Pub Date : 2021-11-25DOI: 10.1109/CMI53512.2021.9663753
Yi-Ching Liao
Attack and defense are both essential to information security. Focusing on critical infrastructures, we aim to generate targeted attack scenarios against availability for attack, and propose corresponding monitoring and detection deployment for defense. We start with producing an asset inventory automatically with an open-source network exploration and security auditing tool, and assess vulnerabilities for each asset with open-source intelligence. With vulnerability metrics, we can construct more exploitable attack scenarios with the most impact on availability. With the adversary techniques derived from real-world incidents and attacks, we can construct more realistic attack scenarios integrated with industrial control systems. With current security advisories, we can construct more targeted attack scenarios against specific critical infrastructure sectors. As a result, we can propose proactive monitoring and timely detection deployment across all levels of the PURDUE model in order of the sequences of kill chain phases for defense.
{"title":"Generating Targeted Attack Scenarios against Availability for Critical Infrastructures","authors":"Yi-Ching Liao","doi":"10.1109/CMI53512.2021.9663753","DOIUrl":"https://doi.org/10.1109/CMI53512.2021.9663753","url":null,"abstract":"Attack and defense are both essential to information security. Focusing on critical infrastructures, we aim to generate targeted attack scenarios against availability for attack, and propose corresponding monitoring and detection deployment for defense. We start with producing an asset inventory automatically with an open-source network exploration and security auditing tool, and assess vulnerabilities for each asset with open-source intelligence. With vulnerability metrics, we can construct more exploitable attack scenarios with the most impact on availability. With the adversary techniques derived from real-world incidents and attacks, we can construct more realistic attack scenarios integrated with industrial control systems. With current security advisories, we can construct more targeted attack scenarios against specific critical infrastructure sectors. As a result, we can propose proactive monitoring and timely detection deployment across all levels of the PURDUE model in order of the sequences of kill chain phases for defense.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134328177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663788
P. Mechant, Ralf De Wolf, M. Van Compernolle, Glen Joris, Tom Evens, L. De Marez
In this article we elaborate on Personal Information Management Systems (PIMS) or Personal Data Stores (PDS) that provide a person with affordances for managing his/her personal data, giving him/her granular control over the data captured about him/her, and over how that data is shared and used. We examine the promise of PDS-enabled data cooperatives from a socio-technical approach by critically unpacking the current discourse on data activism and related concepts such as data cooperatives, data collaboratives or data bazaars in the context of PDSs. We highlight critical reflections on user empowerment, power symmetries and user appropriation. While we see promise in a collective approach to the management of (personal) data, as it may reorient markets and change who benefits from datafication, we point out that further research into the potential obstacles or hurdles that hinder the implementation of data cooperatives in a PDS-ecology and into what consumers think about these and other possible data management models, is needed.
{"title":"Saving the web by decentralizing data networks? A socio-technical reflection on the promise of decentralization and personal data stores","authors":"P. Mechant, Ralf De Wolf, M. Van Compernolle, Glen Joris, Tom Evens, L. De Marez","doi":"10.1109/cmi53512.2021.9663788","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663788","url":null,"abstract":"In this article we elaborate on Personal Information Management Systems (PIMS) or Personal Data Stores (PDS) that provide a person with affordances for managing his/her personal data, giving him/her granular control over the data captured about him/her, and over how that data is shared and used. We examine the promise of PDS-enabled data cooperatives from a socio-technical approach by critically unpacking the current discourse on data activism and related concepts such as data cooperatives, data collaboratives or data bazaars in the context of PDSs. We highlight critical reflections on user empowerment, power symmetries and user appropriation. While we see promise in a collective approach to the management of (personal) data, as it may reorient markets and change who benefits from datafication, we point out that further research into the potential obstacles or hurdles that hinder the implementation of data cooperatives in a PDS-ecology and into what consumers think about these and other possible data management models, is needed.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132718195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663741
Bo Holst-Christensen, Erik Frokjar
The SMTP standard was originally published in 1982 and has since then become one of the mostly used methods for data communication. Since its publication the standard has been modified with many extensions intended to handle security issues. A selection of the most common security issues that surfaces when these extensions are used in practice is identified and discussed in relation to confidentiality, integrity, availability, and authentication. The complexity of the current situation makes it clear why organizations, mail service providers, and users have great difficulty in securely managing their email systems. Most email systems are vulnerable and cause serious security risks for individuals, organizations, and societies. The risks have grown to be critical for the digitization of our societies.
