NIT6130 Literature Review: Security & Privacy in Intelligence Aid

Verified

Added on  2024/05/30

|21
|3581
|105
Literature Review
AI Summary
This literature review focuses on security and privacy in intelligent assistance, analyzing various research journals to understand the advantages and disadvantages of current systems. It begins with a broad scan of relevant literature from sources like IEEE and VU Library, narrowing down to a focused review of key papers. The review discusses the challenges of balancing security with individual privacy, particularly concerning surveillance and data collection. A storyboard approach was used to gather unbiased responses from participants regarding their perceptions of security systems and privacy breaches. The research incorporates methods like chi-squared tests and Cronbach's alpha to analyze data and ensure reliability. The review concludes by outlining the structure of the literature review chapter, highlighting the increasing importance of robust security measures in the face of cyber-attacks and data theft.
Document Page
NIT6130 INTRODUCTION TO RESEARCH
ASSIGNMENT 2 – LITERATURE REVIEW
by
Student ID:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Table of Contents...............................................................................................................................ii
List of Figures...................................................................................................................................iii
List of Tables....................................................................................................................................iv
1.1 Broad Scan...............................................................................................................................1
1.1.1 Research Journal................................................................................................................1
1.1.2 Filing System.....................................................................................................................3
1.1.3 Bibliographic file from broad scan....................................................................................4
1.2 Focused Review.......................................................................................................................6
1.2.1 Updated filing system........................................................................................................7
1.2.2 Updated bibliographic file from focused review................................................................8
1.3 Security and Privacy in Intelligence Assistance.......................................................................9
1.3.1 Problem Definition..........................................................................................................10
1.3.2 Framework and Method...................................................................................................10
1.3.3 Overview of the Proposed System...................................................................................12
1.3.4 Discussion.......................................................................................................................13
1.4 Approach on Security and Privacy in Intelligence Assistance................................................14
1.4.1 What is Cyber Security?..................................................................................................14
1.4.2 Experiments.....................................................................................................................14
1.4.3 Results.............................................................................................................................15
1.4.4 Discussion.......................................................................................................................15
1.5 Final Outline of the Literature review Chapter.......................................................................16
1.6 Introduction............................................................................................................................17
List of References............................................................................................................................18
ii
Document Page
List of Figures
Figure 1: Storyboard illustrating benefits of using technology..........................................................................11
Figure 2: A bar graph of the mean of using advanced technologies. Error bars represent a 95% confidence
interval................................................................................................................................................................12
iii
Document Page
List of Tables
Table 2: Research Journal Tasks...........................................................................................................................1
Table 3: Table of filing system..............................................................................................................................3
Table 4: Updated filing system.............................................................................................................................7
Table 5: Demographic Information of participants............................................................................................11
Table 6: Mean and Standard Deviations (SD), Mean Difference (MD), t-values(t2), and responses for using
advanced technologies for data storage on a scale from 1(low) to(high).........................................................13
Table 7: Classification of Examples of perosn....................................................................................................14
iv
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Literature Review
This research is about “Security and Privacy in Intelligence Assistance” and in order to
analyse the advantages and disadvantages, the journals of different authors were selected
and their views and opinion has been discussed. The story-board approach has been used
for providing the information to the patients and their answers are recorded and analysed
Hermann, et. al. (2016). In the second paper, the ways in which the security can be
breached of the various advanced devices has been discussed along with explaining their
vulnerabilities.
1.1 Broad Scan
In Broad scan, the topic “Security and Privacy in Intelligence Assistance” was searched
