scholarly journals eResearch:  Ethics, Security, Design, and Control in Psychological Research on the Internet

2016 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Differences between traditional laboratory research and Internet-based research require review of basic issues of research methodology. These differences have implications for research ethics (e.g., absence of researcher, potential exposure of confidential data and/or identity to a third-party, guaranteed debriefing) and security (e.g., confidentiality and anonymity, security of data transmission, security of data storage, and tracking subjects over time). We also review basic design issues a researcher should consider before implementing an Internet study, including the problem of subject self-selection and loss of experimental control on the Internet laboratory. An additional challenge for Internet-based research is the increased opportunity for subject misbehavior, intentional or otherwise. We discuss methods to detect and minimize these threats to the validity of Internet-based research.

2002 ◽  
Vol 58 (1) ◽  
pp. 161-176 ◽  
Author(s):  
Brian A. Nosek ◽  
Mahzarin R. Banaji ◽  
Anthony G. Greenwald

Author(s):  
Izabella V. Lokshina ◽  
Cees J. M. Lanting ◽  
Barbara Durkin

This chapter focuses on ubiquitous sensing devices, enabled by Wireless Sensor Network (WSN) technologies, that cut across every area of modern day living, affecting individuals and businesses and offering the ability to measure and understand environmental indicators. The proliferation of these devices in a communicating-actuating network creates the internet of things (IoT). The IoT provides the tools to establish a major global data-driven ecosystem with its emphasis on Big Data. Currently, business models may focus on the provision of services, i.e., the internet of services (IoS). These models assume the presence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated. Different business models may support creating revenue and value for different types of customers. This chapter contributes to the literature by considering, innovatively, knowledge-based management practices, strategic opportunities and resulting business models for third-party data analysis services.


2019 ◽  
Vol 16 (10) ◽  
pp. 4345-4349
Author(s):  
Latika Kakkar ◽  
Deepali Gupta ◽  
Sapna Saxena ◽  
Sarvesh Tanwar

The Internet of Things (IoT) comprises of various smart devices which are networked together to detect, accumulate, process, improve and interchange significant data over the Internet. IoT has improved our lifestyle by offering various applications such as intelligent home, smart healthcare, traffic monitoring and smart city devices. The IoT devices have restriction of power, battery life, memory and network constraints, so cloud can be used for accumulating and analyzing the IoT data. Due to the considerable increase in data transfer over Internet and other devices, the confidential information from the IoT sources required to be secure from any third party access. Cloud computing (CC) on the other side provides a protected, abrupt and advantageous data storage and computing services all over the internet. The integration of both these technologies can prove to be beneficial for each other. Therefore, we need an efficient and authentic method for secure communication in the IoT and cloud based big data environment. This paper provides a review of amalgamation of the IoT and cloud by featuring the implementation challenges and integration benefits.


Author(s):  
Izabella V. Lokshina ◽  
Cees J. M. Lanting ◽  
Barbara Durkin

This chapter focuses on ubiquitous sensing devices, enabled by Wireless Sensor Network (WSN) technologies, that cut across every area of modern day living, affecting individuals and businesses and offering the ability to measure and understand environmental indicators. The proliferation of these devices in a communicating-actuating network creates the internet of things (IoT). The IoT provides the tools to establish a major global data-driven ecosystem with its emphasis on Big Data. Currently, business models may focus on the provision of services, i.e., the internet of services (IoS). These models assume the presence and development of the necessary IoT measurement and control instruments, communications infrastructure, and easy access to the data collected and information generated. Different business models may support creating revenue and value for different types of customers. This chapter contributes to the literature by considering, innovatively, knowledge-based management practices, strategic opportunities and resulting business models for third-party data analysis services.


Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha S. ◽  
Murali S. ◽  
Hemalatha P. R. ◽  
Subanachiar T.

Blockchains are shared, immutable ledgers for recording the history of transactions. They substitute a new generation of transactional applications that establish trust, accountability, and transparency. It enables contract partners to secure a deal without involving a trusted third party. The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. The stable growth of the internet of things (IoT) and the blockchain technology popularized by cryptocurrencies has led to efforts to change the centralized nature of the IoT. Adapting the blockchain technology for use in the IoT is one such efforts. This chapter focuses on blockchain-IoT research directions and to provide an overview of the importance of blockchain-based solutions for cloud data manipulation in IoT.


2020 ◽  
Vol 61 (2) ◽  
pp. 58-67
Author(s):  
Chinh Manh Dang ◽  
Vinh Quang Thai ◽  
Minh Ngoc Pham ◽  
Trung Thanh Dang ◽  
Mai Thanh Thi Phung ◽  
...  

We are living in the trend of the Internet of Things (IoT), electronic devices that are capable of connecting and exchanging information with each other via the Internet. For automation, monitoring and control systems, there is a need to upgrade existing systems so that users can remotely monitor via the Internet. The solution is to integrate the Gateway device to transmit and receive data. However, in the Internet environment, the issue of information security and safety always needs attention because of the risk of network attacks and data theft. In this paper, the authors present data security solutions for Gateway IoT devices to ensure information security against eavesdropping or sniffers. The device has been integrated into a landslide monitoring system, which has proven to work, increasing the reliability of the system.


Author(s):  
N. A. Borsuk ◽  
V. A. Fedorova ◽  
M. V. Ivanov

Some questions of socialization of physically disabled people are considered, the concept Smart home, its opportunities is given. The conclusion is drawn on need of development of a specialized system of the climate security module and module of monitoring of location of the disabled person indoors. Features of the solution of this task are considered. For a possible solution to this problem, a set of video surveillance equipment is offered which can be composed of: cameras, server – computer, data storage, router for wireless devices, and specialized software, the core of the video surveillance system, operating system, video analysis modules and integration with third-party software systems, etc. When using only one router, a solution to the problem of tracking the correct location of the receiver in cases where, for example, the user walks in a circle is proposed. The realization option is offered.


Author(s):  
A.A.Mambekova

In article problems of use of information technologies in management of personnel of the companies on providing different services by means of the Internet and mobile networks and also application of CRM systems for automation of accounting and control of work with clients are considered, data on cloud computing and features of use of cloud computing at a solution of administrative tasks are provided. The concept of cost reduction on Internet traffic due to application of cloud computing of data storage is offered.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document