In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and...In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.展开更多
The aim of this population study was to identify personality traits among older (>65 years) male and female owners of cats and dogs and to compare their general health status in relation to their personality. Furth...The aim of this population study was to identify personality traits among older (>65 years) male and female owners of cats and dogs and to compare their general health status in relation to their personality. Further, the aim was to examine whether current cat and dog ownership could be predicted by the owners’ personality and health. Data were collected from the North-Trøndelag Health Study (HUNT) in Norway. Included were a total of 1897 cat or dog owners between the ages of 65 years and 101 years. The results showed that there were a higher proportion of introverted male cat owners than extraverted ones. Moreover, a majority of women with cats reported that their health was not good. Furthermore, female cat owners who displayed higher scores on neurotic traits experienced significantly poorer health compared to those female cat owners that experienced good health. The same was true for female cat owners who considered themselves to be introverted. Neither personality nor health could predict pet-ownership, but it was more likely for older individuals (80-101 years) to own a cat than a dog. This study has shown that human personality is associated with cat and dog ownership, but there are other factors connected with pet ownership as well.展开更多
Security is a value contained in most theories of personal values.Yet,while the relations among the most basic values are clear and reliable,the role of security in the system of values remains ambiguous.People strivi...Security is a value contained in most theories of personal values.Yet,while the relations among the most basic values are clear and reliable,the role of security in the system of values remains ambiguous.People striving for security are often also striving for tradition and conformity but sometimes they are focusing more on other values(such as health values,for example).Based on eight representative surveys(N=24,000)in several German cities between 1998 and 2022,the author shows that when measuring security without suggesting a particular meaning of this notion,security takes a relatively central position within the system of values and their components(shown by multidimensional scaling,MDS).People striving for security also emphasize the importance of law and order,working hard,and having a good family life as guiding principles in their lives.Conformity is not that important for them,and having an exciting life is even negatively correlated.Age has little impact on the MDS structure of values and their components,even though people exhibit substantial changes in the relative weights they assign to many values as they get older.展开更多
Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try...Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country.展开更多
In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become ...In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency.展开更多
Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reducti...Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents.展开更多
The speech recognition technology has been increasingly common in our lives.Recently,a number of commercial smart speakers containing the personal assistant system using speech recognition came out.While the smart spe...The speech recognition technology has been increasingly common in our lives.Recently,a number of commercial smart speakers containing the personal assistant system using speech recognition came out.While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants,but there have been little mentions of the smart speakers in security aspects.As the smart speakers are becoming the hub for home automation,its security vulnerabilities can cause critical problems.In this paper,we categorize attack vectors and classify them into hardware-based,network-based,and software-based.With the attack vectors,we describe the detail attack scenarios and show the result of tests on several commercial smart speakers.In addition,we suggest guidelines to mitigate various attacks against smart speaker ecosystem.展开更多
The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, b...The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our proposed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.展开更多
The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patie...The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’repositories located in the cloud.The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency,scalability and bandwidth.Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers.Assuming a massive demand of PHR data within a ubiquitous smart city,we propose a secure and fog assisted framework for PHR systems to address security,access control and privacy concerns.Built under a fog-based architecture,the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption(CP-ABE)to guarantee confidentiality and fine-grained access control within the system respectively.We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy.We provide the analysis of the proposed framework in terms of security and performance.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel...The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.展开更多
文摘In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.
文摘The aim of this population study was to identify personality traits among older (>65 years) male and female owners of cats and dogs and to compare their general health status in relation to their personality. Further, the aim was to examine whether current cat and dog ownership could be predicted by the owners’ personality and health. Data were collected from the North-Trøndelag Health Study (HUNT) in Norway. Included were a total of 1897 cat or dog owners between the ages of 65 years and 101 years. The results showed that there were a higher proportion of introverted male cat owners than extraverted ones. Moreover, a majority of women with cats reported that their health was not good. Furthermore, female cat owners who displayed higher scores on neurotic traits experienced significantly poorer health compared to those female cat owners that experienced good health. The same was true for female cat owners who considered themselves to be introverted. Neither personality nor health could predict pet-ownership, but it was more likely for older individuals (80-101 years) to own a cat than a dog. This study has shown that human personality is associated with cat and dog ownership, but there are other factors connected with pet ownership as well.
