Information Security and Privacy in Proposed Government's Smart Sensor and WiFi Networks
VerifiedAdded on 2023/06/09
|18
|4715
|464
AI Summary
This article discusses the proposed government's Smart Sensor and WiFi networks and their impact on the behaviour of citizens. It covers the expected changes in time schedules, choice of activities, and implications for sharing sensitive information on mobile devices. It also discusses the use of digital identity to maintain privacy using mobile phones or devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY AND PRIVACY
Information Security and Privacy
Name of student
Name of University
Author’s Note
Information Security and Privacy
Name of student
Name of University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY AND PRIVACY
Table of Contents
1. Proposed Government’s Smart Sensor Network......................................................................2
a) Types or categories of people affected.................................................................................2
b) Expected behavioural changes from normal citizens........................................................3
c) Expected change in time schedules, choice of activities of an individual behaviour...........3
2. Proposed Government’s Smart WiFi Network........................................................................4
a) Types or categories of people affected.................................................................................4
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens.........................................................................................................................................5
c) Expected change in time schedules, choice of activities and more of an individual
behaviour.....................................................................................................................................6
d) Implications for sharing sensitive information on a mobile device..................................8
3. Use of Digital Identity to maintain privacy using mobile phone or devices............................9
4. Steps to ensure security and privacy of digital identity..........................................................12
5. References..............................................................................................................................14
Table of Contents
1. Proposed Government’s Smart Sensor Network......................................................................2
a) Types or categories of people affected.................................................................................2
b) Expected behavioural changes from normal citizens........................................................3
c) Expected change in time schedules, choice of activities of an individual behaviour...........3
2. Proposed Government’s Smart WiFi Network........................................................................4
a) Types or categories of people affected.................................................................................4
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens.........................................................................................................................................5
c) Expected change in time schedules, choice of activities and more of an individual
behaviour.....................................................................................................................................6
d) Implications for sharing sensitive information on a mobile device..................................8
3. Use of Digital Identity to maintain privacy using mobile phone or devices............................9
4. Steps to ensure security and privacy of digital identity..........................................................12
5. References..............................................................................................................................14
2INFORMATION SECURITY AND PRIVACY
1. Proposed Government’s Smart Sensor Network
The Australian State Government has decided to implement the Smart State Plan for their
State by reviewing the Singapore Government’s Smart Nation Plan. The Smart State Plan
consists of the following features in their CBD, and with this, it will monitor the behaviour of the
citizen and address the crime of the street.
a) Types or categories of people affected
People Affected
The categories of people who have no
concern about the environment
They affected the environment by throwing
the garbage anywhere on the street
The categories of people who do not follow
the traffic rules and keep the reckless attitude
Breaking the traffic signal and randomly
crossing the road. Follow the signal of the
traffic; permitted speed is marinating at the
traffic
The categories of people committing crime at
the public place and bus stops
Performing some activities that are illegal
like robbing, killing, stealing and more.
The traffic police Law and order are followed at the traffic
Garbage agencies Managing the collection of garbage from the
public places
1. Proposed Government’s Smart Sensor Network
The Australian State Government has decided to implement the Smart State Plan for their
State by reviewing the Singapore Government’s Smart Nation Plan. The Smart State Plan
consists of the following features in their CBD, and with this, it will monitor the behaviour of the
citizen and address the crime of the street.
a) Types or categories of people affected
People Affected
The categories of people who have no
concern about the environment
They affected the environment by throwing
the garbage anywhere on the street
The categories of people who do not follow
the traffic rules and keep the reckless attitude
Breaking the traffic signal and randomly
crossing the road. Follow the signal of the
traffic; permitted speed is marinating at the
traffic
The categories of people committing crime at
the public place and bus stops
Performing some activities that are illegal
like robbing, killing, stealing and more.
The traffic police Law and order are followed at the traffic
Garbage agencies Managing the collection of garbage from the
public places
3INFORMATION SECURITY AND PRIVACY
b) Expected behavioural changes from normal citizens
With the presence of the public camera, a subtle but profound change has been brought to
the character of the normal citizen. The authorities watched the citizens or make them aware as
they are less free-wheeling and more self-conscious. People had become more conscious at the
traffic light with the use of camera and smart sensor network. There were certain law and order
that were maintained at the traffic with constant monitoring about the thinking of the people
(McDonald, 2015). The number of people is getting increase who uses rubbish bean which is
kept at every public place. When something that is not happening naturally then there is a need
for establishing believe in cleanliness in the mind of the people to increase the monitoring level.
Before making any commitment, people have to think twice as it violates law and order was
everything can be caught by analyzing the footage of the camera. Moreover, people may get
worried about the feeling that they are constantly being monitored their concern may grow about
their privacy.
c) Expected change in time schedules, choice of activities of an individual behaviour
Following the cleanliness process:
As in many places, rubbish beans are being accustomed for garbage to get dispose of by
people. Presently, it may not come by natural, there may be some people who dislike such thing,
and however, by the end, the same thing will be followed which contribute to having a clean
environment.
