This research aims to measure the impact of frequent use of emails when creating account at the websites
on the privacy and security of the user (a survey study conducted on a sample of email users' views). The
sample, 200 people of the Jordanian society, includes employees of commercial and communication
companies, banks, university students, employees and faculty members as well as computer centers at
universities. All have emails and are able to use the computer and internet. A questionnaire has been
prepared for this purpose aims to measure the variables of the study. SPSS program was used to analyze
the results. The study revealed the existence of a statistical significant impact of frequent use of email
account when creating an account at the Internet sites on the security and privacy of the user. The study
concluded a number of conclusions and recommendations
Tochukwu Coleman is a Nigerian programmer and network manager currently working at Target Laboratories in Johannesburg, South Africa. He obtained a BSc in Computer Science from Midrand Graduate Institute in 2013 and a professional diploma in IT from NIIT Festac Town Lagos Nigeria in 2006. His duties at Target Laboratories include programming, database administration, designing online laboratory applications in VB.net, and networking and system repairs. He is proficient in programming languages such as Visual Basic.net, Oracle, MySQL, PHP, Java, HTML, and ASPX as well as office suites and server administration.
Intelligent access control policies for Social network siteijcsit
This document describes a proposed system for intelligent access control policies for social network sites. It aims to automatically construct access control rules for users' privacy settings with minimal effort from the user. The system extracts features from users' profiles and community structures. It then uses decision tree learning to classify users and predict their access to different data items. The resulting rules are stored in an access control ontology along with existing rules. This allows fine-grained access control policies to be defined and enforced based on relationships and information in the social network ontology.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
This document summarizes a research paper on detecting cyber bullying in web chat applications. The paper proposes developing a web application that can detect and censor abusive language used during employee chats. When employees chat or comment, the application would encrypt any bullying words rather than displaying them. It would include modules for admins to monitor employee tasks, meetings, statuses etc. and employee modules for chatting, contacting coworkers. The goal is to create a safer environment for online work communications by preventing cyber bullying between employees.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Sms base file search & automatic contact saving technique using gsm 38521EditorIJAERD
This document proposes and describes an SMS-based application that allows users to search for files on a remote desktop computer and receive them via email. It discusses existing file search systems and their limitations. The proposed system would allow a user to send an SMS with the file name, optional location, and their email address. The receiving desktop computer would then search for and email the requested file, while also updating the user's contact list. The system aims to provide a simple, cost-effective way to remotely access files without needing computer expertise or an internet connection on the requesting device.
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
Due to the increasingly online nature of business (e-commerce), it is essential to understand how end-users can be protected from malicious online activities such as malware. Several factors have been examined in the research on this topic. Digital native status was identified as a factor that has not been investigated thoroughly. This study examined how the security decision-making process is impacted by digital native status by looking at Protection Motivation Theory. Digital Native Status was investigated as a mediating factor in the PMT model. Intent to use antivirus was utilized as the protective measure. The findings indicate that digital native status does not mediate Fear. However, other factors, such as Fear, selfefficacy, and response efficacy, play a part in the intent to use antivirus. Conversely, the other constructs in the model, response-costs and maladaptive rewards, did not have a relationship with antivirus usage. Practically speaking, employers and eCommerce businesses could use these findings to identify factors that play into their end-user behaviors. These findings can be utilized to help guide training programs and professionals researching end-user behavior. These findings also suggest that future research should focus on factors other than age.
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
Tochukwu Coleman is a Nigerian programmer and network manager currently working at Target Laboratories in Johannesburg, South Africa. He obtained a BSc in Computer Science from Midrand Graduate Institute in 2013 and a professional diploma in IT from NIIT Festac Town Lagos Nigeria in 2006. His duties at Target Laboratories include programming, database administration, designing online laboratory applications in VB.net, and networking and system repairs. He is proficient in programming languages such as Visual Basic.net, Oracle, MySQL, PHP, Java, HTML, and ASPX as well as office suites and server administration.
