|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Tommy Nguyen, Garnet Yeates, Tony Ly and Umar Albalawi
With the recent increase in phishing attacks and other kinds of malicious activities, increasing the awareness of security and privacy awareness is arguably one of the best proven ways of preventing these kinds of threats. The main challenge in security ...
ver más
|
|
|
|
|
|
|
Karen Schnell, Kaushik Roy and Madhuri Siddula
In the United States, there are laws and standards guiding how people should be informed about the use of their private data. However, the challenge of communicating these guidelines to the naïve user is still at its peak. Research has shown that the wil...
ver más
|
|
|
|
|
|
|
Veronika Belcheva, Tatiana Ermakova and Benjamin Fabian
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases conc...
ver más
|
|
|
|
|
|
|
Raza Nowrozy, Khandakar Ahmed, Hua Wang and Timothy Mcintosh
This paper proposed a novel privacy model for Electronic Health Records (EHR) systems utilizing a conceptual privacy ontology and Machine Learning (ML) methodologies. It underscores the challenges currently faced by EHR systems such as balancing privacy ...
ver más
|
|
|
|
|
|
|
Christopher McCarthy, Yamikani Nyoni, Daud Jones Kachamba, Lumbani Benedicto Banda, Boyson Moyo, Cornelius Chisambi, James Banfill and Buho Hoshino
Smallholder farmers in sub-Saharan Africa play a vital role in achieving food security and nutrition, yet they are often overlooked by development policies and lack access to the technology and information needed to increase their agricultural productivi...
ver más
|
|
|
|
|
|
|
Hassan H. H. Aldboush and Marah Ferdous
This research paper explores the ethical considerations in using financial technology (fintech), focusing on big data, artificial intelligence (AI), and privacy. Using a systematic literature-review methodology, the study identifies ethical and privacy i...
ver más
|
|
|
|
|
|
|
Peng Zhang and Maged N. Kamel Boulos
Generative AI (artificial intelligence) refers to algorithms and models, such as OpenAI?s ChatGPT, that can be prompted to generate various types of content. In this narrative review, we present a selection of representative examples of generative AI app...
ver más
|
|
|
|
|
|
|
Pratik Thantharate and Anurag Thantharate
With the digitization of healthcare, an immense amount of sensitive medical data are generated and shared between various healthcare stakeholders?however, traditional health data management mechanisms present interoperability, security, and privacy chall...
ver más
|
|
|
|
|
|
|
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and...
ver más
|
|
|
|