首页 > 最新文献

2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

英文 中文
A Cloud-Based Service for Gamification of eGuides 基于云的电子指南游戏化服务
J. Swacha, Artur Kulpa
The eGuides, or, more formally, multimedia visitor guidance systems, have become increasingly available in a variety of tourist attractions. The experiences of visitors using them can be further enriched and their engagement raised by enhancing the eGuides with gamification. In this paper, we describe a cloud-based service providing functionality enabling gamification of eGuides and simplifying the development and maintenance of complex eGuide gamification systems spanning over multiple tourist attractions.
电子导游,或者更正式地说,多媒体游客导游系统,已经越来越多地应用于各种旅游景点。透过电子指南的游戏化功能,可进一步丰富访客的使用体验,并提高他们的参与度。在本文中,我们描述了一种基于云的服务,该服务提供了实现电子导游游戏化的功能,并简化了跨越多个旅游景点的复杂电子导游游戏化系统的开发和维护。
{"title":"A Cloud-Based Service for Gamification of eGuides","authors":"J. Swacha, Artur Kulpa","doi":"10.1109/W-FiCloud.2018.00042","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00042","url":null,"abstract":"The eGuides, or, more formally, multimedia visitor guidance systems, have become increasingly available in a variety of tourist attractions. The experiences of visitors using them can be further enriched and their engagement raised by enhancing the eGuides with gamification. In this paper, we describe a cloud-based service providing functionality enabling gamification of eGuides and simplifying the development and maintenance of complex eGuide gamification systems spanning over multiple tourist attractions.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Standardization of Ensuring Information Security for Big Data Technologies 大数据技术信息安全保障标准化
N. Miloslavskaya, A. Nikiforov, V. Budzko
Evolvement of Big Data technologies demanding huge amounts of data processing and big processing rates, as well as direct and close interactions of complicated systems prompts an idea of urgent improvement in international standards and protocols contributing to working out adequate requirements to modern Big Data technologies' operation. At present, these technologies have stepped far forward and require a new approach due to a change in data operation scale. Interactions with such 'Big Data' have to be regulated by the organizations which formulate requirements for handling huge information sets. At the same time issues of ensuring information security (IS) in such approaches cannot be considered properly worked out nowadays. The paper discusses existing standards in the field of Big Data, where reviewed with a gross emphasis on the adequate ensuring of its IS. This research is focused on how the issues of IS are solved in the existing standards and it attempts to work out some prognostications in the studied area.
大数据技术的发展需要海量的数据处理和高处理速率,以及复杂系统之间的直接和密切的相互作用,促使人们迫切需要完善国际标准和协议,为现代大数据技术的运行提出充分的要求。目前,由于数据操作规模的变化,这些技术已经向前发展,需要新的方法。与这种“大数据”的交互必须由制定处理大量信息集要求的组织来规范。与此同时,在这些方法中确保信息安全(IS)的问题目前还不能被认为是适当的解决。本文讨论了大数据领域的现有标准,重点是对其信息系统的充分保证。本研究的重点是如何在现有的标准中解决is的问题,并试图在研究领域做出一些预测。
{"title":"Standardization of Ensuring Information Security for Big Data Technologies","authors":"N. Miloslavskaya, A. Nikiforov, V. Budzko","doi":"10.1109/W-FiCloud.2018.00015","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00015","url":null,"abstract":"Evolvement of Big Data technologies demanding huge amounts of data processing and big processing rates, as well as direct and close interactions of complicated systems prompts an idea of urgent improvement in international standards and protocols contributing to working out adequate requirements to modern Big Data technologies' operation. At present, these technologies have stepped far forward and require a new approach due to a change in data operation scale. Interactions with such 'Big Data' have to be regulated by the organizations which formulate requirements for handling huge information sets. At the same time issues of ensuring information security (IS) in such approaches cannot be considered properly worked out nowadays. The paper discusses existing standards in the field of Big Data, where reviewed with a gross emphasis on the adequate ensuring of its IS. This research is focused on how the issues of IS are solved in the existing standards and it attempts to work out some prognostications in the studied area.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116484399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine Learning 利用机器学习检测寄生细胞相关疾病的移动显微镜设备
