Research Papers - Dept of Computer Systems Engineering

Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    PublicationEmbargo
    Privacy & Security in Mobile Devices, Social Network Services as Related to Business
    (IEEE, 2018-06-14) Harshanath, S. M. Buddhika
    Mobile computing has made it extra easy to maintain contacts either away from home or office. These mobile computing devices are mostly meant to increase productivity in the place of work. Yet, the benefits can easily come along with a good amount of risks too. Business operations require human resources and systems and we cannot do without them in our business operations. Therefore, it is time for professionals engaged in security tasks to consider challenges to information security before considering awareness programs for workers to treat information security as a highly valuable attribute. These awareness raising programs could create attitudinal changes towards risk management with regular use of mobile devices. But, of course, rules and regulations require time to come into effect. Self-awareness brought in with attitudinal changes, takes no time. Nowadays, with the IoT (Internet of Things) it is possible to monitor use of mobile devices, moving around buildings and automobiles. This, in turn, demands robust security systems.
  • Thumbnail Image
    PublicationOpen Access
    Privacy and Security Data-sharing Technologies for Tampering Protection and Detection
    (Transactions on Smart Processing & Computing, 2019-02) Harshanath, S. M. Buddhika
    Digital transformation enables the development and testing of available applications for customer use, done in a smart way. It is also clear that the vast amounts of available data related to business cannot be easily handled in a day without the use of these mobile resources. Yet, privacy and security factors affect the release of more data for publishing or exchange. Open data is ruled out due to insufficient available data for research, as related to mobile devices, where there is a need for real data sets for testing purposes. The Internet of Things demands stronger security mechanisms to keep attacks in buildings and automobiles at bay. However, it must not be ignored that rules and regulations require considerable time to come into effect, whereas self-control, imposed by a user made aware of the risks, takes little or no time at all.
  • Thumbnail Image
    PublicationEmbargo
    Privacy & Security in Mobile Devices, Social Network Services and Social Reform
    (ttest, 2018-04) Harshanath, S. M. Buddhika
    Mobile computing devices and social networks have become very popular for contact away from home or in the office. Though meant for increased productivity in the workplace, the benefits are not without risks. Human resources and systems are recognized as essential to society and business operations. Challenges to information security professionals require, first of all, convincing management about the problem and then considering awareness programs for the workforce to inculcate information security as a highly valued attribute. Such awareness raising could be developed to transform attitudinal changes to follow risk management procedures for regular use with the use of mobile devices. Rules and restrictions take time to materialize. Self-control from an individual made aware of the risks takes no time. Now, with the Internet of Things (IoT) it is possible for various devices to hover around mobile users and make use of control features in buildings and automobiles as well. This makes the demand for robust security systems to ward off attacks, essential