Security implications of the personal information environment

被引:0
|
作者
Valasek, Pavel [1 ]
机构
[1] Tomas Bata Univ Zlin, Nam TG Masaryka 5555, Zlin 76001, Czech Republic
来源
22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018) | 2018年 / 210卷
关键词
D O I
10.1051/matecconf/201821004041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article discusses a security in a background of the personal information environment. A role and importance of personal information environment and its security is on the rise due to the increasing inclusion of information and communication technology. In many cases, the focus of conducted studies is on the technological part of the problem. In this article, results of the user-oriented study are presented. The main aim was to establish how users perceive security applications. As a preliminary study, a method of survey was utilized. Gathered data were evaluated using common statistical methods. Results of the study are presented in a suitable form with a consideration of a large variety of answers between users. Results show areas of technology and user disagreements. These established differences will be used as a basis of the future research.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Personal Information in Passwords and Its Security Implications
    Li, Yue
    Wang, Haining
    Sun, Kun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2320 - 2333
  • [2] Implications for the Protection of Privacy and Personal Information in a Digital Environment
    Rojas, Hector Edin Lozano
    Olvera, Gitta Antonella Andrade
    Olvera, Marcela Anarcaly Zambrano
    ESTUDIOS DEL DESARROLLO SOCIAL-CUBA Y AMERICA LATINA, 2023, 11 : 187 - 197
  • [3] Research on Security for Personal Information and Privacy Under Network Environment
    Yu, Yong
    Wang, Qun
    Ke, Zun Ping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 277 - 279
  • [4] The Personal Information Security Assistant
    Kegel, Roeland H. P.
    2015 IEEE 23RD INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2015, : 393 - 397
  • [5] A Study of Personal Information in Human-chosen Passwords and Its Security Implications
    Li, Yue
    Wang, Haining
    Sun, Kun
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,
  • [6] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [7] Information Environment Security
    Waltzman, Rand
    PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, : 1521 - 1521
  • [8] RFID based context information security system architecture for securing personal information under ubiquitous environment
    Song, Jae-Gu
    Park, Gil-Cheol
    Kim, Seoksoo
    COMPUTATION IN MODERN SCIENCE AND ENGINEERING VOL 2, PTS A AND B, 2007, 2 : 563 - 566
  • [9] Personal security environment on palm PDA
    Freudenthal, M
    Heiberg, S
    Willemson, J
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 366 - 372
  • [10] Security challenges in the personal distributed environment
    Schwiderski-Grosche, S
    Tomlinson, A
    Goo, SK
    Irvine, JM
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3267 - 3270