Aishah Khan, Ashraf Khalil, H. Hajjdiab
The objective of this mobile hand-held microscopic device is to provide aid to people residing in developing coun- tries with early detection of various blood and gastrointestinal diseases. This device is created using a cell scope attached to the camera lens of the phone. The detection of disease is done using image processing algorithms which are stored on a cloud based server to generate reports and efficiently send results to the end user. The main goal behind the device is to create a revolution in the world of technology and healthcare by facilitating easier approaches of disease detection and prevention in rural areas. Index Terms—mobile microscope, healthcare, malaria, image pre-processing, neural networks, feature extraction, classification
这种移动手持显微设备的目的是帮助居住在发展中国家的人们早期发现各种血液和胃肠疾病。该设备是通过连接在手机相机镜头上的蜂窝瞄准镜创建的。疾病检测使用存储在基于云的服务器上的图像处理算法来生成报告,并有效地将结果发送给最终用户。该设备背后的主要目标是通过促进农村地区更容易的疾病检测和预防方法,在技术和医疗保健领域掀起一场革命。索引术语:移动显微镜,医疗保健,疟疾,图像预处理,神经网络,特征提取,分类
{"title":"Mobile Microscopic Device to Detect Parasitical Cell-Related Diseases Using Machine Learning","authors":"Aishah Khan, Ashraf Khalil, H. Hajjdiab","doi":"10.1109/W-FICLOUD.2018.00029","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00029","url":null,"abstract":"The objective of this mobile hand-held microscopic device is to provide aid to people residing in developing coun- tries with early detection of various blood and gastrointestinal diseases. This device is created using a cell scope attached to the camera lens of the phone. The detection of disease is done using image processing algorithms which are stored on a cloud based server to generate reports and efficiently send results to the end user. The main goal behind the device is to create a revolution in the world of technology and healthcare by facilitating easier approaches of disease detection and prevention in rural areas. Index Terms—mobile microscope, healthcare, malaria, image pre-processing, neural networks, feature extraction, classification","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126777577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IEEE 802.15.4 Thread Mesh Network – Data Transmission in Harsh Environment IEEE 802.15.4 Thread Mesh Network -恶劣环境下的数据传输
Wojciech Rzepecki, Lukasz Iwanecki, Piotr Ryba
the goal of the publication is to describe outcome form environmental tests of wireless Thread mesh network which was designed for indoor environment monitoring. The sensor is based on NRF52840 SoC (System on Chip) and allows to monitor parameters like: temperature, humidity, atmospheric pressure and light luminescence. For implementation of wireless communication OpenThread Thread protocol stack was used. All test were set in office building, where the harsh environmental condition, generated by hundreds of wire and wireless devices create perfect test place for verifying network reliability. The paper contains description of hardware and software solution, tests setup and outcomes concluded from collected data.
本出版物的目的是描述为室内环境监测而设计的无线Thread mesh网络的环境试验结果。该传感器基于NRF52840 SoC(片上系统),可以监测温度、湿度、大气压力和发光等参数。无线通信采用OpenThread线程协议栈实现。所有的测试都在办公大楼中进行,在办公大楼中,数百个有线和无线设备产生的恶劣环境条件为验证网络可靠性创造了完美的测试场所。本文包括硬件和软件解决方案的描述,测试设置和收集数据得出的结果。
{"title":"IEEE 802.15.4 Thread Mesh Network – Data Transmission in Harsh Environment","authors":"Wojciech Rzepecki, Lukasz Iwanecki, Piotr Ryba","doi":"10.1109/W-FICLOUD.2018.00013","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00013","url":null,"abstract":"the goal of the publication is to describe outcome form environmental tests of wireless Thread mesh network which was designed for indoor environment monitoring. The sensor is based on NRF52840 SoC (System on Chip) and allows to monitor parameters like: temperature, humidity, atmospheric pressure and light luminescence. For implementation of wireless communication OpenThread Thread protocol stack was used. All test were set in office building, where the harsh environmental condition, generated by hundreds of wire and wireless devices create perfect test place for verifying network reliability. The paper contains description of hardware and software solution, tests setup and outcomes concluded from collected data.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Food Wastage Reduction Mobile Application 一个减少食物浪费的移动应用程序
H. Hajjdiab, Ayesha Anzer, Hadeel A. Tabaza, Wedad Ahmed
Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.