Thinks should be organized:
A proper schedule of the time is to be followed by people and plan the terms in, an
organized manner and scheduling the travel for themselves. As this may help in avoiding heavy
traffic and breaking the rules of the ta traffic.
b) Expected behavioural changes from normal citizens
With the presence of the public camera, a subtle but profound change has been brought to
the character of the normal citizen. The authorities watched the citizens or make them aware as
they are less free-wheeling and more self-conscious. People had become more conscious at the
traffic light with the use of camera and smart sensor network. There were certain law and order
that were maintained at the traffic with constant monitoring about the thinking of the people
(McDonald, 2015). The number of people is getting increase who uses rubbish bean which is
kept at every public place. When something that is not happening naturally then there is a need
for establishing believe in cleanliness in the mind of the people to increase the monitoring level.
Before making any commitment, people have to think twice as it violates law and order was
everything can be caught by analyzing the footage of the camera. Moreover, people may get
worried about the feeling that they are constantly being monitored their concern may grow about
their privacy.
c) Expected change in time schedules, choice of activities of an individual behaviour
Following the cleanliness process:
As in many places, rubbish beans are being accustomed for garbage to get dispose of by
people. Presently, it may not come by natural, there may be some people who dislike such thing,
and however, by the end, the same thing will be followed which contribute to having a clean
environment.
Thinks should be organized:
A proper schedule of the time is to be followed by people and plan the terms in, an
organized manner and scheduling the travel for themselves. As this may help in avoiding heavy
traffic and breaking the rules of the ta traffic.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SECURITY AND PRIVACY
5INFORMATION SECURITY AND PRIVACY
Decease of the crime that is performed:
It is not easy to avoid the consequences of a crime that is committed by the people as
everybody knows it increases the monitoring level. Thus, people would not think of using the
places as a spot to do a crime which has targeted the most, and the amount is less for the security.
2. Proposed Government’s Smart WiFi Network
The Australian State Government has another the Smart State Plan to deploy a Network
with Smart Wifi. The Smart State Plan for the Smart Wifi Network has the following features in
their CBD where there is a Wifi hotspot for a series of sensor boxes throughout the city.
a) Types or categories of people affected
People Affected
The categories of people who are interested
in studying
Though the online medium getting access
to study material
The categories of people who are interested
in travelling
There is a hassle-free experience of
travelling
The categories of people who are getting
entertain online
To download, view and share content
online
The categories of people who dose their
business online
The business could be grown by attracting
people through online advertisement
The categories of people who are interested
in social engagement
Involvement of the self in getting in the
platform of social media
The categories of people could not manage
the activities of the household
To manage the activities of the household
like paying, bills, shopping for those who
Decease of the crime that is performed:
It is not easy to avoid the consequences of a crime that is committed by the people as
everybody knows it increases the monitoring level. Thus, people would not think of using the
places as a spot to do a crime which has targeted the most, and the amount is less for the security.
2. Proposed Government’s Smart WiFi Network
The Australian State Government has another the Smart State Plan to deploy a Network
with Smart Wifi. The Smart State Plan for the Smart Wifi Network has the following features in
their CBD where there is a Wifi hotspot for a series of sensor boxes throughout the city.
