Explore chapters and articles related to this topic
E-Mail Security and Privacy
Published in Steven F. Blanding, Enterprise Operations Management, 2020
Passwords do not protect e-mail. Most major e-mail and groupware products that combine messaging, file management, and scheduling allow the network administrator to change passwords at any time and read, delete, or alter any messages on the server. Network monitoring programs, including AG Group’s LocalPeek, Farallón Computing’s Traffic Watch II, and Neon Software’s NetMinder allow network managers to read files sent over the Internet. In fact, these products mimic tools specifically designed for surveillance used primarily on mainframe systems. Encryption is a key element in secure communications over the Internet. Pretty Good Privacy software encrypts e-mail-attached computer files, making them unreadable to most hackers. PGP is a worldwide standard for e-mail security. Anonymous remailers allow users to send e-mail to network newsgroups or directly to recipients so that they cannot tell the sender’s real name or e-mail address. For business communications, one of the motivations behind the use of PGP is to prevent the sale of company business plans or customer-list information to competitors.
Rescaling
Published in Celia Lury, Rachel Fensham, Alexandra Heller-Nicholas, Sybille Lammes, Angela Last, Mike Michael, Emma Uprichard, Routledge Handbook of Interdisciplinary Research Methods, 2018
A second example comes out of a project I have recently been doing on the anonymization and personal privacy software industry. This is a most unusual industry to study because it is highly fragmented, with very low barriers to entry, and many companies operate as bedroom enterprises. It has no industry associations and no central sources of data. Yet it has all the dynamics of any other commercial sector, including fierce competition, differentiation, professionalization and labour mobility. To analyse this industry we did some of the things that one would do when studying a ‘big’ industry: compiled an international database of known companies; collected data on server locations, price points and marketing strategies; and interviewed company representatives willing to speak on the record. But we also had to use the micro-level methods associated with qualitative research: hanging out in online spaces, signing up for various services and trying them out, discourse analysis of promotional materials, and so forth. And during interviews, it was helpful to mix up the micro and macro scales by interspersing data-oriented questions (‘how many staff do you have, and where are they located?’) with questions inviting more textured, qualitative responses (‘take me through your average working day’).
Privacy Concerns and Methods for Safeguarding Privacy
Published in Krzysztof W. Kolodziej, Johan Hjelm, Local Positioning Systems, 2017
Krzysztof W. Kolodziej, Johan Hjelm
In Chapter 5 we talked about symbolic data models. In this chapter we will follow up with how symbolic (hierarchical) models can facilitate authentication and service delivery. A scale of privacy levels of the hierarchy can be defined as follows: Each level is defined to include more or less specific information about the location of a particular device. A user is able to assign a privacy level to entities that might request location information. Additionally, each node can have a privacy level associated with it. When a query from an application is received, the privacy software first determines who the query is from and the privacy level associated with the application or entity. The privacy software then evaluates one or more of the (sub) models to find a node that has a corresponding privacy level. When a corresponding node is found, information at that particular granularity is provided to the requesting application or entity. The next step would assign various privacy levels to the individual nodes in one or more hierarchical tree structures. Following, the system determines the privacy level associated with the application(s). The privacy software then traverses one or more hierarchical tree structures to find a node with a corresponding privacy level so that it can select the information that is associated with that node.
Prototyping Usable Privacy and Security Systems: Insights from Experts
Published in International Journal of Human–Computer Interaction, 2022
Florian Mathis, Kami Vaniea, Mohamed Khamis
Our experts emphasized that interdisciplinary research could contribute to addressing the lack of resources and the faced hardware challenges when developing novel USEC prototypes (Key Challenge #2 and #8). P8 highlighted the need and value of “collaborations between usable security people and the people who are close to building [systems] and can create different variants” (P8). It has to be said that there are successful collaborations across research groups that resulted in fruitful privacy and security research, with the privacy icon research by Cranor and Schaub (2020), now used by California law (Tkacik, 2020), as one of the most recent examples that involved researchers from different universities with different backgrounds including privacy, software, and law research. In a similar vein, when it comes to usable privacy and security prototypes and their evaluation, one way to mitigate the challenges of reaching out to participants could be by establishing strong collaborations among research groups. For example, if a consortium of research groups collectively builds an infrastructure that facilitates participant recruitment, it would help the involved researchers and the USEC community as a whole. Looking at more distributed models of participant recruitment, including potential access to target-specific, hard-to-reach user groups, and establishing an infrastructure that allows sharing research equipment could also help mitigate Key Challenge #8.
An Overview of Digital Audio Steganography
Published in IETE Technical Review, 2020
Hrishikesh Dutta, Rohan Kumar Das, Sukumar Nandi, S. R. Mahadeva Prasanna
Several computer softwares also have been developed using steganography. Steganos, privacy software that gives effective protection for data and password, makes use of steganography. Mandelsteg is a program that hides secret information in fractal graphics interchange format (GIF) images providing a high privacy to the confidential information [8]. It stores data in specified bit of image pixels. Outguess is another software that uses steganography to hide information images. Some other steganography softwares include Hide and Seek, Jpeg-Jsteg, StegoDos, and White Noise Storm to name a few. The development of a steganography implementation for the reception of the Turkey's president has been discussed in [24]. The identity of the guests are first encrypted and then embedded in their photos using the LSB technique on bitmap (BMP) images.