Security and Privacy in Intelligence Assistance: A Literature Review
VerifiedAdded on 2024/05/30
|21
|3581
|105
AI Summary
This literature review explores the complex relationship between security and privacy in the context of intelligence assistance. It examines the advantages and disadvantages of advanced security systems, analyzing their impact on individual privacy. The review delves into the ethical considerations surrounding surveillance technologies and data collection, highlighting the need for a balanced approach that safeguards both national security and individual rights. Through a critical analysis of relevant research, the review provides insights into the challenges and opportunities presented by the evolving landscape of intelligence assistance.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NIT6130 INTRODUCTION TO RESEARCH
ASSIGNMENT 2 – LITERATURE REVIEW
by
Student ID:
ASSIGNMENT 2 – LITERATURE REVIEW
by
Student ID:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
Table of Contents...............................................................................................................................ii
List of Figures...................................................................................................................................iii
List of Tables....................................................................................................................................iv
1.1 Broad Scan...............................................................................................................................1
1.1.1 Research Journal................................................................................................................1
1.1.2 Filing System.....................................................................................................................3
1.1.3 Bibliographic file from broad scan....................................................................................4
1.2 Focused Review.......................................................................................................................6
1.2.1 Updated filing system........................................................................................................7
1.2.2 Updated bibliographic file from focused review................................................................8
1.3 Security and Privacy in Intelligence Assistance.......................................................................9
1.3.1 Problem Definition..........................................................................................................10
1.3.2 Framework and Method...................................................................................................10
1.3.3 Overview of the Proposed System...................................................................................12
1.3.4 Discussion.......................................................................................................................13
1.4 Approach on Security and Privacy in Intelligence Assistance................................................14
1.4.1 What is Cyber Security?..................................................................................................14
1.4.2 Experiments.....................................................................................................................14
1.4.3 Results.............................................................................................................................15
1.4.4 Discussion.......................................................................................................................15
1.5 Final Outline of the Literature review Chapter.......................................................................16
1.6 Introduction............................................................................................................................17
List of References............................................................................................................................18
ii
Table of Contents...............................................................................................................................ii
List of Figures...................................................................................................................................iii
List of Tables....................................................................................................................................iv
1.1 Broad Scan...............................................................................................................................1
1.1.1 Research Journal................................................................................................................1
1.1.2 Filing System.....................................................................................................................3
1.1.3 Bibliographic file from broad scan....................................................................................4
1.2 Focused Review.......................................................................................................................6
1.2.1 Updated filing system........................................................................................................7
1.2.2 Updated bibliographic file from focused review................................................................8
1.3 Security and Privacy in Intelligence Assistance.......................................................................9
1.3.1 Problem Definition..........................................................................................................10
1.3.2 Framework and Method...................................................................................................10
1.3.3 Overview of the Proposed System...................................................................................12
1.3.4 Discussion.......................................................................................................................13
1.4 Approach on Security and Privacy in Intelligence Assistance................................................14
1.4.1 What is Cyber Security?..................................................................................................14
1.4.2 Experiments.....................................................................................................................14
1.4.3 Results.............................................................................................................................15
1.4.4 Discussion.......................................................................................................................15
1.5 Final Outline of the Literature review Chapter.......................................................................16
1.6 Introduction............................................................................................................................17
List of References............................................................................................................................18
ii
List of Figures
Figure 1: Storyboard illustrating benefits of using technology..........................................................................11
Figure 2: A bar graph of the mean of using advanced technologies. Error bars represent a 95% confidence
interval................................................................................................................................................................12
iii
Figure 1: Storyboard illustrating benefits of using technology..........................................................................11
Figure 2: A bar graph of the mean of using advanced technologies. Error bars represent a 95% confidence
interval................................................................................................................................................................12
iii
List of Tables
Table 2: Research Journal Tasks...........................................................................................................................1
Table 3: Table of filing system..............................................................................................................................3
Table 4: Updated filing system.............................................................................................................................7
Table 5: Demographic Information of participants............................................................................................11
Table 6: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and responses for using
advanced technologies for data storage on a scale from 1(low) to(high).........................................................13
Table 7: Classification of Examples of perosn....................................................................................................14
iv
Table 2: Research Journal Tasks...........................................................................................................................1
Table 3: Table of filing system..............................................................................................................................3
Table 4: Updated filing system.............................................................................................................................7
Table 5: Demographic Information of participants............................................................................................11
Table 6: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and responses for using
advanced technologies for data storage on a scale from 1(low) to(high).........................................................13
Table 7: Classification of Examples of perosn....................................................................................................14
iv
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Literature Review
This research is about “Security and Privacy in Intelligence Assistance” and in order to
analyse the advantages and disadvantages, the journals of different authors were selected
and their views and opinion has been discussed. The story-board approach has been used
for providing the information to the patients and their answers are recorded and analysed
Hermann, et. al. (2016). In the second paper, the ways in which the security can be
breached of the various advanced devices has been discussed along with explaining their
vulnerabilities.