a) Types or categories of people affected
People Affected
The categories of people who are interested
in studying
Though the online medium getting access
to study material
The categories of people who are interested
in travelling
There is a hassle-free experience of
travelling
The categories of people who are getting
entertain online
To download, view and share content
online
The categories of people who dose their
business online
The business could be grown by attracting
people through online advertisement
The categories of people who are interested
in social engagement
Involvement of the self in getting in the
platform of social media
The categories of people could not manage
the activities of the household
To manage the activities of the household
like paying, bills, shopping for those who
6INFORMATION SECURITY AND PRIVACY
have needs in the household
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens
With the increase in technology, new activities associated with the people has affected
the behaviour. There is a dramatic change in the behaviour of the people. This is the internet age,
where various people get connected to the internet, however, still, some people do not have
access to the internet or in the other word if it is said, then the internet connection is limited for a
lot of people. Thus, a free internet connection when introducing to the people, then the impact
will be more on the people. The public Wi-Fi as providing free internet connection for the
people, the impact of it would be more on them. The Wi-Fi that is public provide an attraction to
the people having free connectivity (Bancroft & Scott Reid, 2017). Thus, it results in increasing
the online activities. Today, the internet is everywhere, as the digital world is embracing from the
love of the people. Through this changes being expected from the behaviour of the people,
instead of obtaining it offline, people would just prefer online activities. In such activities, people
would make the payment and purchase the product. However, they would prefer less to visit the
offline store to shop. For them, ordering online is much easier. Things would not require to be
organized by paying less as everything could be managed online. As such an approach of the
people does not blame the internet alone, it is related to the behavioural approach to which the
people are associated with. The new could be updated by the people across the world to make the
internet access easier (Hu et al., 2015). Overall, collective online activities are increasing among
the people. Those people who have difficulty communicating publicly find it easier to get
connected with the virtual social life. In this way, they will be more comfortable in
have needs in the household
b) Expected behavioural changes with the use of mobile devices in CBD from normal
citizens
With the increase in technology, new activities associated with the people has affected
the behaviour. There is a dramatic change in the behaviour of the people. This is the internet age,
where various people get connected to the internet, however, still, some people do not have
access to the internet or in the other word if it is said, then the internet connection is limited for a
lot of people. Thus, a free internet connection when introducing to the people, then the impact
will be more on the people. The public Wi-Fi as providing free internet connection for the
people, the impact of it would be more on them. The Wi-Fi that is public provide an attraction to
the people having free connectivity (Bancroft & Scott Reid, 2017). Thus, it results in increasing
the online activities. Today, the internet is everywhere, as the digital world is embracing from the
love of the people. Through this changes being expected from the behaviour of the people,
instead of obtaining it offline, people would just prefer online activities. In such activities, people
would make the payment and purchase the product. However, they would prefer less to visit the
offline store to shop. For them, ordering online is much easier. Things would not require to be
organized by paying less as everything could be managed online. As such an approach of the
people does not blame the internet alone, it is related to the behavioural approach to which the
people are associated with. The new could be updated by the people across the world to make the
internet access easier (Hu et al., 2015). Overall, collective online activities are increasing among
the people. Those people who have difficulty communicating publicly find it easier to get
connected with the virtual social life. In this way, they will be more comfortable in
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7INFORMATION SECURITY AND PRIVACY
communicating, and sharing has become easier (Peddinti, Ross & Cappos, 2014). With this, it is
sure that the group of people have brought a lot of behaviour changes.
c) Expected change in time schedules, choice of activities and more of an individual
behaviour
Getting a free education:
Some people have got a lot of interest in studying. It is difficult for them to visit the
public library and get some book and then return them on time in which extra charges can be
avoided (Levin, Kark & Crandall, 2015). As the free WiFi is available which help to get the
online books downloaded easily and read them anytime from anywhere. There is no need of
returning the book online. Therefore, for people would prefer more to read online and might visit
less or hardly to the library as per their convenience.
Flexibility in working:
It is already seen that today technology has shaped the world. It influences the
communication that is taking place. There is no such necessity that employees who are doing
jobs need to be present in the office and do their assignment. Electronic communications such as
email, chat have become more effective (He, Chan & Guizani, 2015). There is a need for
seamless access that has to manage the life of the job more easily. Students and Professionals
make the use of the free internet to some extents as to check through the emails, reply to their
responsibilities that do not miss important message which matters most.
Digital Economy is Embrace:
The present world completely depends on the digital economy. Everywhere it is found
that the digital economy is rapidly growing. Most of the people go for cashless payment from the
option that is present online in the form of digital wallets as it is a hassle-free, and also it is much
communicating, and sharing has become easier (Peddinti, Ross & Cappos, 2014). With this, it is
sure that the group of people have brought a lot of behaviour changes.
c) Expected change in time schedules, choice of activities and more of an individual
behaviour
Getting a free education:
Some people have got a lot of interest in studying. It is difficult for them to visit the
public library and get some book and then return them on time in which extra charges can be
avoided (Levin, Kark & Crandall, 2015). As the free WiFi is available which help to get the
online books downloaded easily and read them anytime from anywhere. There is no need of
returning the book online. Therefore, for people would prefer more to read online and might visit
less or hardly to the library as per their convenience.
Flexibility in working:
It is already seen that today technology has shaped the world. It influences the
communication that is taking place. There is no such necessity that employees who are doing
jobs need to be present in the office and do their assignment. Electronic communications such as
email, chat have become more effective (He, Chan & Guizani, 2015). There is a need for
seamless access that has to manage the life of the job more easily. Students and Professionals
make the use of the free internet to some extents as to check through the emails, reply to their
responsibilities that do not miss important message which matters most.
Digital Economy is Embrace:
The present world completely depends on the digital economy. Everywhere it is found
that the digital economy is rapidly growing. Most of the people go for cashless payment from the
option that is present online in the form of digital wallets as it is a hassle-free, and also it is much
8INFORMATION SECURITY AND PRIVACY
easier to use and keep money safe and use them anytime from anywhere from mobile, tablet or
any other devices (Panetto et al., 2016). It is not much necessary to carry any card or cash, here
the only thing that is needed is the smartphone which has an internet connection in an active
mode. Thus, the free Wi-Fi access has increased the number of users who are opting all the
payment that is made through digital payment.
