Explore chapters and articles related to this topic
High-Performance Switch/Routers
Published in James Aweya, Designing Switch/Routers, 2023
Unlike in password authentication, identity checking in public key authentication is stronger. In password authentication, knowing only the user password is sufficient. Public key authentication requires the client (user) to know both the passphrase and the private key. The dependency of public key authentication on two separate elements (the passphrase and the private key) to ensure stronger security is referred to as two-factor authentication. Password authentication depends only on the password and is only a one-factor authentication scheme. In both methods, however, security still relies on correct identity establishment. If the wrong person gets a password, or if the wrong public key is associated with a user account, the strength of the identity checking will not prevent unauthorized users from accessing the system. If the private keys cannot be securely protected, then security with public key authentication is no better than with password authentication.
Challenges of Implementing Privacy Policies Across the Globe
Published in Ahmed Elngar, Ambika Pawar, Prathamesh Churi, Data Protection and Privacy in Healthcare, 2021
The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas. GDPR in terms of healthcare follows certain principles such as lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, integrity, confidentiality, accountability and limited storage. It defines certain circumstances in which a patient’s health and genetic data can be processed, the rules for consent and the rights provided to patients regarding their data. GDPR makes a special clause which ensures a patient’s voice is heard in data protection debates. While GDPR helps ensure trust between companies who handle personally identifiable data and patients, there are some drawbacks present. The one-time cost for companies to get their data affairs in order was huge which affected many businesses. Also, the cost of violating GDPR could lead to a fine up to $23.5 million, or 4% of the global annual revenue of a business.
Mobile Advertising Framework: Format, Location and Context
Published in Pedro Novo Melo, Carolina Machado, Business Intelligence and Analytics in Small and Medium Enterprises, 2019
Bilal Aslam, Heikki Karjaluoto
Figure 5.2 explains the mobile advertising framework. On the left side, the concept of location is discussed, and context in diverse practical situations. We then incorporated mobile-deployable advertising domains. LBA can be deployed through SMS, in-app advertising, and mobile social media and search engine advertising. Therefore, we attempted to present different possibilities of using LBA through these domains. Meanwhile, privacy is at the heart of mobile advertising, especially for mobile advertising methods that track consumers' location and send messages accordingly. Consumers may develop negative sentiments about an advertised brand if they think their privacy is threatened or violated. The emerging personalized and location-based mobile advertising, unless carefully monitored, may become an extremely intrusive practice (Cleff, 2007). Particularly after the implementation of GDPR in the EU, it has become absolutely important to understand privacy and governmental laws for smooth execution of mobile advertising. GDPR comprises laws meant to safeguard consumer privacy and prevent data misuse in the EU. The intentions behind GDPR are simple—to keep abreast with the threat of cyber security in relation to strategy, legislation, and operations; to be ready to respond to such threats; and to ensure future resilience (Stormshield, 2017). We will discuss GDPR in a direction pertinent to our topics of interest only, that is, mobile advertising, privacy, and regulations regarding consumer or location data.
Analysing Privacy Policies and Terms of Use to understand algorithmic recommendations: the case studies of Tinder and Spotify
Published in Journal of the Royal Society of New Zealand, 2023
Matt Bartlett, Fabio Morreale, Gauri Prabhakar
It is clear that both Spotify and Tinder use sophisticated AI algorithms as core components of their respective platforms and business models. However, due to the hostile research environment described above, it is less clear how these algorithms work, how they process data, or what the cumulative impacts for users are. In this context, we explored whether the analysis of the Privacy Policies of Spotify and Tinder could help shed light on their recommendation algorithms and their possible impacts on users. Privacy Policies can potentially be an excellent source for this purpose. The role of Privacy Policies is to set out how a company intends to collect and use personal data. Legal frameworks such as the General Data Protection Regime have imposed a range of new compliance requirements for companies in terms of privacy, such as an explanation of the different categories of personal data collected by the company and the purposes for which that data is being collected (Hintze 2019). This greater emphasis on transparency in data protection legislation should theoretically make Privacy Policies more informative. We also considered that Privacy Policies were a useful source of analysis because, historical versions of Privacy Policies can be easily and freely accessed online. This possibility allowed us to evaluate how Spotify’s and Tinder’s approaches to data evolved and outline possible legal and ethical issues raised by these approaches.
Perception of privacy and data protection in the context of the development of artificial intelligence
Published in Journal of Management Analytics, 2019
Grzegorz Mazurek, Karolina Małagocka
Nowadays, privacy issues are most often linked to the Internet, technological giants, algorithms and the general, growing demand for data. While privacy concepts initially included physical separation from others, there is now more emphasis on the possibility of separating or sharing information about oneself in order to limit the impact that others may have on ones behavior. Privacy has traditionally been recognized as a prerequisite for the use of human rights such as freedom of expression, association and choice. Due to the growing economic interest in personal data in recent years (Bédard, 2016), privacy has become increasingly important in the daily lives of both individuals and businesses. Private information is collected, stored and processed on an unprecedented scale as a result of rapid technological progress. One of the notions is artificial intelligence, for which data is like oxygen and which requires huge amounts of data to progress, while most of its processes are usually hidden. At the same time, the use of AI technology is now visible in almost every area of life. This raises additional questions about privacy and transparency. The majority of internet users have privacy concerns and feel a strong need to protect their personal data.
Development of building thermal environment emulator to evaluate the performance of the HVAC system operation
Published in Journal of Building Performance Simulation, 2019
A VPN is a private network that is virtually established on a public network. Using a VPN, a server and client can communicate as if they were on the same local network. Although a port for a VPN must be opened, because this is a communication technology commonly used in a wide variety of fields, there will likely to be fewer barriers to doing so than for opening ports for BBMD communication. Based on this advantage, the proposed emulator system implements remote communication via VPN using the network configuration shown in Figure 4, in which a connection is established by installing VPN software to the server and client and is used to perform BACnet communication. The past operational data of the emulator and a list of BACnet device port numbers are downloadable from a Web server.