Intelligent access control policies for Social network siteijcsit
This document describes a proposed system for intelligent access control policies for social network sites. It aims to automatically construct access control rules for users' privacy settings with minimal effort from the user. The system extracts features from users' profiles and community structures. It then uses decision tree learning to classify users and predict their access to different data items. The resulting rules are stored in an access control ontology along with existing rules. This allows fine-grained access control policies to be defined and enforced based on relationships and information in the social network ontology.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
This document summarizes a research paper on detecting cyber bullying in web chat applications. The paper proposes developing a web application that can detect and censor abusive language used during employee chats. When employees chat or comment, the application would encrypt any bullying words rather than displaying them. It would include modules for admins to monitor employee tasks, meetings, statuses etc. and employee modules for chatting, contacting coworkers. The goal is to create a safer environment for online work communications by preventing cyber bullying between employees.
Common protocol to support disparate communication types within industrial Et...Maurice Dawson
Owing to the increasing demand for reliable products built globally, and through the evolution of machine design, the need for improved and a common communications protocol in different geographical regions has intensified. In this paper, the goal is to reveal that the current protocols used to support disparate communication types in manufacturing have caused complexity in configurations and an increase in monetary overhead for industrial system designers and the end users. Through the simulation of an industrial network, the packet timing, and packet loss between peer-to-peer systems, similar protocol systems will be compared with two dissimilar protocols systems to establish the thesis. The internal validation research method used in this study will reveal the need for an all-inclusive protocol to eliminate the timing and packet loss issues, the systems’ configuration complexities, and the need to reduce the monetary overhead currently associated with the machine communications.
Sms base file search & automatic contact saving technique using gsm 38521EditorIJAERD
This document proposes and describes an SMS-based application that allows users to search for files on a remote desktop computer and receive them via email. It discusses existing file search systems and their limitations. The proposed system would allow a user to send an SMS with the file name, optional location, and their email address. The receiving desktop computer would then search for and email the requested file, while also updating the user's contact list. The system aims to provide a simple, cost-effective way to remotely access files without needing computer expertise or an internet connection on the requesting device.
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
Due to the increasingly online nature of business (e-commerce), it is essential to understand how end-users can be protected from malicious online activities such as malware. Several factors have been examined in the research on this topic. Digital native status was identified as a factor that has not been investigated thoroughly. This study examined how the security decision-making process is impacted by digital native status by looking at Protection Motivation Theory. Digital Native Status was investigated as a mediating factor in the PMT model. Intent to use antivirus was utilized as the protective measure. The findings indicate that digital native status does not mediate Fear. However, other factors, such as Fear, selfefficacy, and response efficacy, play a part in the intent to use antivirus. Conversely, the other constructs in the model, response-costs and maladaptive rewards, did not have a relationship with antivirus usage. Practically speaking, employers and eCommerce businesses could use these findings to identify factors that play into their end-user behaviors. These findings can be utilized to help guide training programs and professionals researching end-user behavior. These findings also suggest that future research should focus on factors other than age.
This document provides a brief survey of mobile forensics analysis on social networking applications. It discusses two popular social networking applications, Tagged and Hi5, and describes some of their key features that could be relevant to forensic investigations. Specifically, it outlines features like registration details, friend networks, media sharing, instant messaging, status updates, and other profile building features. The document suggests electronic evidence retrieved from activities on these social networking platforms could help investigate criminal cases by incriminating or proving the innocence of suspects.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
1) The document proposes a new encryption scheme called Order-Retrievable Encryption (ORE) to protect user location privacy in location-based social networks.
2) ORE allows users to share their exact locations with friends without leaking location information to outside parties. It also enables efficient location queries with low computational and communication costs.
3) An experimental evaluation shows that the proposed privacy-preserving location sharing system using ORE has much lower computational and communication overhead compared to existing solutions.
Introduction to Mail Management System IJERA Editor
Developing different techniques to overcome this problem and protect the consumer, which planted in the hearts
of trust people and encouraged them to purchase via the internet. At first you must know what is the main reason
for the work of the filtration email the mail service is fast and easy way to exchange messages are singing from
the use of traditional mail, there are a large number from of services in the internet requires that you have one
email sometimes one of us would like to cancel his participation in one of the sites because of the large number
of incoming messages to him from the site does not know and have for a way unsubscribe to get rid of these
messages, or would like one of us that some of the messages is prohibited from specific people or locations for
some of these problems has the following solution is the work of a filter to any e-mail and work ban for
unwanted messages application spam filtering as a last resort, you can set up your own spam blocker with your
email application's built-in filter capability Email filtering is the processing of email to organize it according to
specified criteria.