On go Entertainment:
Today, people find everything online for entertaining themselves. It is a really good thing
that precedence is taking place with a new form of entertainment. Everything is available online
from songs, plays, movies, tech and a lot more. Thus, the value of digital entertainment increases
with the use of free Wi-Fi (Najaftorkaman et al., 2015). The users would now prefer to download
songs, movies from the internet and likely to rent or buy offline. There is content that is essential
for renting or purchasing, have free versions, and are all available online. All age group people
are influenced were younger groups of participants expected to know more.
Getting the city Explore like never before:
There are greater benefits to free public to travel. The city is getting explore through a
huge number of travellers rather than getting guidance from someone else for those who are
complete strangers. There is no difficulty in finding the information about a place where there
are attractive places to book hotel and cabs within the best price that is given. It is easier to make
the travel experience through public and free Wi-Fi, and it has become much independent to
make the city comfortably explore.
Engagement to the Social affair:
In the shortest possible time, the number of people that increases will get easy access to
the internet so that that they can easily get connected with their friends from anywhere around
easier to use and keep money safe and use them anytime from anywhere from mobile, tablet or
any other devices (Panetto et al., 2016). It is not much necessary to carry any card or cash, here
the only thing that is needed is the smartphone which has an internet connection in an active
mode. Thus, the free Wi-Fi access has increased the number of users who are opting all the
payment that is made through digital payment.
On go Entertainment:
Today, people find everything online for entertaining themselves. It is a really good thing
that precedence is taking place with a new form of entertainment. Everything is available online
from songs, plays, movies, tech and a lot more. Thus, the value of digital entertainment increases
with the use of free Wi-Fi (Najaftorkaman et al., 2015). The users would now prefer to download
songs, movies from the internet and likely to rent or buy offline. There is content that is essential
for renting or purchasing, have free versions, and are all available online. All age group people
are influenced were younger groups of participants expected to know more.
Getting the city Explore like never before:
There are greater benefits to free public to travel. The city is getting explore through a
huge number of travellers rather than getting guidance from someone else for those who are
complete strangers. There is no difficulty in finding the information about a place where there
are attractive places to book hotel and cabs within the best price that is given. It is easier to make
the travel experience through public and free Wi-Fi, and it has become much independent to
make the city comfortably explore.
Engagement to the Social affair:
In the shortest possible time, the number of people that increases will get easy access to
the internet so that that they can easily get connected with their friends from anywhere around
9INFORMATION SECURITY AND PRIVACY
the world. The more the social engagement will make the people focus less on the world that is
there around them (Hu, Zhao & Jiang, 2013). Most people will be busy in updating their status,
sharing their picture with friends, updating the status, chatting and keeping followers which is
hard for the people to refrain from.
d) Implications for sharing sensitive information on a mobile device
There are certain steps recommended to make the sensitive information protective at the time
of using a mobile device at the place where there is public Wi-Fi:
In the hotspot of a public Wi-Fi, once any device is getting connected to the hotspot, it is
needed to check whether multiple hotspots have the same name or not. It is often hard to
identify or recognize how much legitimate the hotspots are, and thus it becomes
important that the hotspot is avoided to have it in the safer side were the sensitive
information could be easily protected into mobile devices.
At a time where VPN configuration is not there, it is important to make sure that internet
connection whenever made to the device through public WiFi, there is an encrypted
session. Thus, here it becomes necessary to use those sites that have the HTTPS instead
of HTTP in the URL.
Using the VPN, internet traffic is made secure. There is an active connection of VPN,
was the internet is surfed, and this will ensure that whether entire internet traffic is getting
transferred through a tunnel having encrypted and secure data. With this, the security also
increases.
It should avoid the use of file transfer protocol (FTP) for the transaction.
the world. The more the social engagement will make the people focus less on the world that is
there around them (Hu, Zhao & Jiang, 2013). Most people will be busy in updating their status,
sharing their picture with friends, updating the status, chatting and keeping followers which is
hard for the people to refrain from.
d) Implications for sharing sensitive information on a mobile device
There are certain steps recommended to make the sensitive information protective at the time
of using a mobile device at the place where there is public Wi-Fi:
In the hotspot of a public Wi-Fi, once any device is getting connected to the hotspot, it is
needed to check whether multiple hotspots have the same name or not. It is often hard to
identify or recognize how much legitimate the hotspots are, and thus it becomes
important that the hotspot is avoided to have it in the safer side were the sensitive
information could be easily protected into mobile devices.
At a time where VPN configuration is not there, it is important to make sure that internet
connection whenever made to the device through public WiFi, there is an encrypted
session. Thus, here it becomes necessary to use those sites that have the HTTPS instead
of HTTP in the URL.