1.1 Broad Scan
In Broad scan, the topic “Security and Privacy in Intelligence Assistance” was searched
on the internet with appropriate keywords. The sources that were used to collect the
information are IEEE, VU library, and IEEE. After analysing various journals, fourteen
of them have been selected for further research.
1.1.1 Research Journal
Table 1: Research Journal Tasks
Date Task Action Comment
01/03 Searched for the
topic
Few topics were
selected
A topic was selected
for research
03/03 Searching the topic
on Google Scholar
Saved the required
materials after
studying them
Saved the required
information in
appropriate folders.
05/03 Literature reading Four journals were
studied from the
A suitable topic for
further research was
1
This research is about “Security and Privacy in Intelligence Assistance” and in order to
analyse the advantages and disadvantages, the journals of different authors were selected
and their views and opinion has been discussed. The story-board approach has been used
for providing the information to the patients and their answers are recorded and analysed
Hermann, et. al. (2016). In the second paper, the ways in which the security can be
breached of the various advanced devices has been discussed along with explaining their
vulnerabilities.
1.1 Broad Scan
In Broad scan, the topic “Security and Privacy in Intelligence Assistance” was searched
on the internet with appropriate keywords. The sources that were used to collect the
information are IEEE, VU library, and IEEE. After analysing various journals, fourteen
of them have been selected for further research.
1.1.1 Research Journal
Table 1: Research Journal Tasks
Date Task Action Comment
01/03 Searched for the
topic
Few topics were
selected
A topic was selected
for research
03/03 Searching the topic
on Google Scholar
Saved the required
materials after
studying them
Saved the required
information in
appropriate folders.
05/03 Literature reading Four journals were
studied from the
A suitable topic for
further research was
1
saved data identified
07/03 Literature reading Studied two more
papers
Removed those
information which
were not required
09/03 Selected final 4
journals for research
Studied each journal Selected four
journals for review
12/03 Commenced
preparation of the
assignment
Started the research
with bibliography
and citations
Inserted citations of
the selected journals
15/03 Started reviewing
first paper
In-detail review of
the contents
Remarks were
added in the
literature review
17/03 Read the paper The relevant
concepts and
theories were noted
down
Wrote important
concepts
19/03 Reviewed second
paper
Read all the papers Important journals
were identified
25/03 Started writing the
research
Two papers were
written
The mandatory
fields were filled
and prepared the
assignment
2
07/03 Literature reading Studied two more
papers
Removed those
information which
were not required
09/03 Selected final 4
journals for research
Studied each journal Selected four
journals for review
12/03 Commenced
preparation of the
assignment
Started the research
with bibliography
and citations
Inserted citations of
the selected journals
15/03 Started reviewing
first paper
In-detail review of
the contents
Remarks were
added in the
literature review
17/03 Read the paper The relevant
concepts and
theories were noted
down
Wrote important
concepts
19/03 Reviewed second
paper
Read all the papers Important journals
were identified
25/03 Started writing the
research
Two papers were
written
The mandatory
fields were filled
and prepared the
assignment
2
1.1.2 Filing System
Table 2: Table of filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
780
346
5
6
VU Library Major security
issues of digital
assistants
234 4
IEEE Designing and
implementing cyber
security architecture
445 5
3
Table 2: Table of filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
780
346
5
6
VU Library Major security
issues of digital
assistants
234 4
IEEE Designing and
implementing cyber
security architecture
445 5
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1.1.3 Bibliographic file from broad scan
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
Beresford, A. R., Kübler, D., & Preibusch, S. (2012). Unwillingness to pay for
privacy: A field experiment. Economics Letters, Vol. 117, No. 1, pp. 25-27.