{"title":"Security Issues in SMTP-based Email Systems","authors":"Bo Holst-Christensen, Erik Frokjar","doi":"10.1109/cmi53512.2021.9663741","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663741","url":null,"abstract":"The SMTP standard was originally published in 1982 and has since then become one of the mostly used methods for data communication. Since its publication the standard has been modified with many extensions intended to handle security issues. A selection of the most common security issues that surfaces when these extensions are used in practice is identified and discussed in relation to confidentiality, integrity, availability, and authentication. The complexity of the current situation makes it clear why organizations, mail service providers, and users have great difficulty in securely managing their email systems. Most email systems are vulnerable and cause serious security risks for individuals, organizations, and societies. The risks have grown to be critical for the digitization of our societies.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"39 1 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663767
V. Steinkogler
In April 2020, at the beginning of the COVID-19 pandemic, the Austrian Red Cross announced it was encouraging a cooperation with Google and Apple’s Exposure Notification Framework to develop the so-called Stopp Corona app – a contact tracing app which would support health personnel in monitoring the spread of the virus to prevent new infections [1]. The involvement of Google and Apple to support combating a public health emergency fuelled controversy over addressing profit-driven private interests at the expense of public values. Concerns have been raised about the dominant position of US based big tech companies in political decision concerning public values. This research investigates how public values are safeguarded in cooperation with big tech companies in the Austrian contact tracing app Stopp Corona. Contact tracing apps manifest a bigger trend in literature, signifying power dynamics of big tech companies, governments, and civil society in relation to public values. The theoretical foundation of this research form prevailing concepts from Media and Communication Studies (MCS) and Science and Technology Studies (STS) about power dynamics such as the expansion of digital platforms and infrastructures, the political economy of big tech companies, dependencies, and digital platforms and infrastructure governance. The cooperative responsibility framework guides the empirical investigation in four main steps. First steps identify key public values and main stakeholders. The next steps analyse public deliberations on advancing public values and the translation of public values based on the outcome of public deliberations. This research applies a qualitative case study, including document analysis and expert interviews. In total, 52 documents were analysed and six expert interviews conducted. Findings show that key public values at stake concerning Stopp Corona involve data protection and privacy, (cyber-)security and safety, accuracy, voluntariness and consent, accessibility, inclusiveness, transparency, trust, etc. Public deliberations of multiple stakeholders about public values can help to safeguard public values. While an involvement of EU, state, civil society, and science and research can be witnessed in defining and advancing public values, Google and Apple, ultimately, translate the outcome of public deliberations through technological design choices. Therefore, public deliberations require a public-value oriented process which is transparent and involves a strong civil society and science and research community, and a unified EU voice.