The architecture social media and online newspaper credibility measurement fo...TELKOMNIKA JOURNAL
This document proposes an architecture for detecting fake news on social media and online newspapers. It involves three main steps: 1) keyword extraction from user-input text, 2) news scoring to measure credibility of information from online news sources based on time, website and message credibility factors, and 3) social media scoring to further measure credibility from social media based on similar factors, if news scoring is insufficient. The goal is to produce a likelihood score of the information being fake news or fact. Previous related work on fake news detection using knowledge-based, context-based and style-based approaches is also discussed.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
We describe our experience gained while exploring practical security and privacy problems in a real-world, large- scale social network (i.e., Facebook), and summarize our conclu- sions in a series of “lessons learned”. We first conclude that it is better to adequately describe the potential ethical concerns from the very beginning and plan ahead the institutional review board (IRB) request. Even though sometimes optional, the IRB approval is a valuable point from the reviewer’s perspective. Another aspect that needs planning is getting in touch with the online social network security team, which takes a substantial amount of time. With their support, “bending the rules” (e.g., using scrapers) when the experimental goals require so, is easier. Clearly, in cases where critical technical vulnerabilities are found during the research, the general recommendations for responsible disclosure should be followed. Gaining the audience’s engagement and trust was essential to the success of our user study. Participants felt more comfortable when subscribing to our experiments, and also responsibly reported bugs and glitches. We did not observe the same behavior in crowd-sourcing workers, who were instead more interested in obtaining their rewards. On a related point, our experience suggests that crowd sourcing should not be used alone: Setting up tasks is more time consuming than it seems, and researchers must insert some sentinel checks to ensure that workers are not submitting random answers.
From a logistics point of view, we learned that having at least a high-level plan of the experiments pays back, especially when the IRB requires a detailed description of the work and the data to be collected. However, over planning can be dangerous because the measurement goals can change dynamically. From a technical point of view, partially connected to the logistics remarks, having a complex and large data-gathering and analysis framework may be counterproductive in terms of set-up and management overhead. From our experience we suggest to choose simple technologies that scale up if needed but, more importantly, can scale down. For example, launching a quick query should be straightforward, and the frameworks should not impose too much overhead for formulating it. We conclude with a series of practical recommendations on how to successfully collect data from online social networks (e.g., using techniques for network multi presence, mimicking user behavior, and other crawling “tricks”’) and avoid abusing the online service, while gathering the data required by the experiments.
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approachijma
The document proposes using a multi-agent system and ontology to extract useful information from large, unstructured datasets on the web. It discusses challenges with current information retrieval techniques, and how semantic web, ontologies, and multi-agent systems can help address these challenges by structuring data and allowing agents to cooperate. The proposed solution involves developing an ontology of the data domain, using this to build a structured dataset, and employing a multi-agent system using the JADE framework to analyze the dataset with data mining techniques to extract relevant information for users.
Live forensics of tools on android devices for email forensicsTELKOMNIKA JOURNAL
Email is one communication technology that can be used to exchange information, data, and etc. The development of email technology not only can be opened using a computer but can be opened using an smartphone. The most widely used smartphone in Indonesian society is Android. Within a row, the development technology of higher cybercrime such as email fraud catching cybercrime offenders need evidence to be submitted to a court, for obtain evidence can use tools like Wireshark and Networkminer to analyzing network traffic on live networks. Opportunity, we will do a comparison of the forensic tools it to acquire digital evidence. The subject of this research focused on Android-based email service to get as much digital evidence as possible on both tools. This process uses National Institute of Standards and Technology method. The results of this research that networkminer managed to get the receiving port, while in Wireshark not found.
This document discusses the key issues in computer ethics as they relate to pharmaceutical research. It outlines four main ethical issues: privacy, liability, ownership, and power. Regarding privacy, it discusses the right to medical privacy and risks of collecting too much individual data. On liability, it notes responsibility for software functioning properly. Ownership concerns resolving intellectual property rights. Power issues include centralization of control. The document also provides examples of codes of conduct from computing organizations that can provide guidelines to help address these ethical challenges.