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013).
Communication security for smart grid distribution networks. IEEE
Communications Magazine, Vol. 51, No. 1, pp. 42-49.
Cavoukian, A. (2012). Privacy by design [leading edge]. IEEE Technology and
Society Magazine, Vol. 31, No.4, pp. 18-19.
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath,
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues
in cloud computing. In Computer Science and Electronics Engineering (ICCSEE),
2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Cheyer, A. and Guzzoni, D., Apple Inc. (2014). Method and apparatus for
building an intelligent automated assistant. U.S. Patent 8, pp. 677,377.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
4
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
Beresford, A. R., Kübler, D., & Preibusch, S. (2012). Unwillingness to pay for
privacy: A field experiment. Economics Letters, Vol. 117, No. 1, pp. 25-27.
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013).
Communication security for smart grid distribution networks. IEEE
Communications Magazine, Vol. 51, No. 1, pp. 42-49.
Cavoukian, A. (2012). Privacy by design [leading edge]. IEEE Technology and
Society Magazine, Vol. 31, No.4, pp. 18-19.
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath,
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues
in cloud computing. In Computer Science and Electronics Engineering (ICCSEE),
2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Cheyer, A. and Guzzoni, D., Apple Inc. (2014). Method and apparatus for
building an intelligent automated assistant. U.S. Patent 8, pp. 677,377.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
4
Goztepe, K. (2012). Designing fuzzy rule based expert system for cyber
security. International Journal of Information Security Science, Vol. 1, No. 1, pp.
13-19.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Koops, B. J., & Leenes, R. (2014). Privacy regulation cannot be hardcoded. A
critical comment on the ‘privacy by design’provision in data-protection
law. International Review of Law, Computers & Technology, Vol. 28, No. 2, pp.
159-171.
Mehanna, L., Hasan, S., Vandermolen, H., & Campbell, G. (2015). U.S. Patent
No. 9,075,867. Washington, DC: U.S. Patent and Trademark Office.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Patti, J.G. and Lamberg, M., ONYX PRIVACY Inc, (2014). Data storage
incorporating cryptographically enhanced data protection. U.S. Patent 8,856,530.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
5
security. International Journal of Information Security Science, Vol. 1, No. 1, pp.
13-19.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Koops, B. J., & Leenes, R. (2014). Privacy regulation cannot be hardcoded. A
critical comment on the ‘privacy by design’provision in data-protection
law. International Review of Law, Computers & Technology, Vol. 28, No. 2, pp.
159-171.
Mehanna, L., Hasan, S., Vandermolen, H., & Campbell, G. (2015). U.S. Patent
No. 9,075,867. Washington, DC: U.S. Patent and Trademark Office.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Patti, J.G. and Lamberg, M., ONYX PRIVACY Inc, (2014). Data storage
incorporating cryptographically enhanced data protection. U.S. Patent 8,856,530.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
5
Tzanou, M. (2013). Data protection as a fundamental right next to
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
Xu, Y., Dong, Z. Y., Xu, Z., Meng, K., & Wong, K. P. (2012). An intelligent
dynamic security assessment framework for power systems with wind
power. IEEE Transactions on industrial informatics, Vol. 8, No. 4, pp. 995-1003
1.2 Focused Review
Further research was conducted on the above topic and three papers were considered for
further analysis.
6
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
Xu, Y., Dong, Z. Y., Xu, Z., Meng, K., & Wong, K. P. (2012). An intelligent
dynamic security assessment framework for power systems with wind
power. IEEE Transactions on industrial informatics, Vol. 8, No. 4, pp. 995-1003
1.2 Focused Review
Further research was conducted on the above topic and three papers were considered for
further analysis.