Using the VPN, internet traffic is made secure. There is an active connection of VPN,
was the internet is surfed, and this will ensure that whether entire internet traffic is getting
transferred through a tunnel having encrypted and secure data. With this, the security also
increases.
It should avoid the use of file transfer protocol (FTP) for the transaction.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10INFORMATION SECURITY AND PRIVACY
3. Use of Digital Identity to maintain privacy using mobile phone or devices
Digital identity is the network identity which is adopted in cyberspace by mobile phone or
device user. Security and privacy are the key areas to focus for the digital identity management
when seen the online social networks that allow the people to maintain an online identity which
overlaps between the real world and the online context (Friedman & Wagoner, 2015). A person
uniquely describes Digital identity that describe a person. It often created identities that reflect a
specific aspect or ideal version. The data for digital identity uniquely describe a person and the
all the information are stored online. This will identify the organizations, individual presence or
the electronic devices which are mostly operated online. There are unique identifiers or the
certain patterns of the user that usually get generated through the system having the possible
interactions with the network (Holt & Malčić, 2015). There are some of the services that are
avail online for those users who share their personal information such as social networking,
shopping. This is added to the user devices or the individual digital identities. It has some
sensitive information, and digital data are contextual. The information stored online through
which the individual presence, electronic devices or the organization is identified to operate
online (Harrell & Lim, 2017). The patterns of the user or the unique identifiers presence are
generated along with the system interaction having all possible network. Personal information is
shared by users so that some service could be avail online through social networking, shopping,
that have used the devices or the individual with digital identities (Shrier, Wu & Pentland, 2016).
Sensitive information is often contextual for the digital data as the service provider collected the
data to authenticate the user online. The plan has been greatly assisted in rolling out in such a
way that privacy could be maintained where there are identities of the user that have not reveal
and allow them to access and take the benefits that the government provide through some mobile
3. Use of Digital Identity to maintain privacy using mobile phone or devices
Digital identity is the network identity which is adopted in cyberspace by mobile phone or
device user. Security and privacy are the key areas to focus for the digital identity management
when seen the online social networks that allow the people to maintain an online identity which
overlaps between the real world and the online context (Friedman & Wagoner, 2015). A person
uniquely describes Digital identity that describe a person. It often created identities that reflect a
specific aspect or ideal version. The data for digital identity uniquely describe a person and the
all the information are stored online. This will identify the organizations, individual presence or
the electronic devices which are mostly operated online. There are unique identifiers or the
certain patterns of the user that usually get generated through the system having the possible
interactions with the network (Holt & Malčić, 2015). There are some of the services that are
avail online for those users who share their personal information such as social networking,
shopping. This is added to the user devices or the individual digital identities. It has some
sensitive information, and digital data are contextual. The information stored online through
which the individual presence, electronic devices or the organization is identified to operate
online (Harrell & Lim, 2017). The patterns of the user or the unique identifiers presence are
generated along with the system interaction having all possible network. Personal information is
shared by users so that some service could be avail online through social networking, shopping,
that have used the devices or the individual with digital identities (Shrier, Wu & Pentland, 2016).
Sensitive information is often contextual for the digital data as the service provider collected the
data to authenticate the user online. The plan has been greatly assisted in rolling out in such a
way that privacy could be maintained where there are identities of the user that have not reveal
and allow them to access and take the benefits that the government provide through some mobile
11INFORMATION SECURITY AND PRIVACY
and similar devices (Wong et al., 2014). In that case, it is not necessary for them to be present
physically at the work location like the online banking, taxing, digital mailboxes, myGov
services, state government services and lot more. That individual who carries their digital
identity could gain ease in which complications and worries can be avoided while carrying the
ID cards (Yu et al., 2017).
Some challenges occur with the use of digital identities. The user has authorized the
reason that is associated with the digital identities of the users that can put the privacy at risk.
The trends of digitization are found all over the world, and the major issue over there is the
protection of the data of the user that is maintain online (Shrier, Wu & Pentland, 2016). Thus,
this indicates that users’ data that are kept online are not safe. The step taken for using the
Digital Identity would make the data secure and maintain the privacy. Such issues can be
addressed through Digital Identity which would be effective for the online security of data:
Transaction volume has increased:
The demand of the online purchase increases which increases the volume of transaction.
As digital identity is important, it customizes the transaction (Grassi, Garcia & Fenton, 2017). It
is possible to make the authentication of the transaction possible with the digital identity for only
those who can perform the transaction. Therefore, it makes the process customized and organize
it.
Transaction complexity has increased:
The complexity is more with an additional volume of financial activities where there is
new technology that is very attractive and convenient (Ilia et al., 2015). The experience of the
consumer improves, and the process has become complex. The user has identified the
and similar devices (Wong et al., 2014). In that case, it is not necessary for them to be present
physically at the work location like the online banking, taxing, digital mailboxes, myGov
services, state government services and lot more. That individual who carries their digital
identity could gain ease in which complications and worries can be avoided while carrying the
ID cards (Yu et al., 2017).
