首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Fake News Detection Using Pos Tagging and Machine Learning 基于位置标记和机器学习的假新闻检测
IF 1.3 Q1 Social Sciences Pub Date : 2021-09-01 DOI: 10.1080/19361610.2021.1963605
Afreen Kansal
Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.
摘要在这个数字时代,一个主要的问题是不知道该相信和不该相信什么新闻。随着社交媒体和技术的不断进步,这个问题变得更加突出。这也在这场疫情中传播虚假信息方面发挥了非常重要的作用,在全世界制造了混乱和担忧。通过这篇论文,我建议在假新闻发布之前,使用基于风格的检测方法来理解和分析有助于检测假新闻的潜在写作风格。尝试了一种集成的机器学习分类模型来检测假新闻。
{"title":"Fake News Detection Using Pos Tagging and Machine Learning","authors":"Afreen Kansal","doi":"10.1080/19361610.2021.1963605","DOIUrl":"https://doi.org/10.1080/19361610.2021.1963605","url":null,"abstract":"Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47186690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Review of the Internet of Things Security 物联网安全综述
IF 1.3 Q1 Social Sciences Pub Date : 2021-08-28 DOI: 10.1080/19361610.2021.1962677
Maroua Ahmid, O. Kazar
Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.
目前,物联网(IoT)是最具争议的研究课题。然而,物联网仍然存在许多安全问题,并且随着物联网的大量部署,安全问题正在过度增长。除非理解并解决安全挑战,否则物联网仍将处于危险之中。因此,本文实现了物联网架构的完整视图,并描述了每一层的特征和功能。为了更深入地了解物联网安全挑战,我们专注于识别每个物联网层的安全需求和漏洞。此外,我们还讨论并分类了物联网中的不同安全攻击。
{"title":"A Comprehensive Review of the Internet of Things Security","authors":"Maroua Ahmid, O. Kazar","doi":"10.1080/19361610.2021.1962677","DOIUrl":"https://doi.org/10.1080/19361610.2021.1962677","url":null,"abstract":"Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements 在适用的国际法和协议中证明电子仲裁协议的问题
IF 1.3 Q1 Social Sciences Pub Date : 2021-08-26 DOI: 10.1080/19361610.2021.1964324
Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien

Abstract

This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.

摘要 本研究涉及各国法律中电子仲裁协议的证明所面临的法律问题。研究得出了重要结果,其中之一是在国家立法层面,一些国家立法要求使用公钥技术才能使电子仲裁协议具有证据价值,而另一些国家立法则不要求使用特定技术。研究得出的结论是,国际层面的最佳解决方案是对《纽约公约》进行修订。
{"title":"Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements","authors":"Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien","doi":"10.1080/19361610.2021.1964324","DOIUrl":"https://doi.org/10.1080/19361610.2021.1964324","url":null,"abstract":"<p><b>Abstract</b></p><p>This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.</p>","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139103431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions 利用人种学识别偏差行为,促进犯罪预防干预措施的发展
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-26 DOI: 10.1080/19361610.2021.1956268
David Harding
Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.
摘要本文介绍了一种预防犯罪的方法,其重点是越轨的信仰和行为。本实证研究介于发展性和环境性犯罪预防方法之间,利用民族志方法识别潜在和活跃的越轨者及其支持网络。干预措施是通过邻里守望的社区计划实施的,该计划侧重于在入室盗窃犯罪发生之前确定的越轨社区。干预前和干预期的对比表明,入室盗窃犯罪率下降了42%。如果通过复制验证,其他与活跃参与者(如叛乱分子、帮派和恐怖分子)接触的领域可能也会取得类似的成功。
{"title":"Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions","authors":"David Harding","doi":"10.1080/19361610.2021.1956268","DOIUrl":"https://doi.org/10.1080/19361610.2021.1956268","url":null,"abstract":"Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1956268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48336326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information 在实验室模拟审讯:检验身体疼痛、强制性语言压力和建立可靠信息的关系的有效性
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-22 DOI: 10.1080/19361610.2021.1949954
S. Houck, Joeann M. Salvati, A. Vrij, L. Newman
Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.
摘要:三个实验室实验采用审讯模拟来检验疼痛、强制性语言压力和建立关系对获得可靠信息的相对有效性。调查人员询问了参与者被要求保密的信息。我们测量了有多少人在疼痛时给出了可靠和不可靠的信息(研究1;N = 49),单独言语压力和合并疼痛(研究2;N = 87),与基于关系的审讯相比,言语压力和疼痛(研究3;n = 158)。研究结果从经验上支持了许多领域专家和学者先前的说法:痛苦和心理胁迫会导致不可靠的信息。
{"title":"Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information","authors":"S. Houck, Joeann M. Salvati, A. Vrij, L. Newman","doi":"10.1080/19361610.2021.1949954","DOIUrl":"https://doi.org/10.1080/19361610.2021.1949954","url":null,"abstract":"Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1949954","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47983981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges 数字社会中人工智能的应用和犯罪化:安全威胁和监管挑战
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-19 DOI: 10.1080/19361610.2021.1947113
A. Mahmud
Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.