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.2.1 Updated filing system
The following table enlists the updated filing system
Table 3: Updated filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
325
350
1
3
VU Library Major security
issues of digital
assistants
324 3
IEEE Designing and
implementing cyber
security architecture
204 3
1.2.2 Updated bibliographic file from focused review
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
7
The following table enlists the updated filing system
Table 3: Updated filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
325
350
1
3
VU Library Major security
issues of digital
assistants
324 3
IEEE Designing and
implementing cyber
security architecture
204 3
1.2.2 Updated bibliographic file from focused review
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
7
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath,
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
Tzanou, M. (2013). Data protection as a fundamental right next to
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
8
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
Tzanou, M. (2013). Data protection as a fundamental right next to
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
8
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
1.3 Security and Privacy in Intelligence Assistance
The advancement in technology has enabled the firms to develop an effective security
system and as per Hermann, et. al. (2016), the design and development of various
security devices has revolutionised the security systems. The use of these advanced
security systems have enhanced the level of security provided and the firms have been
able to develop the strategies aiming at securing the valuable data. With the increasing
cases of cyber-attacks and data theft, it becomes necessary for the firms to respond to
these threats. This has resulted in various companies sponsoring the experts for finding
the ways to develop new methods of securing the data.
1.3.1 Problem Definition
The present situation related to the security threats have been questioned since regular
surveillance, and reconnaissance are in conflict with the privacy of the individual. The
security systems breach the privacy protocol and which has forced the experts to re-
consider designing the whole security apparatus. The current issue which is being faced is
that policymakers have to consider the interests of the individuals as well as the case
related to national security. The research has been conducted after analysing the
responses from the different groups of people and group-based tailoring method has been
used for arriving at accurate conclusion. This research has been conducted by analysing
factors such as surveillance, level of privacy, amount of information collected, and
breach of privacy.
9
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
1.3 Security and Privacy in Intelligence Assistance
The advancement in technology has enabled the firms to develop an effective security
system and as per Hermann, et. al. (2016), the design and development of various
security devices has revolutionised the security systems. The use of these advanced
security systems have enhanced the level of security provided and the firms have been
able to develop the strategies aiming at securing the valuable data. With the increasing
cases of cyber-attacks and data theft, it becomes necessary for the firms to respond to
these threats. This has resulted in various companies sponsoring the experts for finding
the ways to develop new methods of securing the data.
1.3.1 Problem Definition
The present situation related to the security threats have been questioned since regular
surveillance, and reconnaissance are in conflict with the privacy of the individual. The
security systems breach the privacy protocol and which has forced the experts to re-
consider designing the whole security apparatus. The current issue which is being faced is
that policymakers have to consider the interests of the individuals as well as the case
related to national security. The research has been conducted after analysing the
responses from the different groups of people and group-based tailoring method has been
used for arriving at accurate conclusion. This research has been conducted by analysing
factors such as surveillance, level of privacy, amount of information collected, and
breach of privacy.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1.3.2 Framework and Method
This research was completed by designing a storyboard as there will be no bias in the
judgement and actual results are obtained. The concept of using a storyboard is it allows
people to understand the message clearly and they can easily judge the merits and
demerits of using security systems and the level of breach of privacy. This enables to take
the appropriate answers from them which make the research more accurate and
appropriate conclusion can be drawn.
The answers provided by the participants were analysed by using the scale 1 to 5,
wherein 1 indicates strongly disagree and 5 strongly disagree.
Figure 1: Storyboard illustrating benefits of using technology
The preferred method for collecting the information was AMT (Amazon’s Mechanical
Turk).
10
This research was completed by designing a storyboard as there will be no bias in the
judgement and actual results are obtained. The concept of using a storyboard is it allows
people to understand the message clearly and they can easily judge the merits and
demerits of using security systems and the level of breach of privacy. This enables to take
the appropriate answers from them which make the research more accurate and
appropriate conclusion can be drawn.
The answers provided by the participants were analysed by using the scale 1 to 5,
wherein 1 indicates strongly disagree and 5 strongly disagree.
Figure 1: Storyboard illustrating benefits of using technology
The preferred method for collecting the information was AMT (Amazon’s Mechanical
Turk).