It is reasonable for employers to monitor employee email for several reasons: they are responsible for any illegal or inappropriate content sent via company IT systems; it protects against malware, prevents non-work related use that lowers productivity, and guards confidential information and company assets. However, email monitoring can also create a climate of distrust and stress for employees by blurring boundaries between personal and private communication. While some private emails may contain unprofessional content, clear communication of monitoring policies and IT training on appropriate use can help prevent issues if monitoring is implemented reasonably.
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
This document discusses identifying clone attacks in social networking sites. It proposes a two-level approach using fuzzy-sim algorithm for profile matching and three algorithms (Predictive FP Growth, Eclat, and Apriori) for user activity matching. An experiment compares the execution times of the three algorithms, finding that Predictive FP Growth has the fastest time of 181 milliseconds, making it best for user activity matching.
College Collaboration Portal with Training and PlacementIOSR Journals
This document summarizes a student project to automate the training and placement activities at a college. The existing manual system is time-consuming and error-prone. The proposed system is a web application that will allow students to register and update profiles online, receive notifications by email, and help administrators select students for interviews based on company requirements. It aims to reduce manual work, provide statistics and improve communication between students, alumni and the training and placement cell.
Sarah Maximiek presents on using Google Voice for reference services at Binghamton University Libraries. The libraries serve a large student population across three campuses. Google Voice allows the libraries to provide a texting reference service through a single centralized phone number. Some benefits of Google Voice include its free cost, ability to transcribe voicemails to text, and having an online inbox to respond to texts. However, there are also some limitations, such as not having offline access and potential incompatibility with the university's Google Apps. In its initial soft launch, the libraries received 56 text messages, which was 1% of total reference transactions.
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...IJCNCJournal
The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack.
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
Literature survey on identity managementVaibhav Sathe
This document presents a literature survey on online identity management and its importance in e-commerce. The objectives are to identify various identity management methods, universal identity systems, and the importance of a user's online identity to both users and e-commerce companies. The survey covers papers on authentication and authorization infrastructure, password practices on popular websites, challenges with identity management on mobile devices, universal identity models like OpenID, and the benefits of consistent online identity for users and businesses. The document also evaluates and compares authentication methods used by various e-commerce and financial websites.
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
This document summarizes a research paper that examines the effect of individual differences and privacy concerns on consumers' perceptions of using information technology. It discusses how factors like self-esteem, alienation, computer anxiety, and privacy concerns around data collection and use can influence attitudes and intentions to use IT. The document reviews relevant literature on privacy concepts, comprehensive security programs for e-commerce, and a proposed research model examining the relationships between individual characteristics, privacy concerns, attitudes, and behavioral intentions.
The document discusses a proposed Wi-Fi network system for students at an organization. It identifies current problems with uneven access to the network and lack of security. The objectives of the new system are to allocate each student 1 hour of access per day, require ID number, username and password for login, streamline the connection process, and allow up to 40 students to connect simultaneously. The scope would be for students to access the network on their own devices for schoolwork within the allotted time limit. The system would be limited to the department and block certain sites while keeping records of usage.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
1) The document proposes a new encryption scheme called Order-Retrievable Encryption (ORE) to protect user location privacy in location-based social networks.
2) ORE allows users to share their exact locations with friends without leaking location information to outside parties. It also enables efficient location queries with low computational and communication costs.
3) An experimental evaluation shows that the proposed privacy-preserving location sharing system using ORE has much lower computational and communication overhead compared to existing solutions.
Introduction to Mail Management System IJERA Editor
Developing different techniques to overcome this problem and protect the consumer, which planted in the hearts
of trust people and encouraged them to purchase via the internet. At first you must know what is the main reason
for the work of the filtration email the mail service is fast and easy way to exchange messages are singing from
the use of traditional mail, there are a large number from of services in the internet requires that you have one
email sometimes one of us would like to cancel his participation in one of the sites because of the large number
of incoming messages to him from the site does not know and have for a way unsubscribe to get rid of these
messages, or would like one of us that some of the messages is prohibited from specific people or locations for
some of these problems has the following solution is the work of a filter to any e-mail and work ban for
unwanted messages application spam filtering as a last resort, you can set up your own spam blocker with your
email application's built-in filter capability Email filtering is the processing of email to organize it according to
specified criteria.
