Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK

Author(s):  
Sean Oesch ◽  
Ruba Abu-Salma ◽  
Oumar Diallo ◽  
Juliane Krämer ◽  
James Simmons ◽  
...  
2021 ◽  
Vol 3 (2) ◽  
pp. 28-45
Author(s):  
Young B. Choi ◽  
Christopher E. Williams

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.


Author(s):  
Amavey Tamunobarafiri ◽  
Shaun Aghili ◽  
Sergey Butakov

Cloud computing has been massively adopted in healthcare, where it attracts economic, operational, and functional advantages beneficial to insurance providers. However, according to Identity Theft Resource Centre, over twenty-five percent of data breaches in the US targeted healthcare. The HIPAA Journal reported an increase in healthcare data breaches in the US in 2016, exposing over 16 million health records. The growing incidents of cyberattacks in healthcare are compelling insurance providers to implement mitigating controls. Addressing data security and privacy issues before cloud adoption protects from monetary and reputation losses. This article provides an assessment tool for health insurance providers when adopting cloud vendor solutions. The final deliverable is a proposed framework derived from prominent cloud computing and governance sources, such as the Cloud Security Alliance, Cloud Control Matrix (CSA, CCM) v 3.0.1 and COBIT 5 Cloud Assurance.


2019 ◽  
Vol 1 (2-4) ◽  
pp. 53-70
Author(s):  
Hannah Biermann ◽  
Ralf Philipsen ◽  
Teresa Brell ◽  
Martina Ziefle

AbstractAutonomous driving will provide higher traffic safety, meet climate-related issues due to energy-saving mobility, and offer more comfort for drivers. To ensure reliable and safe autonomous traffic, and to provide efficient and time-critical mobility services, data exchange between road users and systems is essential. In public perception, however, sharing data and information may pose a challenge due to perceived privacy restrictions. In this paper, we address user perceptions and their acceptance towards data and information distribution in autonomous driving. In a multi-step empirical procedure, qualitative (focus groups, guided interviews) and quantitative approaches (questionnaire-study) were combined. The findings reveal that autonomous driving is commonly seen as a highly useful and appreciated technology. Though individual risk perceptions and potential drawbacks are manifold, mainly described in terms of data security and privacy-related issues. The findings contribute to research in human-automation interaction, technical development, and public communication strategies.


2019 ◽  
Vol 28 (1) ◽  
pp. 97-115
Author(s):  
Surma Mukhopadhyay ◽  
Ramsankar Basak ◽  
Darrell Carpenter ◽  
Brian J. Reithel

Purpose Little is known about factors that affect patient use of online medical records (OMR). Specifically, with rising vulnerability concerns associated with security and privacy breaches, patient use of OMR requires further attention. This paper aims to investigate patient use of OMR. Using the Unified Theory of Acceptance and Use of Technology (UTAUT), factors affecting continued use of OMR were examined. Design/methodology/approach The Health Information National Trends Survey 5 (HINTS 5), Cycle 1 data were used. This is an ongoing nation-wide survey sponsored by the National Cancer Institute (NCI) of the USA. The subjects were 31-74 years old with access to the Internet. Descriptive information was projected to the US population. Findings In total, 765 respondents representing 48.7 million members of the US population were analyzed. Weighted regression results showed significant effects of perceived usefulness, visit frequency and provider encouragement on continued use of OMR while vulnerability perception was not significant. Moderating effects of these variables were also noted. Perceived usefulness and provider encouragement emerged as important predictors. Practical implications Insights may help design interventions by health-care providers and policymakers. Social implications Insights should help patient empowerment and developers with designing systems. Originality/value This is the first study to examine health-care consumers’ continued use of OMR using nationally representative data and real-world patients, many of who have one or more chronic diseases (e.g. diabetes, hypertension, asthma) or are cancer survivors. Results highlight factors helping or hindering continuing OMR use. As such, insights should help identify opportunities to increase the extent of use, project future OMR usage patterns and spread the benefits of OMR, including bringing forth positive health outcomes.


Author(s):  
Keng Siau ◽  
Shane Meakim

What would you do if I told you that I could read your mind? Given that I am not a psychic, but a Web site administrator, you would probably not believe me. There are organizations that maintain databases of almost every consumer in the United States and even the world. One organization claims to have a database that encompasses 90% of all US consumers. Once an organization was given the name of a man and was told he lived in the US. In less than 48 hours they found where he worked, where he lived, who he was married to, how many times he was married, the contents of his financial portfolio, what credit cards he had, and what he bought at grocery stores. Amazingly, this information was obtained legally from various Web sites. The fact that you use a computer at home does not ensure your anonymity. You are being tracked in more ways than you could possibly think. As you surf the Net, facts are compiled about you. These pieces of information can range from the places or sites you visit and how long you stayed there to where you come from. These issues concerning trust, security, and privacy in cyberspace must be addressed in the near future and are critical to the growth of electronic business (Siau & Whitacre, 2001; Keen et al., 2000; Turban et al., 2000; Fingar et al., 2000; Kaufman et al., 1995; Ford & Baum, 1997).


2021 ◽  
Author(s):  
Jennifer Dukarski ◽  

Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data.


Author(s):  
Kat Krol ◽  
Muhammad Sajidur Rahman ◽  
Simon Parkin ◽  
Emiliano De Cristofaro ◽  
Eugene Y. Vasserman

2021 ◽  
Author(s):  
Maxim Schessler ◽  
Eva Gerlitz ◽  
Maximilian Häring ◽  
Matthew Smith

2012 ◽  
Vol 6 (1) ◽  
pp. 1-13 ◽  
Author(s):  
S. Srinivasan ◽  
Robert Barker

Security and trust play a critical role in e-commerce transactions. Web sites project the trustworthiness of the business. In this regard, web design should take into account the user perceptions concerning security and trust in facilitating e-commerce. In this study, the authors focused on these two key aspects. Successful interaction with an e-commerce site depends on attracting and maintaining user’s trust of the web business. To assess the security and trust perception, the authors designed and surveyed more than 1000 college students, a major group supporting e-commerce. The authors developed three hypotheses concerning e-commerce web site design with respect to trust, security, and privacy. In this paper, the authors identify important user expectations with regard to web site design and test the hypotheses. As E-commerce is global, this analysis includes results from other countries besides the U.S.


Sign in / Sign up

Export Citation Format

Share Document