10
Table 4: Demographic Information of participants
Gender Male participants (694, 56%), Male (463, 44%)
Age Age 20-29 (142, 13%), 30-55 (764, 53%), Over 55 (251, 34%)
Education Under-Graduates (306, 19%), graduates (661, 53%), Post-
graduates (190, 28%)
1.3.3 Overview of the Proposed System
The results were analysed based on the responses of the participants, also, it was ensured
that the participants respond to every question. However, they were not forced to respond
against their wish and respected their views. The chi-squared test has been utilised for
analysing the responses and the corresponding results were indicated by p<1000. Also,
Cronbach's alpha (α) has been used to maintain the consistency of the data and EFA has
been used for maintaining the uniqueness of the collected data.
11
Gender Male participants (694, 56%), Male (463, 44%)
Age Age 20-29 (142, 13%), 30-55 (764, 53%), Over 55 (251, 34%)
Education Under-Graduates (306, 19%), graduates (661, 53%), Post-
graduates (190, 28%)
1.3.3 Overview of the Proposed System
The results were analysed based on the responses of the participants, also, it was ensured
that the participants respond to every question. However, they were not forced to respond
against their wish and respected their views. The chi-squared test has been utilised for
analysing the responses and the corresponding results were indicated by p<1000. Also,
Cronbach's alpha (α) has been used to maintain the consistency of the data and EFA has
been used for maintaining the uniqueness of the collected data.
11
Figure 2: A bar graph of the mean of using advanced technologies. Error bars represent a
95% confidence interval.
Table 5: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and
responses for using advanced technologies for data storage on a scale from 1(low)
to(high)
1.3.4 Discussion
The purpose of this research is to ascertain the advantages and disadvantages of security
devices for surveillance for enhancing the security. Although using advanced devices for
the security enables to counter the threats, the privacy of the individual is also breached
and this can be analysed by the response provided by the participants. Hence, it becomes
difficult for the firms and policymakers to safeguard the interests of the individual as well
as counter the threats related to espionage and data encryption.
12
95% confidence interval.
Table 5: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and
responses for using advanced technologies for data storage on a scale from 1(low)
to(high)
1.3.4 Discussion
The purpose of this research is to ascertain the advantages and disadvantages of security
devices for surveillance for enhancing the security. Although using advanced devices for
the security enables to counter the threats, the privacy of the individual is also breached
and this can be analysed by the response provided by the participants. Hence, it becomes
difficult for the firms and policymakers to safeguard the interests of the individual as well
as counter the threats related to espionage and data encryption.
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.4 Approach on Security and Privacy in Intelligence Assistance
Another solution that has been proposed for security and privacy has been provided by
(Xu, et. al., 2014). As per the authors, the increasing data theft and data breach has
resulted in taking precautionary measures and they are being over-cautious and hence, the
present legislation should be modified and the security measures have to be placed so that
criminals can be caught and peace can be maintained. This research explains about
various application, techniques, and functions of various security devices.
1.4.1 What is Cyber Security?
The use of internet has resolved many issues faced during the past decades and sharing
the information has become even more easier and faster. The concept of digitisation has
enabled the firms to use advanced software for undertaking various activities. The human
effort is reduced and the efficiency of performing tasks has increased. However, the issue
of privacy has become more prominent since the data stored in the server can be hacked
and the individual may lose the valuable information stored. In order to avoid the data
being misused, various surveillance methods are used to track the offenders and these
results in breaching the privacy of the individuals.
1.4.2 Experiments
Table 6: Classification of Examples of person
Security systems Type of Technology Level of
vulnerability
Functions
ICSA Artificial Intelligence Low Advanced Machine
learning
Enterprise Security
Cyber Security
13
Another solution that has been proposed for security and privacy has been provided by
(Xu, et. al., 2014). As per the authors, the increasing data theft and data breach has
resulted in taking precautionary measures and they are being over-cautious and hence, the
present legislation should be modified and the security measures have to be placed so that
criminals can be caught and peace can be maintained. This research explains about
various application, techniques, and functions of various security devices.
1.4.1 What is Cyber Security?
The use of internet has resolved many issues faced during the past decades and sharing
the information has become even more easier and faster. The concept of digitisation has
enabled the firms to use advanced software for undertaking various activities. The human
effort is reduced and the efficiency of performing tasks has increased. However, the issue
of privacy has become more prominent since the data stored in the server can be hacked
and the individual may lose the valuable information stored. In order to avoid the data
being misused, various surveillance methods are used to track the offenders and these
results in breaching the privacy of the individuals.
