Information and Communications Technology Threats: Personal Data and User Behaviour
نویسندگان
چکیده
This article analyses the threats which Information and Communications Technologies currently pose to individual liberties. Indeed, the information which is collected on individuals is becoming more and more complex: via RFID chips inserted into different cards (including transport, bank and customer loyalty cards), via visits to internet sites, over surveillance cameras posted in various places (work and public spaces), each of us is leaving « traces » which make up just as much collected data, most often treated and transmitted without our knowledge, and integrated into files, the mastery of which eludes us. We wished to carry out a study in order to evaluate the use of information and communications technologies and the awareness of users to the inherent risks. We also sought to determine if there exists a significant gap between the awareness of a threat and the safety measures associated in order to reduce the vulnerability of a system.
منابع مشابه
Users as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملThe Investigation and Analysis of the Strengths, Weaknesses, Opportunities, and Threats of Wearable Electronic Technologies: A Systematic Review
Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...
متن کاملInformation and communications technology facilities at the tertiary level education in some urban universities in Bangladesh
With the advent of digitalization, information and communications technology facilities have become an indispensable part of education especially at the universities. This study has been undertaken with dual purposes - to find the existing scenario of information and communications technology facilities and to gauge the perception of the students onthe quality of those facilities - at the unive...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کامل