not possible for other people at the workplace to assess the survey response in any common ways, as access is authenticated against the respondent’s email address when sending out survey invitation. We did not include dedicate social desirability scales as the use of such scales lacks empirical support (Lanz, Thielmann, and Gerpott 2022).
The adoption of Firm-Hosted Online Communities: an empirical investigation into the role of service quality and social interactions
Published in Enterprise Information Systems, 2018
David Corkindale, Jiwat Ram, Howard Chen
A number of precautions were taken to ensure robust data collection: We selected CTS Travel as the partner for this study because it was known at the time that tourism-oriented OISs were generally visited by a wider segment of online users than other types of OIS. The choice of CTS Travel was advantageous in many ways: (i) it shared media content with two major newspapers, two television stations and several major commercial websites under the China Times Media Group – CTS Travel’s parent company; and (ii) CTS Travel was well known for its innovativeness and e-business operations in Taiwan.To reach out to potential users of the CTS Travel FHOC, we placed banner advertisements on Yam.com, one of the major information portals in Taiwan, which also organised for the FHOC to be promoted by several well-known bloggers, for a period of two weeks.To eliminate repeated submissions and duplicated responses prevent repeated submissions. Each time a submission was made, the system checked the name, email address, contact number and IP address. A submission would be rejected if (i) the system detected the name, email address, or contact number on a returned questionnaire was already in the database; or (ii) the returned questionnaire was submitted by computers with the same IP address within two hours of a first submission.As an incentive, respondents were offered a gift worth approximately AU$20in return for successfully completing the questionnaire.