Some challenges occur with the use of digital identities. The user has authorized the
reason that is associated with the digital identities of the users that can put the privacy at risk.
The trends of digitization are found all over the world, and the major issue over there is the
protection of the data of the user that is maintain online (Shrier, Wu & Pentland, 2016). Thus,
this indicates that users’ data that are kept online are not safe. The step taken for using the
Digital Identity would make the data secure and maintain the privacy. Such issues can be
addressed through Digital Identity which would be effective for the online security of data:
Transaction volume has increased:
The demand of the online purchase increases which increases the volume of transaction.
As digital identity is important, it customizes the transaction (Grassi, Garcia & Fenton, 2017). It
is possible to make the authentication of the transaction possible with the digital identity for only
those who can perform the transaction. Therefore, it makes the process customized and organize
it.
Transaction complexity has increased:
The complexity is more with an additional volume of financial activities where there is
new technology that is very attractive and convenient (Ilia et al., 2015). The experience of the
consumer improves, and the process has become complex. The user has identified the
12INFORMATION SECURITY AND PRIVACY
complexity properly and had addressed it so that the service is enabled correctly. Thus, the
choice is effective for digital identity.
Regulations are effective:
Data protection has been enforced for Digital Identity. It has become mandatory to have a
standard service provider which ensure the protection of data to measure strong security, and this
has made the user clear that data has to be collected and share the same data across the network
(Roßnagel et al., 2014). Therefore, the user ensures that the necessary information could be
provided once the digital identity is identified as per the demand of the service provider for a
particular service.
There are several layers of Digital identity which serve for a different purpose that ensures data
privacy:
Co-ordination and Consistency:
The online activities have governed the issues of having data consistency and made the
security better for the data to coordinate perfectly (Feher, 2016). The data could not be properly
coordinated and are inconsistent which make stealing or hacking of data easier.
Attributes that could exchange:
In this particular section, the attributes of the user get stored, collected properly and
protected and have standard security (Augot et al., 2017). For data security, the steps that are
important as a data attribute. Data is identified regarding their importance and sensitivity, and
more protection are needed for strong data security.
complexity properly and had addressed it so that the service is enabled correctly. Thus, the
choice is effective for digital identity.
Regulations are effective:
Data protection has been enforced for Digital Identity. It has become mandatory to have a
standard service provider which ensure the protection of data to measure strong security, and this
has made the user clear that data has to be collected and share the same data across the network
(Roßnagel et al., 2014). Therefore, the user ensures that the necessary information could be
provided once the digital identity is identified as per the demand of the service provider for a
particular service.
There are several layers of Digital identity which serve for a different purpose that ensures data
privacy:
Co-ordination and Consistency:
The online activities have governed the issues of having data consistency and made the
security better for the data to coordinate perfectly (Feher, 2016). The data could not be properly
coordinated and are inconsistent which make stealing or hacking of data easier.
Attributes that could exchange:
In this particular section, the attributes of the user get stored, collected properly and
protected and have standard security (Augot et al., 2017). For data security, the steps that are
important as a data attribute. Data is identified regarding their importance and sensitivity, and
more protection are needed for strong data security.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13INFORMATION SECURITY AND PRIVACY
4. Steps to ensure security and privacy of digital identity
There is a huge number of information available through the digital identity about an
individual to which the hackers usually target (Choi, Glassman & Cristol, 2017). By stealing the
identity, they start to perform a financial transaction of the owner. However, the identity could be
completely protected which would initiate some action from the side of the user due to which the
identity could not possibly steal by the hackers. The steps that can ensure security and privacy
are:
Messages and emails have to be identified:
The users mostly have some personal information on their emails and messages. This
turns out to be the most sensitive information, and the hackers find it easy to know about the
user’s personal information (Al-Zahrani, 2015). There is another thing that has to be noted for
certain links are received over the messages and emails to the user. These links are once clicked
that is easier for the hacker to get personal information which gets extracted by devices that are
hacked through the provided link that cloud be accessed.
Verification is done through two-step:
Most of the expert recommended this to be the safest form of one of a kind for a smart
card that provides some digital security (Zhao et al., 2017). The process of two-step verification
is effective to access the digital data for digital identity. Before accessing any data, a two-step
verification process is done to ensure optimal security.