浪费食物是我们社会的一个普遍问题。食物垃圾管理至关重要,因为它可以改善我们的环境和经济可持续性。我们已经确定了使用移动技术来减少食物浪费管理,并建立了一个安卓移动应用程序,允许餐馆捐赠和分享他们的食物和剩菜与需要的人。这个应用程序将允许用户注册、登录、查看商品、添加商品、将商品添加到购物车、从购物车中删除商品以及退出。这个应用程序正在使用firebase存储和实时数据库。任何有需要的用户都可以看到不同用户捐赠的所有食物图片,并将其添加到自己的购物车中。
{"title":"A Food Wastage Reduction Mobile Application","authors":"H. Hajjdiab, Ayesha Anzer, Hadeel A. Tabaza, Wedad Ahmed","doi":"10.1109/W-FiCloud.2018.00030","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00030","url":null,"abstract":"Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128617638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Adaptive Control of Apache Spark's Data Caching Mechanism Based on Workload Characteristics 基于工作负载特征的Apache Spark数据缓存机制自适应控制
Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima, H. Matsuo
Apache Spark caches reusable data into memory/disk. From our preliminary evaluation, we have found that a memory-and-disk caching is ineffective compared to disk-only caching when memory usage has reached its limit. This is because a thrashing state involving frequent data move between the memory and the disk occurs for a memory-and-disk caching. Spark has introduced a thrashing avoidance method for a single RDD (Resilient Distributed Dataset), but it cannot be applied to workloads using multiple RDDs because prior detection of the dependencies between the RDDs is difficult due to unpredictable access pattern. In this paper, we propose a thrashing avoidance method for such workloads. Our method adaptively modifies the cache I/O behavior depending on characteristics of the workload. In particular, caching data are directly written to the disk instead of the memory if cached data are frequently moved from the memory to the disk. Further, cached data are directly returned to the execution-memory instead of the storage-memory if cached data in the disk are required. Our method can adaptively select the optimal cache I/O behavior by observing workload characteristics at runtime instead of analyzing the dependence among RDDs. Evaluation results showed that execution time was reduced by 33% for KMeans using the modified Spark memory-and-disk caching rather than the original.
Apache Spark将可重用数据缓存到内存/磁盘中。从我们的初步评估中,我们发现当内存使用达到极限时,内存和磁盘缓存与仅磁盘缓存相比是无效的。这是因为在内存和磁盘缓存中会出现涉及在内存和磁盘之间频繁移动数据的抖动状态。Spark已经为单个RDD(弹性分布式数据集)引入了一种避免抖动的方法,但它不能应用于使用多个RDD的工作负载,因为由于不可预测的访问模式,很难预先检测RDD之间的依赖关系。在本文中,我们提出了一种避免这种工作负载抖动的方法。我们的方法根据工作负载的特征自适应地修改缓存I/O行为。特别是,如果缓存的数据经常从内存移动到磁盘,则缓存数据直接写入磁盘而不是内存。此外,如果需要磁盘中的缓存数据,则将缓存的数据直接返回到执行内存,而不是存储内存。我们的方法可以通过在运行时观察工作负载特征,而不是分析rdd之间的依赖关系,自适应地选择最佳的缓存I/O行为。评估结果表明,使用修改后的Spark内存和磁盘缓存的KMeans执行时间比原来的KMeans减少了33%。
{"title":"Adaptive Control of Apache Spark's Data Caching Mechanism Based on Workload Characteristics","authors":"Hideo Inagaki, Tomoyuki Fujii, Ryota Kawashima, H. Matsuo","doi":"10.1109/W-FICLOUD.2018.00016","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00016","url":null,"abstract":"Apache Spark caches reusable data into memory/disk. From our preliminary evaluation, we have found that a memory-and-disk caching is ineffective compared to disk-only caching when memory usage has reached its limit. This is because a thrashing state involving frequent data move between the memory and the disk occurs for a memory-and-disk caching. Spark has introduced a thrashing avoidance method for a single RDD (Resilient Distributed Dataset), but it cannot be applied to workloads using multiple RDDs because prior detection of the dependencies between the RDDs is difficult due to unpredictable access pattern. In this paper, we propose a thrashing avoidance method for such workloads. Our method adaptively modifies the cache I/O behavior depending on characteristics of the workload. In particular, caching data are directly written to the disk instead of the memory if cached data are frequently moved from the memory to the disk. Further, cached data are directly returned to the execution-memory instead of the storage-memory if cached data in the disk are required. Our method can adaptively select the optimal cache I/O behavior by observing workload characteristics at runtime instead of analyzing the dependence among RDDs. Evaluation results showed that execution time was reduced by 33% for KMeans using the modified Spark memory-and-disk caching rather than the original.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers 数据中心负载均衡与虚拟机重分配的节能算法
Nabila Djennane, R. Aoudjit, S. Bouzefrane
Nowadays, cloud computing is an effective solution for providing computing services to consumers. However, data centers that host computing resources are still faced with a misuse of resources and a workload imbalance of servers, where some servers become overloaded while others are underloaded or even idle. This results in performance degradation and resource wastage. The load balancing is a key aspect and has an important role in the management of cloud data centers. It allows an optimal use of the resources and improves the desired Quality of Service (QoS) using optimal methods for allocating resources and distributing workload. In this paper, we propose a load-balancing algorithm that is based on a new parameter called the balance factor of the data center, introduced here, to determine if a data center is imbalanced or not, in order to redistribute the workload equally over all the hosts. To minimize the energy consumption of the data center, our strategy relies on the live migration of virtual machines (VMs) while using a mathematical model. The simulation results, using the CloudSim toolkit, have shown that the energy efficiency can be managed by reassigning VMs to the data-center hosts.
