Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2498
Title: | Privacy and Security Data-sharing Technologies for Tampering Protection and Detection |
Authors: | Harshanath, S. M. Buddhika |
Keywords: | Mobile computing devices Social networks Control Privacy and security Social network services |
Issue Date: | Feb-2019 |
Publisher: | Transactions on Smart Processing & Computing |
Series/Report no.: | IEIE Transactions on Smart Processing & Computing;Volume 8 Issue 1 Pages 43-48 |
Abstract: | Digital transformation enables the development and testing of available applications for customer use, done in a smart way. It is also clear that the vast amounts of available data related to business cannot be easily handled in a day without the use of these mobile resources. Yet, privacy and security factors affect the release of more data for publishing or exchange. Open data is ruled out due to insufficient available data for research, as related to mobile devices, where there is a need for real data sets for testing purposes. The Internet of Things demands stronger security mechanisms to keep attacks in buildings and automobiles at bay. However, it must not be ignored that rules and regulations require considerable time to come into effect, whereas self-control, imposed by a user made aware of the risks, takes little or no time at all. |
URI: | http://rda.sliit.lk/handle/123456789/2498 |
ISSN: | 2287-5255 |
Appears in Collections: | Research Papers - Dept of Computer Systems Engineering Research Papers - Open Access Research Research Papers - SLIIT Staff Publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ieietspc_201902_009.pdf | 569.11 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.