文摘Security is a value contained in most theories of personal values.Yet,while the relations among the most basic values are clear and reliable,the role of security in the system of values remains ambiguous.People striving for security are often also striving for tradition and conformity but sometimes they are focusing more on other values(such as health values,for example).Based on eight representative surveys(N=24,000)in several German cities between 1998 and 2022,the author shows that when measuring security without suggesting a particular meaning of this notion,security takes a relatively central position within the system of values and their components(shown by multidimensional scaling,MDS).People striving for security also emphasize the importance of law and order,working hard,and having a good family life as guiding principles in their lives.Conformity is not that important for them,and having an exciting life is even negatively correlated.Age has little impact on the MDS structure of values and their components,even though people exhibit substantial changes in the relative weights they assign to many values as they get older.
文摘Personal security is an im- portant human right. There would be no human rights to talk about if personalsecurity, including personal safety, were not safeguarded. So long as a person is in the person's own coun- try, there will always be a measure of legal safeguard for the person's interests and personal security, ff the person has his or her rights infringed upon when the person is outside the country, there will be more than one province of judicial jurisdiction over the case, and the subsequent legal remedies for the person, if any, in most cases will not be so timely and easily available as provided under the domestic laws of the person's own country.
基金supported by the National Natural Science Foundation of China (Grant No.61472097)the Specialized Research Fund for the Doctoral Program of Higher Education(Grant No.20132304110017)+1 种基金the Natural Science Foundation of Heilongjiang Province of China (Grant No.F2015022)the Fujian Provincial Key Laboratory of Network Security and Cryptology Research Fund (Fujian Normal University) (No.15003)
文摘In cyberspace security,the privacy in location-based services(LBSs) becomes more critical. In previous solutions,a trusted third party(TTP) was usually employed to provide disturbance or obfuscation,but it may become the single point of failure or service bottleneck. In order to cope with this drawback,we focus on another important class,establishing anonymous group through short-range communication to achieve k-anonymity with collaborative users. Along with the analysis of existing algorithms,we found users in the group must share the same maximum anonymity degree,and they could not ease the process of preservation in a lower one. To cope with this problem,we proposed a random-QBE algorithm to put up with personalized anonymity in user collaboration algorithms,and this algorithm could preserve both query privacy and location privacy. Then we studied the attacks from passive and active adversaries and used entropy to measure user's privacy level. Finally,experimental evaluations further verify its effectiveness and efficiency.
文摘Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents.
基金This work was supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.2019-0-00231,Development of artificial intelligence based video security technology and systems for public infrastructure safety)。
文摘The speech recognition technology has been increasingly common in our lives.Recently,a number of commercial smart speakers containing the personal assistant system using speech recognition came out.While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants,but there have been little mentions of the smart speakers in security aspects.As the smart speakers are becoming the hub for home automation,its security vulnerabilities can cause critical problems.In this paper,we categorize attack vectors and classify them into hardware-based,network-based,and software-based.With the attack vectors,we describe the detail attack scenarios and show the result of tests on several commercial smart speakers.In addition,we suggest guidelines to mitigate various attacks against smart speaker ecosystem.
文摘The challenge of achieving situational understanding is a limiting factor in effective, timely, and adaptive cyber-security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, we propose a cyber security data warehouse implemented as a hierarchical graph of aggregations that captures anomalies at multiple scales. Each node of our proposed graph is a summarization table of cyber event aggregations, and the edges are aggregation operators. The cyber security data warehouse enables domain experts to quickly traverse a multi-scale aggregation space systematically. We describe the architecture of a test bed system and a summary of results on the IEEE VAST 2012 Cyber Forensics data.
基金the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs:Chair of Pervasive and Mobile Computing.
文摘The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions’repositories located in the cloud.The cloud computing paradigm cannot meet such a massive transformative healthcare systems due to drawbacks including network latency,scalability and bandwidth.Fog computing relieves the load of conventional cloud computing by availing intermediate fog nodes between the end users and the remote servers.Assuming a massive demand of PHR data within a ubiquitous smart city,we propose a secure and fog assisted framework for PHR systems to address security,access control and privacy concerns.Built under a fog-based architecture,the proposed framework makes use of efficient key exchange protocol coupled with ciphertext attribute based encryption(CP-ABE)to guarantee confidentiality and fine-grained access control within the system respectively.We also make use of digital signature combined with CP-ABE to ensure the system authentication and users privacy.We provide the analysis of the proposed framework in terms of security and performance.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
文摘The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security.