我们生活在一个以技术为基础的数字社会,自主机器和人工智能(AI)的应用正在迅速发展,并对我们的社会生活和公共领域产生影响。像许多其他技术一样,人工智能将为犯罪分子打开新的大门,因此,社会安全受到了不同模式的人工智能犯罪的威胁。这给构建有效的监管框架带来了复杂的挑战。本文通过提出应对监管挑战和保护个人权利的原则,对人工智能的应用和刑事定罪进行了结构化的文献分析。
{"title":"Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2021.1947113","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947113","url":null,"abstract":"Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41376275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria 从常规机制到非常规机制:尼日利亚东南和南南地区绑架业务的公共困境
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-16 DOI: 10.1080/19361610.2021.1947114
Otu Akanu Otu, A. Adedeji
Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.
绑架活动已成为尼日利亚东南部和南南战略城市、村庄和社区最常见的有组织犯罪。这在公众中引发了一种疯狂的局面。需要知道的是,民警在预防和控制犯罪方面的传统机制很灵活,但却没有能力打击尼日利亚最近大量发生的绑架活动。关于尼日利亚绑架威胁的一些相关问题是:为什么传统方法无法控制尼日利亚的绑架活动?南方各州各自的州政府采取了哪些控制策略?采用非常规手段背后的哲学是什么?它的有效性有哪些实例?这一策略是否会引发反弹?通过在尼日利亚南部地区的两个州进行实地考察,该研究建议设立一个专门法庭,如果在规定的时间内被判有罪,就有权对绑架业务的嫌疑人/赞助者定罪。
{"title":"From Conventional to Unconventional Mechanism: The Public Dilemma of Kidnapping Business in the South-East and South-South Regions of Nigeria","authors":"Otu Akanu Otu, A. Adedeji","doi":"10.1080/19361610.2021.1947114","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947114","url":null,"abstract":"Abstract Kidnapping activities has become the most recurring organized crime in strategic cities, villages and communities in southeast and south-south Nigeria. It has generated a frenzy-like situation among members of the public. It needs to be known why civil police with its dexterity for conventional mechanisms in crime prevention and control are incapacitated to combat recent spate of kidnapping activities in Nigeria. Some pertinent questions about menace of kidnapping in Nigeria are: Why did conventional approach fail to control kidnapping activities in Nigeria? What control strategies were put in place by the respective state governments in southern states? What is the philosophy behind the adoption of unconventional means? What are the instances of its effectiveness? Is there any backlash with this strategy? With fieldworks in two purposively selected states in the southern regions of Nigeria, the study recommends among others, the creation of a specialized court with the mandate to convict suspects/sponsors of kidnapping business if found guilty within a stipulated timeframe.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48921807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Hiding Using PVD and Improving Security Using RSA 使用PVD隐藏数据和使用RSA提高安全性
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-09 DOI: 10.1080/19361610.2021.1900692
Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam
Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.
摘要隐写术处理的是隐藏信息,它在防御方面提供了最终的安全性,并提供了有利可图的用途,从而发送了不可察觉的信息,不会被他人暴露或区分。本文提出了一种基于RSA算法的多向PVD隐藏方案。通过选择每个块的最小像素重新组合,将非重叠块划分为R、G、b通道,在彩色图像的三个方向上嵌入秘密比特。为了保证stego图像的安全性,使用了scheme提出的工作,并在此基础上提出了RSA算法。
{"title":"Data Hiding Using PVD and Improving Security Using RSA","authors":"Hemalatha Jeyaprakash, K. Kartheeban, A. Sahu, Balasubramanian Chokkalingam","doi":"10.1080/19361610.2021.1900692","DOIUrl":"https://doi.org/10.1080/19361610.2021.1900692","url":null,"abstract":"Abstract Steganography deals with hiding information, which offers ultimate security in defense, profitable usages, thus sending the imperceptible information, will not be bare or distinguished by others. In this paper, a multidirectional PVD hiding scheme with RSA algorithm is proposed. Secret bits are embedded in three directions of a color image by dividing the non-overlapping blocks into R, G, b channels by selecting the minimum pixels of each block regrouping. In order to ensure the security of an stego-image, the work proposed by scheme is used, and in addition to that RSA algorithm is proposed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1900692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras 基于评论的安全医疗监控分类:无线智能摄像头
IF 1.3 Q1 Social Sciences Pub Date : 2021-07-05 DOI: 10.1080/19361610.2021.1947112
Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew
Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.
