Security implications of the personal information environment

被引:0
|
作者
Valasek, Pavel [1 ]
机构
[1] Tomas Bata Univ Zlin, Nam TG Masaryka 5555, Zlin 76001, Czech Republic
来源
22ND INTERNATIONAL CONFERENCE ON CIRCUITS, SYSTEMS, COMMUNICATIONS AND COMPUTERS (CSCC 2018) | 2018年 / 210卷
关键词
D O I
10.1051/matecconf/201821004041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article discusses a security in a background of the personal information environment. A role and importance of personal information environment and its security is on the rise due to the increasing inclusion of information and communication technology. In many cases, the focus of conducted studies is on the technological part of the problem. In this article, results of the user-oriented study are presented. The main aim was to establish how users perceive security applications. As a preliminary study, a method of survey was utilized. Gathered data were evaluated using common statistical methods. Results of the study are presented in a suitable form with a consideration of a large variety of answers between users. Results show areas of technology and user disagreements. These established differences will be used as a basis of the future research.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Limitations of personal information in an online environment
    Shailer, Gabriella
    ALTERNATIVE LAW JOURNAL, 2018, 43 (04) : 309 - 312
  • [22] Adaptation in adaptable personal information environment
    Maneewatthana, Thanyalak
    Wills, Gary
    Hall, Wendy
    ADAPTIVE HYPERMEDIA AND ADAPTIVE WEB-BASED SYSTEMS, PROCEEDINGS, 2006, 4018 : 358 - 361
  • [23] Using the Smartphone as a Personal Information Security Center
    Hou, Yung-Tsung
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 573S - 578S
  • [24] Analysis of personal information security behavior and awareness
    Ogutcu, Gizem
    Tastik, Ozlem Muge
    Chouseinoglou, Oumout
    COMPUTERS & SECURITY, 2016, 56 : 83 - 93
  • [25] Usable privacy and security for personal information management
    Karat, CM
    Brodie, C
    Karat, J
    COMMUNICATIONS OF THE ACM, 2006, 49 (01) : 56 - 57
  • [26] Internet Security Protection in Personal Sensitive Information
    Wang, Yubin
    Li, Chao
    Cheng, Nan
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 628 - 632
  • [27] Outsourcing Information Security: Contracting Issues and Security Implications
    Cezar, Asunur
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    MANAGEMENT SCIENCE, 2014, 60 (03) : 638 - 657
  • [28] Information systems security in an airport environment
    Wilson, DL
    36TH ANNUAL 2002 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2002, : 154 - 157
  • [29] ISEE: AN INFORMATION SECURITY ENGINEERING ENVIRONMENT
    Cheng, Jingde
    Goto, Yuichi
    Horie, Daisuke
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 395 - 400
  • [30] Information Terrorism in the new security environment
    Webb, Ken
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 249 - 255