4. Steps to ensure security and privacy of digital identity
There is a huge number of information available through the digital identity about an
individual to which the hackers usually target (Choi, Glassman & Cristol, 2017). By stealing the
identity, they start to perform a financial transaction of the owner. However, the identity could be
completely protected which would initiate some action from the side of the user due to which the
identity could not possibly steal by the hackers. The steps that can ensure security and privacy
are:
Messages and emails have to be identified:
The users mostly have some personal information on their emails and messages. This
turns out to be the most sensitive information, and the hackers find it easy to know about the
user’s personal information (Al-Zahrani, 2015). There is another thing that has to be noted for
certain links are received over the messages and emails to the user. These links are once clicked
that is easier for the hacker to get personal information which gets extracted by devices that are
hacked through the provided link that cloud be accessed.
Verification is done through two-step:
Most of the expert recommended this to be the safest form of one of a kind for a smart
card that provides some digital security (Zhao et al., 2017). The process of two-step verification
is effective to access the digital data for digital identity. Before accessing any data, a two-step
verification process is done to ensure optimal security.
14INFORMATION SECURITY AND PRIVACY
5. References
Al-Zahrani, A. (2015). Toward digital citizenship: Examining factors affecting participation
and involvement in the Internet society among higher education
students. International Education Studies, 8(12), 203.
Augot, D., Chabanne, H., Clémot, O., & George, W. (2017). Transforming face-to-face
identity proofing into anonymous digital identity using the Bitcoin blockchain. arXiv
preprint arXiv:1710.02951.
Bancroft, A., & Scott Reid, P. (2017). Challenging the techno-politics of anonymity: the case
of cryptomarket users. Information, Communication & Society, 20(4), 497-512.
Choi, M., Glassman, M., & Cristol, D. (2017). What it means to be a citizen in the internet
age: Development of a reliable and valid digital citizenship scale. Computers &
education, 107, 100-112.
Feher, K. (2016). Digital identity: The transparency of the self. In Applied Psychology:
Proceedings of the 2015 Asian Congress of Applied Psychology (ACAP 2015) (pp.
132-143).
Friedman, A. R., & Wagoner, L. D. (2015). The Need for Digital Identity in Cyberspace
Operations. Warfare, 14, 42-52.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special
Publication, 800, 63-3.
Harrell, D. F., & Lim, C. U. (2017). Reimagining the avatar dream: modeling social identity
in digital media. Communications of the ACM, 60(7), 50-61.
5. References
Al-Zahrani, A. (2015). Toward digital citizenship: Examining factors affecting participation
and involvement in the Internet society among higher education
students. International Education Studies, 8(12), 203.
Augot, D., Chabanne, H., Clémot, O., & George, W. (2017). Transforming face-to-face
identity proofing into anonymous digital identity using the Bitcoin blockchain. arXiv
preprint arXiv:1710.02951.
Bancroft, A., & Scott Reid, P. (2017). Challenging the techno-politics of anonymity: the case
of cryptomarket users. Information, Communication & Society, 20(4), 497-512.
Choi, M., Glassman, M., & Cristol, D. (2017). What it means to be a citizen in the internet
age: Development of a reliable and valid digital citizenship scale. Computers &
education, 107, 100-112.
Feher, K. (2016). Digital identity: The transparency of the self. In Applied Psychology:
Proceedings of the 2015 Asian Congress of Applied Psychology (ACAP 2015) (pp.
132-143).
Friedman, A. R., & Wagoner, L. D. (2015). The Need for Digital Identity in Cyberspace
Operations. Warfare, 14, 42-52.
Grassi, P. A., Garcia, M. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special
Publication, 800, 63-3.
Harrell, D. F., & Lim, C. U. (2017). Reimagining the avatar dream: modeling social identity
in digital media. Communications of the ACM, 60(7), 50-61.
15INFORMATION SECURITY AND PRIVACY
He, D., Chan, S., & Guizani, M. (2015). User privacy and data trustworthiness in mobile
crowd sensing. IEEE Wireless Communications, 22(1), 28-34.
Holt, J., & Malčić, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the
United States and European Union. Journal of Information Policy, 5, 155-178.
Hu, B., Zhao, H. V., & Jiang, H. (2013). Wireless multicast using relays: Incentive
mechanism and analysis. IEEE Transactions on Vehicular Technology, 62(5), 2204-
2219.
Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C. H., Kruchten, P., & Chan, H. C. (2015). A
survey on mobile social networks: Applications, platforms, system architectures, and
future research directions. IEEE Communications Surveys & Tutorials, 17(3), 1557-
1581.
Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015, October). Face/off:
Preventing privacy leakage from photos in social networks. In Proceedings of the
22nd ACM SIGSAC Conference on Computer and Communications Security (pp.
781-792). ACM.
Levin, N., Kark, S., & Crandall, D. (2015). Where have all the people gone? Enhancing
global conservation using night lights and social media. Ecological
Applications, 25(8), 2153-2167.
McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and identity in
digital cultures. Information, Communication & Society, 18(8), 968-982.