{"title":"Public values and the interests of big tech companies: The case of the Austrian Contact Tracing App Stopp Corona","authors":"V. Steinkogler","doi":"10.1109/cmi53512.2021.9663767","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663767","url":null,"abstract":"In April 2020, at the beginning of the COVID-19 pandemic, the Austrian Red Cross announced it was encouraging a cooperation with Google and Apple’s Exposure Notification Framework to develop the so-called Stopp Corona app – a contact tracing app which would support health personnel in monitoring the spread of the virus to prevent new infections [1]. The involvement of Google and Apple to support combating a public health emergency fuelled controversy over addressing profit-driven private interests at the expense of public values. Concerns have been raised about the dominant position of US based big tech companies in political decision concerning public values. This research investigates how public values are safeguarded in cooperation with big tech companies in the Austrian contact tracing app Stopp Corona. Contact tracing apps manifest a bigger trend in literature, signifying power dynamics of big tech companies, governments, and civil society in relation to public values. The theoretical foundation of this research form prevailing concepts from Media and Communication Studies (MCS) and Science and Technology Studies (STS) about power dynamics such as the expansion of digital platforms and infrastructures, the political economy of big tech companies, dependencies, and digital platforms and infrastructure governance. The cooperative responsibility framework guides the empirical investigation in four main steps. First steps identify key public values and main stakeholders. The next steps analyse public deliberations on advancing public values and the translation of public values based on the outcome of public deliberations. This research applies a qualitative case study, including document analysis and expert interviews. In total, 52 documents were analysed and six expert interviews conducted. Findings show that key public values at stake concerning Stopp Corona involve data protection and privacy, (cyber-)security and safety, accuracy, voluntariness and consent, accessibility, inclusiveness, transparency, trust, etc. Public deliberations of multiple stakeholders about public values can help to safeguard public values. While an involvement of EU, state, civil society, and science and research can be witnessed in defining and advancing public values, Google and Apple, ultimately, translate the outcome of public deliberations through technological design choices. Therefore, public deliberations require a public-value oriented process which is transparent and involves a strong civil society and science and research community, and a unified EU voice.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/CMI53512.2021.9663811
Felix Bandosz
In order to deal with instable Internet connections various decentral databases (DDBs) for mobile (web) applications were developed. These databases provide applications with locally stored data and synchronize changes automatically with central servers or with directly reachable devices. Moreover, identity centric networking allows us to sign data and restrict access at the edge node level without connection to central instances. This allows us to build data networks which are able to use fast Internet connections or resilient node-to-node paths seamlessly.In this paper, we derive general challenges and specific solutions extracted out of three decentral open-source DDBs. In order to identify their practical strengths and to measure their performance we synchronize small and big data, disconnect instances from each other and use instances as data relays. During a total of five scenarios, we examine the correctness of data, storage consumption and network traffic.
{"title":"Performance and Concepts of Identity-Centric Decentral Open-Source Databases","authors":"Felix Bandosz","doi":"10.1109/CMI53512.2021.9663811","DOIUrl":"https://doi.org/10.1109/CMI53512.2021.9663811","url":null,"abstract":"In order to deal with instable Internet connections various decentral databases (DDBs) for mobile (web) applications were developed. These databases provide applications with locally stored data and synchronize changes automatically with central servers or with directly reachable devices. Moreover, identity centric networking allows us to sign data and restrict access at the edge node level without connection to central instances. This allows us to build data networks which are able to use fast Internet connections or resilient node-to-node paths seamlessly.In this paper, we derive general challenges and specific solutions extracted out of three decentral open-source DDBs. In order to identify their practical strengths and to measure their performance we synchronize small and big data, disconnect instances from each other and use instances as data relays. During a total of five scenarios, we examine the correctness of data, storage consumption and network traffic.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122683118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663766
Mengjie Zeng, C. Chiu
Facial recognition technology is an emerging digital payment method in online business to provide customers with a better shopping experience. Therefore, this study aims at analyzing factors influencing customers’ perception of facial recognition in online shopping. The research combines the privacy-trust-behavioral-intention model and innovation resistance theory to create a new model. Based on the new model, the study investigates the influence of hedonic motivation, privacy, and innovation resistance on customers’ intention to use and recommend facial recognition. The study shows that privacy and innovation resistance negatively influence customers’ acceptance of facial recognition in online business. At the same time, the hedonic motivation reflects positively from the customers’ side—this paper benefits e-commerce to improve facial recognition in online shopping and improve customers’ online shopping experience.