The architecture social media and online newspaper credibility measurement fo...TELKOMNIKA JOURNAL
This document proposes an architecture for detecting fake news on social media and online newspapers. It involves three main steps: 1) keyword extraction from user-input text, 2) news scoring to measure credibility of information from online news sources based on time, website and message credibility factors, and 3) social media scoring to further measure credibility from social media based on similar factors, if news scoring is insufficient. The goal is to produce a likelihood score of the information being fake news or fact. Previous related work on fake news detection using knowledge-based, context-based and style-based approaches is also discussed.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
We describe our experience gained while exploring practical security and privacy problems in a real-world, large- scale social network (i.e., Facebook), and summarize our conclu- sions in a series of “lessons learned”. We first conclude that it is better to adequately describe the potential ethical concerns from the very beginning and plan ahead the institutional review board (IRB) request. Even though sometimes optional, the IRB approval is a valuable point from the reviewer’s perspective. Another aspect that needs planning is getting in touch with the online social network security team, which takes a substantial amount of time. With their support, “bending the rules” (e.g., using scrapers) when the experimental goals require so, is easier. Clearly, in cases where critical technical vulnerabilities are found during the research, the general recommendations for responsible disclosure should be followed. Gaining the audience’s engagement and trust was essential to the success of our user study. Participants felt more comfortable when subscribing to our experiments, and also responsibly reported bugs and glitches. We did not observe the same behavior in crowd-sourcing workers, who were instead more interested in obtaining their rewards. On a related point, our experience suggests that crowd sourcing should not be used alone: Setting up tasks is more time consuming than it seems, and researchers must insert some sentinel checks to ensure that workers are not submitting random answers.
From a logistics point of view, we learned that having at least a high-level plan of the experiments pays back, especially when the IRB requires a detailed description of the work and the data to be collected. However, over planning can be dangerous because the measurement goals can change dynamically. From a technical point of view, partially connected to the logistics remarks, having a complex and large data-gathering and analysis framework may be counterproductive in terms of set-up and management overhead. From our experience we suggest to choose simple technologies that scale up if needed but, more importantly, can scale down. For example, launching a quick query should be straightforward, and the frameworks should not impose too much overhead for formulating it. We conclude with a series of practical recommendations on how to successfully collect data from online social networks (e.g., using techniques for network multi presence, mimicking user behavior, and other crawling “tricks”’) and avoid abusing the online service, while gathering the data required by the experiments.
Mining in Ontology with Multi Agent System in Semantic Web : A Novel Approachijma
The document proposes using a multi-agent system and ontology to extract useful information from large, unstructured datasets on the web. It discusses challenges with current information retrieval techniques, and how semantic web, ontologies, and multi-agent systems can help address these challenges by structuring data and allowing agents to cooperate. The proposed solution involves developing an ontology of the data domain, using this to build a structured dataset, and employing a multi-agent system using the JADE framework to analyze the dataset with data mining techniques to extract relevant information for users.
Live forensics of tools on android devices for email forensicsTELKOMNIKA JOURNAL
Email is one communication technology that can be used to exchange information, data, and etc. The development of email technology not only can be opened using a computer but can be opened using an smartphone. The most widely used smartphone in Indonesian society is Android. Within a row, the development technology of higher cybercrime such as email fraud catching cybercrime offenders need evidence to be submitted to a court, for obtain evidence can use tools like Wireshark and Networkminer to analyzing network traffic on live networks. Opportunity, we will do a comparison of the forensic tools it to acquire digital evidence. The subject of this research focused on Android-based email service to get as much digital evidence as possible on both tools. This process uses National Institute of Standards and Technology method. The results of this research that networkminer managed to get the receiving port, while in Wireshark not found.
This document discusses the key issues in computer ethics as they relate to pharmaceutical research. It outlines four main ethical issues: privacy, liability, ownership, and power. Regarding privacy, it discusses the right to medical privacy and risks of collecting too much individual data. On liability, it notes responsibility for software functioning properly. Ownership concerns resolving intellectual property rights. Power issues include centralization of control. The document also provides examples of codes of conduct from computing organizations that can provide guidelines to help address these ethical challenges.
