Filters








105,306 Hits in 4.0 sec

Identifying Personal Information in Internet Traffic

Yabing Liu, Han Hee Song, Ignacio Bermudez, Alan Mislove, Mario Baldi, Alok Tongaonkar
2015 Proceedings of the 2015 ACM on Conference on Online Social Networks - COSN '15  
As a consequence, users explicitly and implicitly provide a wealth of Personal Information (PI) that reflects several aspects of their life.  ...  This is a major challenge because PI is transferred in a proprietary way by each service.  ...  This research was supported in part by NSF grants CNS-1054233, CNS-1409191, CNS-1319019, and CNS-1421444.  ... 
doi:10.1145/2817946.2817947 dblp:conf/cosn/LiuSBMBT15 fatcat:nhl2jdqltvd3feymfzmut7vsim

A Survey of Digital Privacy Rights Under CISA [article]

Matthew Lemanski
2015 arXiv   pre-print
The recent passing of the Cybersecurity Information Sharing Act of 2015 introduces a new framework for information sharing between private and US government entities with the expressed intent to identify  ...  This is the latest in a series of similar bills that have been introduced to Congress over the last several years.  ...  The paper seeks to answer those questions and explore the use of personally identifiable information (PII) in the system enabled by CISA. II.  ... 
arXiv:1512.06317v1 fatcat:5bfyivi3qbew7n7iq3ctxt2ajq

Privacy issues of ISPs in the modern web

Ali Safari Khatouni, Martino Trevisan, Leonardo Regano, Alessio Viticchie
2017 2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)  
Nevertheless, in many cases collected measurements contain personal and confidential information about customers exposed to monitoring, thus raising several ethical issues.  ...  In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements.  ...  Moreover, information about customers' traffic unveils their interests, behavior and personal attitudes.  ... 
doi:10.1109/iemcon.2017.8117145 fatcat:brexbeosprbnri32b64mchdbb4

Page 203 of Newsletter on Intellectual Freedom Vol. 62, Issue 5 [page]

2013 Newsletter on Intellectual Freedom  
This new system, SSO stated in December, enables vastly increased collection of Internet traffic by the NSA.  ...  reasonably believed to be used by a United States person,” Wainstein wrote, “will yield valuable foreign intelligence information primarily concerning non-United States persons outside the United States  ... 

TrustLens Survey Instrument [article]

Caitlin Cottrill, Naomi Jacobs, Milan Markovic
2020 Figshare  
A survey instrument designed to assess participants' attitudes and concerns regarding trust and privacy in the Internet of Things.  ...  to allow it to be located instantly Sensors are installed at key traffic crossings, allowing drivers committing traffic offences to be identified and ticketed by local police Sensors are installed  ...  The following survey should take no more than 15 minutes to complete, and asks for no personally identifying information. By completing the survey, you indicate your consent to participate.  ... 
doi:10.6084/m9.figshare.12136059 fatcat:nqf7n7cozfhshfyaawwrx34trm

Scalable Intelligence-Enabled Networking with Traffic Engineering in 5G Scenarios for Future Audio-Visual-Tactile Internet [article]

Yiqiang Sheng
2019 arXiv   pre-print
In order to improve future network performance, this paper proposes scalable intelligence-enabled networking (SIEN) with eliminating traffic redundancy for audio-visual-tactile Internet in 5G scenarios  ...  For the control plane, a scheme of identifier-locator mapping is designed by referring to information-centric networking and software-defined networking.  ...  Internet, and a technique for Internet traffic offloading was contributed.  ... 
arXiv:1910.07193v1 fatcat:r7opkwgax5fgho574rg6d5h6oe

Cleartext Data Transmissions in Consumer IoT Medical Devices

Daniel Wood, Noah Apthorpe, Nick Feamster
2017 Proceedings of the 2017 Workshop on Internet of Things Security and Privacy - IoTS&P '17  
We analyze four popular consumer medical IoT devices, including one smart medical device that leaks sensitive health information in cleartext.  ...  devices in their homes.  ...  Once we were able to identify cleartext packets, we identified potentially sensitive personal medical/identifying information by searching each string in the cleartext payload in several dictionaries.  ... 
doi:10.1145/3139937.3139939 dblp:conf/ccs/WoodAF17 fatcat:bfdz2onuzndfpp2laln4gwbz7y

From porn to cybersecurity passing by copyright: How mass surveillance technologies are gaining legitimacy … The case of deep packet inspection technologies

Sophie Stalla-Bourdillon, Evangelia Papadaki, Tim Chown
2014 Computer Law and Security Review  
specific patterns in all traffic, the privacy concerns are highly significant.  ...  While in practice the sheer volume of traffic passing through a DPI system may make it impractical to record all network data, if the system systematically records certain types of traffic, or looks for  ...  The information connected with those profiles is protected personal data because, in principle, it allows those users to be identified".  ... 
doi:10.1016/j.clsr.2014.09.006 fatcat:cil3zzs3jzf4nojwnjv5x5567e