on the internet with appropriate keywords. The sources that were used to collect the
information are IEEE, VU library, and IEEE. After analysing various journals, fourteen
of them have been selected for further research.
1.1.1 Research Journal
Table 1: Research Journal Tasks
Date Task Action Comment
01/03 Searched for the
topic
Few topics were
selected
A topic was selected
for research
03/03 Searching the topic
on Google Scholar
Saved the required
materials after
studying them
Saved the required
information in
appropriate folders.
05/03 Literature reading Four journals were
studied from the
A suitable topic for
further research was
1
Document Page
saved data identified
07/03 Literature reading Studied two more
papers
Removed those
information which
were not required
09/03 Selected final 4
journals for research
Studied each journal Selected four
journals for review
12/03 Commenced
preparation of the
assignment
Started the research
with bibliography
and citations
Inserted citations of
the selected journals
15/03 Started reviewing
first paper
In-detail review of
the contents
Remarks were
added in the
literature review
17/03 Read the paper The relevant
concepts and
theories were noted
down
Wrote important
concepts
19/03 Reviewed second
paper
Read all the papers Important journals
were identified
25/03 Started writing the
research
Two papers were
written
The mandatory
fields were filled
and prepared the
assignment
2
Document Page
1.1.2 Filing System
Table 2: Table of filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
780
346
5
6
VU Library Major security
issues of digital
assistants
234 4
IEEE Designing and
implementing cyber
security architecture
445 5
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1.1.3 Bibliographic file from broad scan
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
Beresford, A. R., Kübler, D., & Preibusch, S. (2012). Unwillingness to pay for
privacy: A field experiment. Economics Letters, Vol. 117, No. 1, pp. 25-27.
Bou-Harb, E., Fachkha, C., Pourzandi, M., Debbabi, M., & Assi, C. (2013).
Communication security for smart grid distribution networks. IEEE
Communications Magazine, Vol. 51, No. 1, pp. 42-49.
Cavoukian, A. (2012). Privacy by design [leading edge]. IEEE Technology and
Society Magazine, Vol. 31, No.4, pp. 18-19.
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath,
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues
in cloud computing. In Computer Science and Electronics Engineering (ICCSEE),
2012 International Conference on (Vol. 1, pp. 647-651). IEEE.
Cheyer, A. and Guzzoni, D., Apple Inc. (2014). Method and apparatus for
building an intelligent automated assistant. U.S. Patent 8, pp. 677,377.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
4
Document Page
Goztepe, K. (2012). Designing fuzzy rule based expert system for cyber
security. International Journal of Information Security Science, Vol. 1, No. 1, pp.
13-19.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Koops, B. J., & Leenes, R. (2014). Privacy regulation cannot be hardcoded. A
critical comment on the ‘privacy by design’provision in data-protection
law. International Review of Law, Computers & Technology, Vol. 28, No. 2, pp.
159-171.
Mehanna, L., Hasan, S., Vandermolen, H., & Campbell, G. (2015). U.S. Patent
No. 9,075,867. Washington, DC: U.S. Patent and Trademark Office.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Patti, J.G. and Lamberg, M., ONYX PRIVACY Inc, (2014). Data storage
incorporating cryptographically enhanced data protection. U.S. Patent 8,856,530.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
5
Document Page
Tzanou, M. (2013). Data protection as a fundamental right next to
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in
big data: privacy and data mining. IEEE Access, Vol. 2, pp. 1149-1176.
Xu, Y., Dong, Z. Y., Xu, Z., Meng, K., & Wong, K. P. (2012). An intelligent
dynamic security assessment framework for power systems with wind
power. IEEE Transactions on industrial informatics, Vol. 8, No. 4, pp. 995-1003
1.2 Focused Review
Further research was conducted on the above topic and three papers were considered for
further analysis.
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1.2.1 Updated filing system
The following table enlists the updated filing system
Table 3: Updated filing system
Source Keyword use No of discarded
literature
No of selected
literature
Google Scholar Intelligent Security
Assistant
Privacy and data
protection
325
350
1
3
VU Library Major security
issues of digital
assistants
324 3
IEEE Designing and
implementing cyber
security architecture
204 3
1.2.2 Updated bibliographic file from focused review
Bennett, C. J. (2012). The accountability approach to privacy and data protection:
Assumptions and caveats. In Managing privacy through accountability (pp. 33-
48). Palgrave Macmillan, London.
7
Document Page
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath,
P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security
system using Arduino and Wi-fi. International Journal Of Engineering And
Computer Science, Vol. 6, No. 3
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L.,
Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from
policy to engineering. arXiv preprint arXiv:1501.03726.
Hermann, M., Pentek, T., & Otto, B. (2016, January). Design principles for
industrie 4.0 scenarios. In System Sciences (HICSS), 2016 49th Hawaii
International Conference on (pp. 3928-3937). IEEE.
Kokott, J., & Sobotta, C. (2013). The distinction between privacy and data
protection in the jurisprudence of the CJEU and the ECtHR. International Data
Privacy Law, Vol. 3, No. 4, pp. 222-228.
Pang, Z. H., & Liu, G. P. (2012). Design and implementation of secure networked
predictive control systems under deception attacks. IEEE Transactions on Control
Systems Technology, Vol. 20, No. 5, pp. 1334-1342.
Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and
privacy challenges in industrial internet of things. In Proceedings of the 52nd
annual design automation conference (p. 54). ACM.
Tzanou, M. (2013). Data protection as a fundamental right next to
privacy?‘Reconstructing’a not so new right. International Data Privacy Law, Vol.
3, No. 2, pp. 88-99.
Ward, M.L. and Spiegelberg, C.E., Location Sentry Corp (2014). Intelligent agent
for privacy and security. U.S. Patent Application 14/207,417.
8
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]