It is reasonable for employers to monitor employee email for several reasons: they are responsible for any illegal or inappropriate content sent via company IT systems; it protects against malware, prevents non-work related use that lowers productivity, and guards confidential information and company assets. However, email monitoring can also create a climate of distrust and stress for employees by blurring boundaries between personal and private communication. While some private emails may contain unprofessional content, clear communication of monitoring policies and IT training on appropriate use can help prevent issues if monitoring is implemented reasonably.
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
This document discusses identifying clone attacks in social networking sites. It proposes a two-level approach using fuzzy-sim algorithm for profile matching and three algorithms (Predictive FP Growth, Eclat, and Apriori) for user activity matching. An experiment compares the execution times of the three algorithms, finding that Predictive FP Growth has the fastest time of 181 milliseconds, making it best for user activity matching.
College Collaboration Portal with Training and PlacementIOSR Journals
This document summarizes a student project to automate the training and placement activities at a college. The existing manual system is time-consuming and error-prone. The proposed system is a web application that will allow students to register and update profiles online, receive notifications by email, and help administrators select students for interviews based on company requirements. It aims to reduce manual work, provide statistics and improve communication between students, alumni and the training and placement cell.
Sarah Maximiek presents on using Google Voice for reference services at Binghamton University Libraries. The libraries serve a large student population across three campuses. Google Voice allows the libraries to provide a texting reference service through a single centralized phone number. Some benefits of Google Voice include its free cost, ability to transcribe voicemails to text, and having an online inbox to respond to texts. However, there are also some limitations, such as not having offline access and potential incompatibility with the university's Google Apps. In its initial soft launch, the libraries received 56 text messages, which was 1% of total reference transactions.
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...IJCNCJournal
The most popular way to deceive online users nowadays is phishing. Consequently, to increase cybersecurity, more efficient web page phishing detection mechanisms are needed. In this paper, we propose an approach that rely on websites image and URL to deals with the issue of phishing website recognition as a classification challenge. Our model uses webpage URLs and images to detect a phishing attack using convolution neural networks (CNNs) to extract the most important features of website images and URLs and then classifies them into benign and phishing pages. The accuracy rate of the results of the experiment was 99.67%, proving the effectiveness of the proposed model in detecting a web phishing attack.
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
Edward F. T. Charfauros, inspiring author, assists fellow students with their presentation for a successful grade. He also blogs upon his own inspiring blog, where you'll discover life changing stuff. Sign up for his blog by sending him an email~
Copyright 2013 Edward F. T. Charfauros. Reference, www.YourBlogorResume.net.
Literature survey on identity managementVaibhav Sathe
This document presents a literature survey on online identity management and its importance in e-commerce. The objectives are to identify various identity management methods, universal identity systems, and the importance of a user's online identity to both users and e-commerce companies. The survey covers papers on authentication and authorization infrastructure, password practices on popular websites, challenges with identity management on mobile devices, universal identity models like OpenID, and the benefits of consistent online identity for users and businesses. The document also evaluates and compares authentication methods used by various e-commerce and financial websites.
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
This document summarizes a research paper that examines the effect of individual differences and privacy concerns on consumers' perceptions of using information technology. It discusses how factors like self-esteem, alienation, computer anxiety, and privacy concerns around data collection and use can influence attitudes and intentions to use IT. The document reviews relevant literature on privacy concepts, comprehensive security programs for e-commerce, and a proposed research model examining the relationships between individual characteristics, privacy concerns, attitudes, and behavioral intentions.
The document discusses a proposed Wi-Fi network system for students at an organization. It identifies current problems with uneven access to the network and lack of security. The objectives of the new system are to allocate each student 1 hour of access per day, require ID number, username and password for login, streamline the connection process, and allow up to 40 students to connect simultaneously. The scope would be for students to access the network on their own devices for schoolwork within the allotted time limit. The system would be limited to the department and block certain sites while keeping records of usage.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various
computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because
of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are
used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The
recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same
preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already
liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an
alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be
combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between
different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding
the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’
preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is
incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the
results.
