Filters








28 Hits in 5.2 sec

A Comprehensive Survey of Aadhar and Security Issues [article]

Isha Pali, Lisa Krishania, Divya Chadha, Asmita Kandar, Gaurav Varshney, Sneha Shukla
2020 arXiv   pre-print
To implement this, the Indian government created the authority UIDAI to distribute and generate user identities for every individual based on their demographic and biometric data.  ...  Our main aim is to cover all the security aspects related to Aadhaar to avoid possible security attacks. Also, we have included the current updates and news related to Aadhaar.  ...  ACKNOWLEDGEMENT The authors would like to thank the contributions of Mr. Anmol Singh, NIIT University for the work done in this paper.  ... 
arXiv:2007.09409v1 fatcat:wvfuikzjsrerfm445kabru5xli

A Review on Internet of Things (IoT): Security Challenges, Issuesand the Countermeasures approaches

Dr. B. Sundaravadivazhagan, Dr. B. Subashini, Mr. Mohemed Ashik M
2021 Psychology (Savannah, Ga.)  
, malware and ransom, botnet, phishing, cloud, routing and trust management and discussed recovery from mention security defies.  ...  The IOT applications like smart cities, smart houses, smart livestock, smart health care, smart climate etc.It can be lead to many security challenges and issues.  ...  for enhancing the threats to robustness, security and privacy and cryptographic solutions related to location-based services in IoT systems, and finally examines policies and procedures for security and  ... 
doi:10.17762/pae.v58i2.3188 fatcat:bzgximmiazdjzh3iq2z4texjdi

An IoT based Warehouse Intrusion Detection (E-Perimeter) and Grain Tracking Model for Food Reserve Agency

Sipiwe Chihana, Jackson Phiri, Douglas Kunda
2018 International Journal of Advanced Computer Science and Applications  
The IoT based prototype model made use of the APC220 transceiver, GSM, GPRS, RFID, PIR and cloud storage.  ...  To curb theft of grain at storage points, the system used motion sensing through the use of PIR sensors, wireless radio communication module and the GSM/GPRS technologies such that when anyone comes in  ...  ACKNOWLEDGMENT The authors would like to thank God almighty for the grace of good health, his mercies and grace upon us. Most importantly the grace he accorded us in our research endeavors.  ... 
doi:10.14569/ijacsa.2018.090929 fatcat:epbwrrmjxvfmlpema4zdkacshe

Realising the right to data portability for the domestic Internet of things

Lachlan Urquhart, Neelima Sailaja, Derek McAuley
2017 Personal and Ubiquitous Computing  
We need to find channels to support the protection of these new legal rights for users in practice. In Part I we introduce the internet of things and information PbD in more detail.  ...  There is an increasing role for the IT design community to play in regulation of emerging IT.  ...  It is client based, with its attribute store placed on the user's personal computer as opposed to on a cloud.  ... 
doi:10.1007/s00779-017-1069-2 fatcat:3j7ljzki4jdvhmhbo3gkb7ieoq

An Empirical Study of Big Data Analytics in Rural Arena

2019 International Journal of Social Sciences & Educational Studies  
In fact, when compared to developed nations, this capacity is being underutilized in India. This is particularly true for administrative system in rural areas.  ...  This transforms into a massive data set that has the potential to improvise the public services delivery system into an effective service mechanism for Indian citizens.  ...  In another initiative 'Digi Locker 'provides a personal storage space in the cloud to the citizens in India.  ... 
doi:10.23918/ijsses.v5i3p192 fatcat:rupbhk6agzcyxivo4ldlmzgyna

QUALITY IN HIGHER EDUCATION CHALLENGES & OPPORTUNITIES

Dr. P.S. Aithal, M. Dr. Suresh Kumar P.
2019 Zenodo  
Evaluation matrix issue (1) Security Issues: Security is very important in the Fingerprint Biometric Attendance System.  ...  The main objective of this study is Ø To understand and know the research work carried on fingerprint biometric-based attendance maintenance system Ø To analyze the fingerprint biometric attendance maintenance  ...  (a) Source of Law: Every law is based on the will of the sovereign.  ... 
doi:10.5281/zenodo.3361421 fatcat:7smu5xgp5nhafkdzjb7t2c6anq

The digital economy in Southeast Asia: Emerging policy priorities and opportunities for regional collaboration [chapter]

Natasha Beschorner
2021 New Dimensions of Connectivity in the Asia-Pacific  
The arguments for such regulations include enhancing national security, protecting personal privacy, aiding law enforcement and preventing foreign surveillance, in addition to appeals to the principle  ...  All these systems, except for Singapore's, use smartcards with data such as private keys and biometrics stored on the chip.  ... 
doi:10.22459/ndcap.2021.04 fatcat:srgvcwlwbre6fe2e6o32vu2xzm

Proceedings of the GoodBrother International Conference on Privacy-friendly and Trustworthy Technology for Society 2022 [article]