{"title":"The use of facial recognition for online business with the perspective of customer adoption","authors":"Mengjie Zeng, C. Chiu","doi":"10.1109/cmi53512.2021.9663766","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663766","url":null,"abstract":"Facial recognition technology is an emerging digital payment method in online business to provide customers with a better shopping experience. Therefore, this study aims at analyzing factors influencing customers’ perception of facial recognition in online shopping. The research combines the privacy-trust-behavioral-intention model and innovation resistance theory to create a new model. Based on the new model, the study investigates the influence of hedonic motivation, privacy, and innovation resistance on customers’ intention to use and recommend facial recognition. The study shows that privacy and innovation resistance negatively influence customers’ acceptance of facial recognition in online business. At the same time, the hedonic motivation reflects positively from the customers’ side—this paper benefits e-commerce to improve facial recognition in online shopping and improve customers’ online shopping experience.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663786
A. Zanasi, Daniele Cristofori, Graziano Giorgi
This paper introduces the work carried out within project ECHO (European network of Cybersecurity centres and competence Hub for innovation and Operations), one of the four pilot projects financed under the H2020 framework aiming to connect and share knowledge across multiple domains, while building a common cybersecurity strategy for Europe, inside the framework of the European Cybersecurity Competence Center located in Bucharest. The question is: what can EU countries do to strengthen the Union’s cyber defence and ensure a secure cybersecurity ecosystem that would protect citizens, economy and infrastructures from cyber-attacks? The first step is to assure that EU citizens are aware of these risks and are ready to fight them. To this purpose, ECHO project develops: (1) a marketplace of multi-sector services coming from multiple cyber ranges, the E-FCR (ECHO Federated Cyber Range), to be applied in several areas, with particular attention to the Healthcare sector, (2) a distributed platform, the E-EWS (ECHO Early Warning System), for information sharing across organizational boundaries that provides companies with a common operational cyber threat situation picture tailored for different types of users (from technical cyber experts to management executives). This paper gives an overview of the architecture of these solutions, highlighting why they could become paramount for a standardised cybersecurity training at European and international levels.
{"title":"The European Commission contribution to cybersecurity through the ECHO project","authors":"A. Zanasi, Daniele Cristofori, Graziano Giorgi","doi":"10.1109/cmi53512.2021.9663786","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663786","url":null,"abstract":"This paper introduces the work carried out within project ECHO (European network of Cybersecurity centres and competence Hub for innovation and Operations), one of the four pilot projects financed under the H2020 framework aiming to connect and share knowledge across multiple domains, while building a common cybersecurity strategy for Europe, inside the framework of the European Cybersecurity Competence Center located in Bucharest. The question is: what can EU countries do to strengthen the Union’s cyber defence and ensure a secure cybersecurity ecosystem that would protect citizens, economy and infrastructures from cyber-attacks? The first step is to assure that EU citizens are aware of these risks and are ready to fight them. To this purpose, ECHO project develops: (1) a marketplace of multi-sector services coming from multiple cyber ranges, the E-FCR (ECHO Federated Cyber Range), to be applied in several areas, with particular attention to the Healthcare sector, (2) a distributed platform, the E-EWS (ECHO Early Warning System), for information sharing across organizational boundaries that provides companies with a common operational cyber threat situation picture tailored for different types of users (from technical cyber experts to management executives). This paper gives an overview of the architecture of these solutions, highlighting why they could become paramount for a standardised cybersecurity training at European and international levels.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127517073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663774
Mohamed Msaad, Muhammad Waleed, Sokol Kosta
This paper presents the idea of using LoRaWAN based sensors in isolated areas with intermittent gateway presence. The intent is to expand the network coverage to areas with no preexisting infrastructure, and automate the data collection process in Delay Tolerant Network (DTN) scenarios. The use case considered in the paper is that of ocean monitoring, where sensor nodes can be deployed far from the shore to record ocean-related data, while gateways located on ships collect the sensors’ telemetry when the ship passes close by the nodes. We discuss the LoRaWAN capabilities and limitations for such scenario, focusing in particular on the energy consumption on the end nodes’ side. Finally, we present an optimized strategy that optimizes the duty cycle for these remote nodes. The experiments show that by adopting this solution, the nodes spend less energy, which leads to their lifespan to be extended significantly.