Assessing the Knowledge on Internet Addiction and Cybersecurity: A Literature...AJHSSR Journal
ABSTRACT : The Internet of Things (IoT) is a significant research topic with many challenges and affects
many areas of our lives, including healthcare. The purpose of this paper is to examine the current state of
knowledge on Internet addiction and online privacy and security issues, with a focus on identifying gaps in the
literature, quantifying the research, and areas in need of further research. This paper aims to provide guidance
for creating insightful and helpful systematic literature review articles in the field of International Business. In
this paper, we present a thorough review of the different security and privacy risks, which threaten the wellbeing of OSN users in general, and children in particular. We also present an overview of existing solutions that
can provide better protection, security, and privacy for OSN user’s identities, identities, and lives. In addition,
we provide a comprehensive survey on how recent and ongoing advances in technology have motivated the
development of affordable healthcare gadgets and connected health services using IoT. The COVID-19
pandemic has led to new cyber security threats and privacy issues.
KEYWORDS : Internet of Things, Literature Review, Internet Addiction, Cybersecurity
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
This document summarizes a research paper on honeywords, a new approach for enhancing password security. Honeywords involve storing fake passwords (honeywords) along with the real password for each user account. If an attacker tries to login with a honeyword, it triggers an alarm. The document outlines the proposed system, which generates a unique honey index for each account during registration. It stores the hash of the real password along with the correct honey index. If an attacker enters an incorrect password after 3 attempts, the account is blocked. The system creates honeywords after successful login. It also discusses related work and concludes that honeywords make password cracking detectable and more difficult.
Appling tracking game system to measure user behavior toward cybersecurity p...IJECEIAES
This document describes a study that aimed to develop a new method for measuring user behavior toward cybersecurity policies. The researchers created a tracking game system aligned with a questionnaire to indirectly elicit users' actual behaviors. They identified cybersecurity measures and policies, developed survey questions, and transformed the questions into game scenarios. The system was tested with 119 participants. Analysis found high user acceptance, as 70% completed all questions, indicating it was easy to use. Distribution was also fast, collecting responses within a week from Saudi Arabia and other regions. Analysis of scores by age, gender and region provided insights into participants' behaviors regarding the security policies. The study demonstrated the tracking game system was an effective creative tool for measuring human behavior.
The size of the Internet enlarging as per to grow the users of search providers continually demand search
results that are accurate to their wishes. Personalized Search is one of the options available to users in
order to sculpt search results based on their personal data returned to them provided to the search
provider. This brings up fears of privacy issues however, as users are typically anxious to revealing
personal info to an often faceless service provider along the Internet. This work proposes to administer
with the privacy issues surrounding personalized search and discusses ways that privacy can be improved
so that users can get easier with the dismissal of their personal information in order to obtain more precise
search results.
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...ijistjournal
User ignorance towards the use of communication services like Instant Messengers, emails, websites, social networks etc. is becoming the biggest advantage for phishers. It is required to create technical awareness in users by educating them to create a phishing detection application which would generate phishing alerts for the user so that phishing messages are not ignored. The lack of basic security features to detect and prevent phishing has had a profound effect on the IM clients, as they lose their faith in e-banking and e-commerce transactions, which will have a disastrous impact on the corporate and banking sectors and businesses which rely heavily on the internet. Very little research contributions were available in for phishing detection in Instant messengers. A context based, dynamic and intelligent phishing detection methodology in IMs is proposed, to analyze and detect phishing in Instant Messages with relevance to domain ontology (OBIE) and utilizes the Classification based on Association (CBA) for generating phishing rules and alerting the victims. A PDS Monitoring system algorithm is used to identify the phishing activity during exchange of messages in IMs, with high ratio of precision and recall. The results have shown improvement by the increased percentage of precision and recall when compared to the existing methods.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
The Identification Level of Security, usability and Transparency Effects on T...Waqas Tariq
This paper presents an Expert E-Commerce Trust System (EECTS), showing a possibility to confidence e-business processes by Adaptive Neuro-Fuzzy Inference Systems. The research has empirically tested the critical factors that influence an individual’s decision in the process of buying products or services online. The proposed model applies Adaptive Neuro-Fuzzy model to converging business processes to get the desired results. The system is adaptive since it uses neural network learning ability for its adaptation. The results of this study show that the security, web site design and familiarity, directly influence user’s trust in e-businesses since these factors lie the closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase. The study also provides a device for sellers to improve their commercial websites. The data was collected via interviews, surveys and B2C websites. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the model. New method was compared with previous Expert E-Commerce Trust System (EECTS) that developed by Fuzzy Logic system too.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