1.4.2 Experiments
Table 6: Classification of Examples of person
Security systems Type of Technology Level of
vulnerability
Functions
ICSA Artificial Intelligence Low Advanced Machine
learning
Enterprise Security
Cyber Security
13
Operations
Digital Assistants
such as Amazon Echo
Artificial Intelligence
Voice command
operated devices
Medium Voice Interaction
Data Storage
Cortana Windows High Voice Interaction
Data Storage
Google Now Android High Mobile devices
Data storage
Voice interaction
1.4.3 Results
The above data indicates that the vulnerability of breaching the security of the personal
assistance devices is relatively higher as the hackers may decode the information whereas
ICSA (Intelligent Cyber Security Assistant) provides a comprehensive solution for the
issues related to cyber-attacks and data breach which enables to protect the personal
information.
1.4.4 Discussion
The use of technology has enabled to provide the solutions for the various issues but it
has also created an opportunity to breach the privacy of the individual. The continuous
surveillance of an individual demoralises the society and hence, various methods are used
for safeguarding the interests of the society. There are various legislations which promote
privacy of a person; however, there are other laws which make the person accountable for
various actions. In order to protect from these instances, advanced methods are used for
safeguarding the information. There are various ways in which the data can be stored and
the users have to identify the best ways of safeguarding their interests.
14
Digital Assistants
such as Amazon Echo
Artificial Intelligence
Voice command
operated devices
Medium Voice Interaction
Data Storage
Cortana Windows High Voice Interaction
Data Storage
Google Now Android High Mobile devices
Data storage
Voice interaction
1.4.3 Results
The above data indicates that the vulnerability of breaching the security of the personal
assistance devices is relatively higher as the hackers may decode the information whereas
ICSA (Intelligent Cyber Security Assistant) provides a comprehensive solution for the
issues related to cyber-attacks and data breach which enables to protect the personal
information.
1.4.4 Discussion
The use of technology has enabled to provide the solutions for the various issues but it
has also created an opportunity to breach the privacy of the individual. The continuous
surveillance of an individual demoralises the society and hence, various methods are used
for safeguarding the interests of the society. There are various legislations which promote
privacy of a person; however, there are other laws which make the person accountable for
various actions. In order to protect from these instances, advanced methods are used for
safeguarding the information. There are various ways in which the data can be stored and
the users have to identify the best ways of safeguarding their interests.
14
1.5 Final Outline of the Literature review Chapter
1. Introduction
2. Selected Paper1
2.1
2.2
3. Selected Paper2
3.1
3.2
4. Put other papers to be reviewed here even though they have not been reviewed above
(optional)
5. Discussion
6. Conclusion
15
1. Introduction
2. Selected Paper1
2.1
2.2
3. Selected Paper2
3.1
3.2
4. Put other papers to be reviewed here even though they have not been reviewed above
(optional)
5. Discussion
6. Conclusion
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
1.6 Introduction
The topic that has been selected for the research is the security and privacy in intelligence
assistance. This research has been completed by using appropriate journals which
provides valuable insight as to the security and privacy of an individual. The various
devices which are being used for storing data and their vulnerabilities have been
discussed and the research analyses the demerits of using technology in everyday life.
The graphs and tables have been used for analysing the results which have been obtained
and the views and opinion of the authors have been discussed. The research has been
concluded by analysing the results obtained from the interviews conducted as well as by
using suitable techniques.
16
The topic that has been selected for the research is the security and privacy in intelligence
assistance. This research has been completed by using appropriate journals which
provides valuable insight as to the security and privacy of an individual. The various
devices which are being used for storing data and their vulnerabilities have been
discussed and the research analyses the demerits of using technology in everyday life.
The graphs and tables have been used for analysing the results which have been obtained
and the views and opinion of the authors have been discussed. The research has been
concluded by analysing the results obtained from the interviews conducted as well as by
using suitable techniques.
16
List of References
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
17
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
17
1 out of 21
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.