Open Traffic Data for Future Service Innovation - Addressing the Privacy Challenges of Driving Data

Anna Rohunen, Jouni Markkula, Marikka Heikkilä, Jukka Heikkilä
2014 Journal of Theoretical and Applied Electronic Commerce Research  
We identified the following key factors affecting data disclosure: informing of personal data processing, trust in organizations of the service ecosystem, and users' control over their data.  ...  Yet, expanding use of mobile technologies with tracking possibilities provides means to collect precise and rich information about individual vehicles and persons in traffic.  ...  Some of the empirical data used in this study was collected via the Cooperative Traffic research program, funded by Tekes and a consortium of companies.  ... 
doi:10.4067/s0718-18762014000300007 fatcat:vpo4rafbfncsfja3qqeecoriga

Identifying potential kidney donors using social networking web sites

Alexander Chang, Emily E. Anderson, Hang T. Turner, David Shoham, Susan H. Hou, Morgan Grams
2013 Clinical Transplantation  
Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic.  ...  Facebook is already being used to identify potential kidney donors.  ...  All abstracted information was publicly available and further de-identified for the purposes of this study (i.e., no names or other identifying information was collected or stored in our records).  ... 
doi:10.1111/ctr.12122 pmid:23600791 pmcid:PMC3674113 fatcat:okjthms3m5a7fpvszdvtvhd7fq

Design Of Universal Access Using Rfid Tag: A Review

Miss.Bhede Snehal V.*, Prof.M.N.Kakatkar
2016 Zenodo  
The unique ID in the RFID cards is stored in a database in the internet along with personal data and creates accounts for each person.  ...  By accessing this database, it is thus possible to identify the person, check his account and deduct the fare from his/her account. System thus reduces human errors and efforts.  ...  The unique ID in the RFID cards is stored in a database on internet along with personal data. This system is used to access in Toll collection, and in Bus ticketing.  ... 
doi:10.5281/zenodo.50399 fatcat:pkxzq3arcrelljtylmsqozslym

Managing university internet access: balancing the need for security, privacy and digital evidence

Vlasti Broucek, Paul Turner, Mark Zimmerli
2010 Journal in Computer Virology  
An exponential growth in Internet traffic has led to ever increasing costs for the provision of these services at a time when most Australian Universities have been experiencing tighter budgetary conditions  ...  As part of the responses being developed, many Universities have introduced Internet Management Systems (IMS), similar to the systems used by many Internet  ...  The Personal Information Protection Principles are series of statements regarding the collection, storage and use of personal information.  ... 
doi:10.1007/s11416-010-0147-z fatcat:swf24wlfhjbjzi4xiumf5tltem

Data Breach Risk Reduction through Perimeter Security and Smart Surfing

Adewale O Adebayo, Babcock University
2018 International Journal of Engineering Research and  
It is, therefore, important to fortify network security and to surf the internet smartly in order to reduce the risk of a data breach, which this research is focused on addressing.  ...  The internet should be surfed with focus and anonymously where acceptable, while avoiding falling victim of scams and malwares.  ...  INTRODUCTION A data breach is an incident in which sensitive, protected or confidential Personally Identifiable Information (PII) data has potentially been viewed, stolen or used by an individual unauthorized  ... 
doi:10.17577/ijertv7is110045 fatcat:fbbdvxp5azephkiw2u2aix2tfm

From user-centric web traffic data to usage data

Thomas Beauvisage, Houssem Assadi
2005 Special interest tracks and posters of the 14th international conference on World Wide Web - WWW '05  
In this paper, we describe a user-centric Internet usage data processing platform. Raw usage data is collected using a software probe installed on a panel of Internet users' workstations.  ...  The transformation of raw usage data into qualified and usable information by Internet usage sociology researchers means setting up a series of relatively complex processes using quite a wide variety of  ...  Internet activity is monitored in real time using a software probe installed on each panellist's computer. The information is analysed by identifying the different users in the household.  ... 
doi:10.1145/1062745.1062881 dblp:conf/www/BeauvisageA05 fatcat:wnot7bjo7ncwfhqvv47kgzjozy

Enhancing cyber situation awareness for Non-Expert Users using visual analytics

Philip A. Legg
2016 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)  
An example of this is a GET filter, that simply identifies traffic that states 'GET' in the information tag.  ...  Of course, we can not expect a NEU to identify this purely from the traffic data in the detail view alone.  ... 
doi:10.1109/cybersa.2016.7503278 dblp:conf/cybersa/Legg16 fatcat:seh6qp6eibge7i54oof7nrul2m
« Previous Showing results 1 — 15 out of 105,306 results