IntrusIon Into PrIvacy and Into InformatIon systems
ثبت نشده
چکیده
In our network connected society, intrusion becomes a new form of trespassing, one which quite often leads to significant problems and poses great risks for the individual and for businesses, which are increasingly relying on modern information systems. The main appearances of intrusion, in the Information Society, are those concerning privacy intrusion and intrusion into information systems. In particular, privacy intrusion is the act of intruding the personal sphere of the individual, which may involve the illicit collection and processing of personal data, the use of intrusive equipment, such as video cameras and key-loggers, but also of more sophisticated technologies, for example RFIDs. In the post 9/11 era, privacy poses as a negotiable good that can be compromised to preserve public security. Thus, surveillance poses as necessary measure in view of the threat of terrorism and organized crime. Further, intrusion into a computer system can take many forms. We could note attempts at accessing and manipulating of information systems that can compromise the security and trust of such systems, which fall within the realm of e-crime. E-crime is undoubtedly one of the major challenges for the future of law enforcement. As information and communications technology (ICT) becomes more pervasive, the various kinds of electronic crime will be protagonists in all forms of criminal behavior. The following means may be used for committing the act: electronic communications and transactions, spread of information via the Internet, falsification of physical characteristics and eventually ID theft. The e-crime types may be categorized into four main groups (see Janczewski and Colaric, 2007):
منابع مشابه
Privacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملSTLR: a novel danger theory based structural TLR algorithm
Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation of AIS is inspired from adaptive immune reactions but, the second one which is called danger theory focuses on both adaptive and innate reactions to build a more biologically-re...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملPrivacy-Preserving Distributed Event Corroboration
Privacy-Preserving Distributed Event Correlation Janak J. Parekh Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational” correlation; organizations typically employ privacy policies that prohibit the exchange of information outside of the or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016