Najaftorkaman, M., Ghapanchi, A. H., Talaei‐Khoei, A., & Ray, P. (2015). A taxonomy of
antecedents to user adoption of health information systems: A synthesis of thirty
He, D., Chan, S., & Guizani, M. (2015). User privacy and data trustworthiness in mobile
crowd sensing. IEEE Wireless Communications, 22(1), 28-34.
Holt, J., & Malčić, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the
United States and European Union. Journal of Information Policy, 5, 155-178.
Hu, B., Zhao, H. V., & Jiang, H. (2013). Wireless multicast using relays: Incentive
mechanism and analysis. IEEE Transactions on Vehicular Technology, 62(5), 2204-
2219.
Hu, X., Chu, T. H., Leung, V. C., Ngai, E. C. H., Kruchten, P., & Chan, H. C. (2015). A
survey on mobile social networks: Applications, platforms, system architectures, and
future research directions. IEEE Communications Surveys & Tutorials, 17(3), 1557-
1581.
Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015, October). Face/off:
Preventing privacy leakage from photos in social networks. In Proceedings of the
22nd ACM SIGSAC Conference on Computer and Communications Security (pp.
781-792). ACM.
Levin, N., Kark, S., & Crandall, D. (2015). Where have all the people gone? Enhancing
global conservation using night lights and social media. Ecological
Applications, 25(8), 2153-2167.
McDonald, K. (2015). From Indymedia to Anonymous: rethinking action and identity in
digital cultures. Information, Communication & Society, 18(8), 968-982.
Najaftorkaman, M., Ghapanchi, A. H., Talaei‐Khoei, A., & Ray, P. (2015). A taxonomy of
antecedents to user adoption of health information systems: A synthesis of thirty
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16INFORMATION SECURITY AND PRIVACY
years of research. Journal of the Association for Information Science and
Technology, 66(3), 576-598.
Panetto, H., Zdravkovic, M., Jardim-Goncalves, R., Romero, D., Cecil, J., & Mezgár, I.
(2016). New perspectives for the future interoperable enterprise systems. Computers
in Industry, 79, 47-63.
Peddinti, S. T., Ross, K. W., & Cappos, J. (2014, October). On the internet, nobody knows
you're a dog: A Twitter case study of anonymity in social networks. In Proceedings of
the second ACM conference on Online social networks (pp. 83-94). ACM.
Roßnagel, H., Zibuschka, J., Hinz, O., & Muntermann, J. (2014). Users’ willingness to pay
for web identity management systems. European Journal of Information
Systems, 23(1), 36-50.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Massachusetts Institute of Technology-Connection Science, 1(3).
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Massachusetts Institute of Technology-Connection Science, 1(3).
Wong, O. C., Loh, S. K., Yang, H., & Wang, Y. L. (2014). U.S. Patent No. 8,732,455.
Washington, DC: U.S. Patent and Trademark Office.
Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2017). Identity-
based remote data integrity checking with perfect data privacy preserving for cloud
storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
years of research. Journal of the Association for Information Science and
Technology, 66(3), 576-598.
Panetto, H., Zdravkovic, M., Jardim-Goncalves, R., Romero, D., Cecil, J., & Mezgár, I.
(2016). New perspectives for the future interoperable enterprise systems. Computers
in Industry, 79, 47-63.
Peddinti, S. T., Ross, K. W., & Cappos, J. (2014, October). On the internet, nobody knows
you're a dog: A Twitter case study of anonymity in social networks. In Proceedings of
the second ACM conference on Online social networks (pp. 83-94). ACM.
Roßnagel, H., Zibuschka, J., Hinz, O., & Muntermann, J. (2014). Users’ willingness to pay
for web identity management systems. European Journal of Information
Systems, 23(1), 36-50.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Massachusetts Institute of Technology-Connection Science, 1(3).
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data
security). Massachusetts Institute of Technology-Connection Science, 1(3).
Wong, O. C., Loh, S. K., Yang, H., & Wang, Y. L. (2014). U.S. Patent No. 8,732,455.
Washington, DC: U.S. Patent and Trademark Office.
Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., & Min, G. (2017). Identity-
based remote data integrity checking with perfect data privacy preserving for cloud
storage. IEEE Transactions on Information Forensics and Security, 12(4), 767-778.
17INFORMATION SECURITY AND PRIVACY
Zhao, P., Bian, K., Zhao, T., Song, X., Li, X., Ye, F., & Yan, W. (2017). Understanding
Smartphone Sensor and App Data for Enhancing the Security of Secret
Questions. IEEE Transactions on Mobile Computing, 16(2), 552-565.
Zhao, P., Bian, K., Zhao, T., Song, X., Li, X., Ye, F., & Yan, W. (2017). Understanding
Smartphone Sensor and App Data for Enhancing the Security of Secret
Questions. IEEE Transactions on Mobile Computing, 16(2), 552-565.
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.