如今,云计算是向消费者提供计算服务的有效解决方案。但是,承载计算资源的数据中心仍然面临着资源滥用和服务器负载不平衡的问题,有的服务器过载,有的服务器负载过低甚至闲置。这将导致性能下降和资源浪费。负载均衡是云数据中心管理的一个关键方面,在云数据中心的管理中具有重要的作用。它允许对资源进行最佳使用,并使用分配资源和分配工作负载的最佳方法提高所需的服务质量(QoS)。在本文中,我们提出了一种负载平衡算法,该算法基于一个称为数据中心平衡因子的新参数,用于确定数据中心是否不平衡,以便在所有主机上均匀地重新分配工作负载。为了最大限度地减少数据中心的能耗,我们的策略依赖于虚拟机(vm)的实时迁移,同时使用数学模型。使用CloudSim工具包的仿真结果表明,可以通过将虚拟机重新分配给数据中心主机来管理能源效率。
{"title":"Energy-Efficient Algorithm for Load Balancing and VMs Reassignment in Data Centers","authors":"Nabila Djennane, R. Aoudjit, S. Bouzefrane","doi":"10.1109/W-FICLOUD.2018.00043","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2018.00043","url":null,"abstract":"Nowadays, cloud computing is an effective solution for providing computing services to consumers. However, data centers that host computing resources are still faced with a misuse of resources and a workload imbalance of servers, where some servers become overloaded while others are underloaded or even idle. This results in performance degradation and resource wastage. The load balancing is a key aspect and has an important role in the management of cloud data centers. It allows an optimal use of the resources and improves the desired Quality of Service (QoS) using optimal methods for allocating resources and distributing workload. In this paper, we propose a load-balancing algorithm that is based on a new parameter called the balance factor of the data center, introduced here, to determine if a data center is imbalanced or not, in order to redistribute the workload equally over all the hosts. To minimize the energy consumption of the data center, our strategy relies on the live migration of virtual machines (VMs) while using a mathematical model. The simulation results, using the CloudSim toolkit, have shown that the energy efficiency can be managed by reassigning VMs to the data-center hosts.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gamification’s Impact on Employee Engagement: Enhancing Employee Well-Being with a Cloud Based Gamified Team-Building Application 游戏化对员工敬业度的影响:通过基于云的游戏化团队建设应用程序提高员工幸福感
Balázs Barna, Szabina Fodor
Over the last decade, increasing attention has been paid to the examination of employee engagement and to potential approaches for promoting engagement, in order to improve workplace atmosphere and to increase employee productivity.
在过去的十年中,越来越多的人关注员工敬业度的检查和促进敬业度的潜在方法,以改善工作场所的氛围,提高员工的生产力。
{"title":"Gamification’s Impact on Employee Engagement: Enhancing Employee Well-Being with a Cloud Based Gamified Team-Building Application","authors":"Balázs Barna, Szabina Fodor","doi":"10.1109/W-FiCloud.2018.00039","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00039","url":null,"abstract":"Over the last decade, increasing attention has been paid to the examination of employee engagement and to potential approaches for promoting engagement, in order to improve workplace atmosphere and to increase employee productivity.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134327129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social Engineering: Application of Psychology to Information Security 社会工程:心理学在信息安全中的应用
Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo
Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.