{"title":"Enabling LoRaWAN Communication with Out-of-coverage End Nodes in DTN Scenarios Through an Optimised Duty-cycle","authors":"Mohamed Msaad, Muhammad Waleed, Sokol Kosta","doi":"10.1109/cmi53512.2021.9663774","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663774","url":null,"abstract":"This paper presents the idea of using LoRaWAN based sensors in isolated areas with intermittent gateway presence. The intent is to expand the network coverage to areas with no preexisting infrastructure, and automate the data collection process in Delay Tolerant Network (DTN) scenarios. The use case considered in the paper is that of ocean monitoring, where sensor nodes can be deployed far from the shore to record ocean-related data, while gateways located on ships collect the sensors’ telemetry when the ship passes close by the nodes. We discuss the LoRaWAN capabilities and limitations for such scenario, focusing in particular on the energy consumption on the end nodes’ side. Finally, we present an optimized strategy that optimizes the duty cycle for these remote nodes. The experiments show that by adopting this solution, the nodes spend less energy, which leads to their lifespan to be extended significantly.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663800
Kwami Ahiabenu
Mobile money service is now ubiquitous in Ghana, enabling several new services such as mobile money loans with over 17.1 million active mobile money accounts, however, there are few studies on Ghana’s mobile money loan services in literature, therefore this paper is important in many ways since it contributes to the body of knowledge in this area. Based on the mixed method, the paper analyze data from expert interviews and a survey of 579 respondents through the lens of Actor-Network Theory. It critically examines the evolution of the mobile money loan ecosystem and its vital role in the financial system. The results show that transactions data remain vital determinants of mobile money credit scoring mechanisms using a machine learning algorithm. It discusses the balancing act of ensuring better loan repayment through tightening up loan default prediction factors that do not exclude prospective loan applicants, especially persons outside the formal financial system. This paper contributes to our understanding of the mobile money loan ecosystem, visualizing its value chain and providing indicators on improving its sustainability.
{"title":"Mapping mobile money loan ecosystem: insights from Ghana","authors":"Kwami Ahiabenu","doi":"10.1109/cmi53512.2021.9663800","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663800","url":null,"abstract":"Mobile money service is now ubiquitous in Ghana, enabling several new services such as mobile money loans with over 17.1 million active mobile money accounts, however, there are few studies on Ghana’s mobile money loan services in literature, therefore this paper is important in many ways since it contributes to the body of knowledge in this area. Based on the mixed method, the paper analyze data from expert interviews and a survey of 579 respondents through the lens of Actor-Network Theory. It critically examines the evolution of the mobile money loan ecosystem and its vital role in the financial system. The results show that transactions data remain vital determinants of mobile money credit scoring mechanisms using a machine learning algorithm. It discusses the balancing act of ensuring better loan repayment through tightening up loan default prediction factors that do not exclude prospective loan applicants, especially persons outside the formal financial system. This paper contributes to our understanding of the mobile money loan ecosystem, visualizing its value chain and providing indicators on improving its sustainability.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132367283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1109/cmi53512.2021.9663819
Giulia Zampedri
This research explores COVID-19 contact-tracing apps (CTAs) from a citizen perspective by looking at the meaning they attribute to CTAs and their motivation to not use such kinds of apps. As such, it looks at the Belgian CTA Coronalert and semi structured interviews were used to investigate Belgian residents’ opinions.What emerged from the interviews is that the meaning participants attribute to the CTA Coronalert is different from the meaning the app itself has and the meaning the government gave to the app. The app was created as a safe and privacy-preserving solution, however, participants expressed concern over privacy violations and lack of data transparency.
{"title":"To download, or not to download, that is the question: Investigating Belgian residents’ motivation to download or not download the COVID-19 contact-tracing app Coronalert","authors":"Giulia Zampedri","doi":"10.1109/cmi53512.2021.9663819","DOIUrl":"https://doi.org/10.1109/cmi53512.2021.9663819","url":null,"abstract":"This research explores COVID-19 contact-tracing apps (CTAs) from a citizen perspective by looking at the meaning they attribute to CTAs and their motivation to not use such kinds of apps. As such, it looks at the Belgian CTA Coronalert and semi structured interviews were used to investigate Belgian residents’ opinions.What emerged from the interviews is that the meaning participants attribute to the CTA Coronalert is different from the meaning the app itself has and the meaning the government gave to the app. The app was created as a safe and privacy-preserving solution, however, participants expressed concern over privacy violations and lack of data transparency.","PeriodicalId":219573,"journal":{"name":"2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}