Anto Čartolovni, Anton Fedosov, Eduard Fosch-Villaronga, Christoph Lutz, Aurelia Tamò-Larrieux
2022 Zenodo  
The papers were selected based on their quality and the fit with the conference theme.  ...  The reviews were sent with the acceptance/rejection email, and the camera-ready versions had to incorporate the reviewers' feedback.  ...  Acknowledgments The author wishes to thank for the support of the COST Action CA19121 Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living "GoodBrother" project.  ... 
doi:10.5281/zenodo.6813376 fatcat:jecmmfw5wngghijfapte7p733y

ADVANCES IN MANAGEMENT, IT, EDUCATION, SOCIAL SCIENCES MANEGMA 2019

Dr. P S Aithal, Prof. Amith Menezes
2019 Zenodo  
I would also like to acknowledge our thanks to our parents for their valuable support and encouragement during the period of our study.  ...  Acknowledgement We would like to express our gratitude towards our guide Mrs.Shifana Begum, Assistant Professor, Dept. of CSE, Srinivas School of Engineering, Mukka for her support, guidance and encouragement  ...  Information Assurance Auditing of Information Security Disaster recovery related to information system Cloud security, infrastructure management, and trust management of different components of IT may  ... 
doi:10.5281/zenodo.3250779 fatcat:rgrz3gtqhnfolkur7bsi7xyzue

The Semantic Web: Collective Intelligence on the Web

Maciej Janik, Ansgar Scherp, Steffen Staab
2011 Informatik-Spektrum  
The up-scaling of privacy-enhancing technology to larger systems and its integration with existing systems fails, mainly because systems aspects and the related interdisciplinary issues are not taken into  ...  security, and more.  ... 
doi:10.1007/s00287-011-0535-x fatcat:az44yycakrcvpao63q2ft7uhmy

POSSIBILITIES OF DEFENSE SPENDING STABILIZATION

Vladan Holcner, Aleš Olejníček
2017 Journal of Security and Sustainability Issues  
The cited research led to the discovery which corresponds to our research.  ...  Research interests: Legal Reguliation of Public Servants Activity; Legal Regulation of Public Safety; Legal Issues of National, State and Regional Security.  ...  Needless to add, that the draft resolution against Crimea referendum in the UN Security Council was vetoed only by the Russia earlier that month.  ... 
doi:10.9770/jssi.2017.7.1(1) fatcat:7biezjgxfraj5ipjtslc46n7fu

By Policy or Design? Privacy in the US in a Post-Snowden World

Debora Halbert, Stefan Larsson
unpublished
The purpose of the analysis is to understand to what extent and how the current paradigm of privacy protection is, or is not, sufficient for contemporary needs.  ...  In particular, we ask how privacy is protected by policy in an American context and to what extent this is or is not insufficient in relation to an approach of "privacy by design".  ...  REV. 12 (2014): 151. believe that this success is the result of MEGA's low barrier to entry to a more secure cloud. 54 Dotcom also quotes the UN Declaration of Human Rights, Article 12 regarding the individual's  ... 
fatcat:3rmtaguftrfwhmminc4vkzqzny

Research Ethics Step by Step [chapter]

Jaap Bos
2020 Research Ethics for Students in the Social Sciences  
counter common ethical objections Be able to design an informed consent form  ...  After Reading This Chapter, You Will: Have a general knowledge of Institutional Review Board (IRB) procedures Have the capacity to anticipate the basic ethical pitfalls in research designs Know how to  ...  What (un)intended consequences does your presence in the field have on the participants and research outcomes? What promises do you have to live up to?  ... 
doi:10.1007/978-3-030-48415-6_10 fatcat:3wqklna5qvghbm3eoztxwokgzu

A framework for fair and responsible data market ecosystems

Aman Sabrina Nwatchock A Koul, Jean-Henry Morin
2019
En particulier, il fournit une base pour discuter de la souveraineté des données et de l'autodétermination dans des écosystèmes de marché équitables et responsables.  ...  Ce travail représente un pas en avant vers un échange et une utilisation responsables des données.  ...  cyber-security framework, and finally the transition to a sustainable green cloud."  ... 
doi:10.13097/archive-ouverte/unige:121388 fatcat:6u2qbyktv5gzvgcognqxrz7fjm

Proceedings of the GoodBrother International Conference on Privacy-friendly and Trustworthy Technology for Society 2022

s.n.
2022
GoodBrother aims to increase the awareness of the ethical, legal, and privacy issues associated with audio-and video-based monitoring and to propose privacy-aware working solutions for assisted living  ...  The papers were selected based on their quality and the fit with the conference theme.  ...  Acknowledgments The author wishes to thank for the support of the COST Action CA19121 Network on Privacy-Aware Audio-and Video-Based Applications for Active and Assisted Living "GoodBrother" project.  ... 
doi:10.5167/uzh-220632 fatcat:4mh2rntecjeuvlrbwoxrop566y
« Previous Showing results 1 — 15 out of 28 results