心理学和计算机科学是两门专注于识别信息处理的具体特征的科学学科。前者分析人类行为,而后者侧重于构建一种试图模拟大脑的技术工具:计算机。因此,心理学与人们选择密码的时刻密切相关。欺骗性广告通常通过金钱、免费产品、服务或其他自尊测试来补偿,以影响产品或服务出现在你的社交网络上,以增加其在其追随者中的消费,并在未经你同意的情况下获取个人信息。安全是主观的,每个人对安全的感知不同,因为每个人都有不同的弱点。主体性不应该是一个人冥想管理自己的保护措施,以防止社会工程,这是指心理操纵人们采取行动或泄露机密信息。该项目也是基于需要通过获取和解密访问密钥来防止信息减法攻击,或者在最坏的情况下,根据人们在其社交网络上暴露或分享的信息,直接获取个人不同服务,银行账户,信用卡的密码。此外,它还侧重于攻击者如何根据从此类广告中获得的个人信息获取或破译密码;提供了一个更好的视角,黑客如何使用心理学应用于信息安全。
{"title":"Social Engineering: Application of Psychology to Information Security","authors":"Ivan Del Pozo, Mauricio Iturralde, Felipe Restrepo","doi":"10.1109/W-FiCloud.2018.00023","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00023","url":null,"abstract":"Psychology and computer science are two scientific disciplines that focus on identifying the specific characteristics of information processing. The first analyzes human behavior, while the latter focuses on the construction of a technical tool that seeks to emulate the brain: the computer. Therefore, psychology is strongly tied to the moment people choose their passwords. Deceptive advertising often compensates through money, free products, services or other self-esteem tests to influence a product or service to appear on your social network, in order to increase their consumption among its followers and to take personal information without your consent. Security is subjective, and each individual will perceive security differently, since each person has different weaknesses. Subjectivity should not be the one who meditates to manage his own measures of protection against the Social Engineering, which refers to psychological manipulation of people into performing actions or divulging confidential information. This project is also based on the need to prevent attacks of information subtraction by obtaining and decrypting the keys of access, or in the worst case, obtaining passwords directly to the different services, bank accounts, credit cards of individuals, based on the information that a people exposed or share on their social networks. Additionally, it focuses on how attackers could obtain or decipher their passwords based on personal information obtained from such advertisements; providing a better vision of how hackers use the psychology applied to information security.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114574102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape 当前社交媒体环境下网络迁移因素的比较评估
Xiangyu Xiao, N. Caporusso
In the last decade, social media experienced a dramatic increase in terms of quantity and variety of available platforms, in addition to an exponential growth in the number of users. Recent reports show that social media have a total of almost 2.5 billion active users, that is, about 71% of Internet users have at least one account on social media. At the beginning of the social media era, the word "cyber Migration" emerged to represent and describe a new phenomenon: users switching between one social network platform to another. Several studies investigated the different reasons and factors behind cyber migration, and tried to identify patterns. In this paper, we analyze how the concept of cyber migration evolved over the last decade, and we evaluate whether the model can still be applied to nowadays' social media landscape. To this end, we use the push-pull-mooring framework, a well-known model in economics domain, to address the technological and human factors that affect switching behavior. Specifically, we investigate the dynamics of cyber migration in relation to the types of social network and digital media platforms (e.g., personal, professional, video sharing, and other categories).
在过去的十年中,除了用户数量呈指数级增长外,社交媒体在可用平台的数量和种类方面都经历了戏剧性的增长。最近的报告显示,社交媒体的活跃用户总数接近25亿,也就是说,约71%的互联网用户至少拥有一个社交媒体账户。在社交媒体时代之初,“网络迁移”一词的出现代表和描述了一种新现象:用户从一个社交网络平台切换到另一个社交网络平台。几项研究调查了网络迁移背后的不同原因和因素,并试图确定模式。在本文中,我们分析了网络迁移的概念在过去十年中是如何演变的,并评估了该模型是否仍然可以应用于当今的社交媒体环境。为此,我们使用推拉系泊框架这一经济学领域的知名模型来解决影响切换行为的技术和人为因素。具体来说,我们研究了与社交网络和数字媒体平台类型(如个人、专业、视频分享和其他类别)相关的网络迁移动态。
{"title":"Comparative Evaluation of Cyber Migration Factors in the Current Social Media Landscape","authors":"Xiangyu Xiao, N. Caporusso","doi":"10.1109/W-FiCloud.2018.00022","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2018.00022","url":null,"abstract":"In the last decade, social media experienced a dramatic increase in terms of quantity and variety of available platforms, in addition to an exponential growth in the number of users. Recent reports show that social media have a total of almost 2.5 billion active users, that is, about 71% of Internet users have at least one account on social media. At the beginning of the social media era, the word \"cyber Migration\" emerged to represent and describe a new phenomenon: users switching between one social network platform to another. Several studies investigated the different reasons and factors behind cyber migration, and tried to identify patterns. In this paper, we analyze how the concept of cyber migration evolved over the last decade, and we evaluate whether the model can still be applied to nowadays' social media landscape. To this end, we use the push-pull-mooring framework, a well-known model in economics domain, to address the technological and human factors that affect switching behavior. Specifically, we investigate the dynamics of cyber migration in relation to the types of social network and digital media platforms (e.g., personal, professional, video sharing, and other categories).","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131300043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1