摘要健康记录数据安全是电子健康系统面临的主要挑战之一。身份验证是支持存储数据的机密性、完整性和可用性的重要安全服务之一。这项研究的重点是医疗保健部门中患者和医疗记录的安全存储,因为数据安全和未经授权的访问是一个持续存在的问题。一个潜在的解决方案来自生物识别技术,尽管它们的使用可能很耗时,并且会减慢数据检索速度。这项研究的目的是通过添加指纹形式的生物识别技术,克服这些挑战,加强医疗保健部门的数据访问控制。所提出的医疗保健领域应用模型包括收集、网络通信和身份验证(CNA),使用生物识别技术取代了现有的基于密码的访问控制方法。然后,传感器收集数据,并通过使用网络(无线或Zig-bee),在处理和聚合数据的连接分析和数据管理工作之后,建立连接。随后,将访问权限授予应用程序的已验证用户。这种基于物联网的生物识别认证系统有助于有效识别,并确保患者记录和其他敏感数据的机密性、完整性和可靠性。所提出的解决方案提供了对医疗保健数据的可靠访问,并通过用户和设备身份验证过程实现了安全访问。所提出的模型是为通过医疗保健中的用户身份验证来控制数据访问而开发的,以减少数据操纵或盗窃。
{"title":"A Review-Based Taxonomy for Secure Health Care Monitoring: Wireless Smart Cameras","authors":"Ravi Teja Batchu, A. Alsadoon, P. Prasad, R. Ali, Tarik A. Rashid, Ghossoon Alsadoon, Oday D. Jerew","doi":"10.1080/19361610.2021.1947112","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947112","url":null,"abstract":"Abstract Health records data security is one of the main challenges in e-health systems. Authentication is one of the essential security services to support the stored data confidentiality, integrity, and availability. This research focuses on the secure storage of patient and medical records in the healthcare sector where data security and unauthorized access is an ongoing issue. A potential solution comes from biometrics, although their use may be time-consuming and can slow down data retrieval. The aim of this research is to overcome these challenges and enhance data access control in the healthcare sector through the addition of biometrics in the form of fingerprints. The proposed model for application in the healthcare sector consists of Collection, Network communication, and Authentication (CNA) using biometrics which replaces an existing, password-based access control method. A sensor then collects data, and by using a network (wireless or Zig-bee), a connection is established, after connectivity analytics and data management work which processes and aggregate the data. Subsequently, access is granted to authenticated users of the application. This IoT-based biometric authentication system facilitates effective recognition and ensures confidentiality, integrity, and reliability of patients’ records and other sensitive data. The proposed solution provides reliable access to healthcare data and enables secure access through the process of user and device authentication. The proposed model has been developed for access control to data through authentication of users in healthcare to reduce data manipulation or theft.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947112","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42476283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey 新兴市场的商场行窃:来自土耳其的证据
IF 1.3 Q1 Social Sciences Pub Date : 2021-06-21 DOI: 10.1080/19361610.2021.1933323
Mine Özaşçılar, Hakki Ozturk
Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.
摘要商店行窃对所有零售商来说都是严重的零售犯罪,它降低了盈利能力。本研究调查了土耳其伊斯坦布尔购物中心商店行窃的程度和影响。它具体考察了零售业、购物中心规模和位置在商店行窃程度和影响方面的差异。数据收集基于对伊斯坦布尔商店经理和购物中心经理的389次面对面采访。调查结果显示,商店行窃对所有零售业和购物中心规模来说都是严重犯罪。讨论了对未来研究的影响和当前研究的局限性。
{"title":"Shoplifting in Shopping Malls in an Emerging Market: Evidence from Turkey","authors":"Mine Özaşçılar, Hakki Ozturk","doi":"10.1080/19361610.2021.1933323","DOIUrl":"https://doi.org/10.1080/19361610.2021.1933323","url":null,"abstract":"Abstract Shoplifting is at serious retail crime for all retailers, which reduces profitability. This study investigates the extent and impact of shoplifting in shopping malls in Istanbul, Turkey. It specifically examines differences in the extent and impact of shoplifting by retail sector and shopping mall size and location. Data collection was based on 389 face-to-face interviews with store managers and shopping mall managers in Istanbul. The results revealed that shoplifting is a serious crime for all retail sectors and sizes of shopping malls. The implications for future studies and limitations of the current study are discussed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1933323","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46881071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1