1. short answer question(200 words) [required] roger s. prjasmin849794
The document discusses research on perceptions of problematic Facebook use. It analyzes survey responses from 20,000 Facebook users about their Facebook habits and whether they feel in control of their usage and experience negative life impacts. Server log data of their Facebook activities over the previous four weeks is also analyzed. The study finds that an estimated 3.1% of US Facebook users experience problematic use, defined as feeling a lack of control and negative life impacts. Those experiencing problematic use tend to be younger, male, and going through major life events. They spend more total time on Facebook, especially at night, respond to more notifications, and are more likely to deactivate their accounts. However, they also feel Facebook is more valuable to them despite the negative impacts
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
This document discusses a study on factors that influence consumer trust in e-commerce. It aims to identify how trust can be established between consumers and online vendors to facilitate online purchases. The study examines how consumers' perceptions of security, privacy, familiarity and risk relate to their trust in e-commerce. A survey was conducted of 65 internet users in Dehradun, India to analyze the relationships between these factors. The results found that perceived security and reliability of vendors positively impacted trust, while perceived risks negatively impacted trust. However, perceptions of privacy, security and familiarity did not significantly impact trust in e-commerce transactions.
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
This document discusses a study on factors that influence consumer trust in e-commerce. It aims to identify how trust can be established between consumers and online vendors to facilitate online purchases. The study examines how consumers' perceptions of security, privacy, familiarity and risk relate to their trust in e-commerce. A survey was conducted of 65 internet users in Dehradun, India to measure views on these factors and their relationship to trust. The results were analyzed using statistical methods to understand which factors most impact consumer trust in e-commerce transactions.
Survey of accountability, trust, consent, tracking, security and privacy mech...Karlos Svoboda
This survey examines accountability, trust, consent, tracking, security and privacy mechanisms used by online service providers. It analyzed these features at various private and public organizations through anonymous online surveys and desk research. While practices vary, some trends emerged. Many organizations lack coherent privacy strategies and request guidance on privacy impact assessments. Commercial companies aim to balance privacy and marketing goals, but assurance of long-term anonymous data storage needs improvement. Overall more awareness of privacy concepts is needed to maintain user trust in EU online services.
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
Similar to The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security (20)
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
The Impact of Frequent Use Email When Creating
Account at the Websites on the Users Privacy and
Security
Salwa Al-Samirrai1, Zahra Fadhil Mohsen2 and Aysh Alhroob2
1
College of Administrative and Financial Sciences, Isra University,
Amman, Jordan
2
Faculty of Information Technology, Isra University, Amman, Jordan
ABSTRACT
This research aims to measure the impact of frequent use of emails when creating account at the websites
on the privacy and security of the user (a survey study conducted on a sample of email users' views). The
sample, 200 people of the Jordanian society, includes employees of commercial and communication
companies, banks, university students, employees and faculty members as well as computer centers at
universities. All have emails and are able to use the computer and internet. A questionnaire has been
prepared for this purpose aims to measure the variables of the study. SPSS program was used to analyze
the results. The study revealed the existence of a statistical significant impact of frequent use of email
account when creating an account at the Internet sites on the security and privacy of the user. The study
concluded a number of conclusions and recommendations.
KEYWORDS
e-mail, security, privacy, Internet sites, password, username.
1. INTRODUCTION
The development of applications relying on the internet and its multi services provided, make the
users feel that they badly need to benefit of these services in their all areas of daily life; for
example the services provided by Facebook, Twitter, Google and LinkedIn. Some people use
Google for researching, translation services, while other sites serve the social communication;
such as Facebook and Twitter, to encourage more individuals to join social activities. Many
websites are called e-trade used to commercial transactions, sales and procurement, or shopping
through internet, such as EBay and Amazon, which allow the engaged members to execute selling
and purchasing transactions. Internet services created multi problems pertaining to the security
and privacy of the users and how to keep them safety in the new open environment generated by
the internet.
These problems had arisen out of the conditions to benefit of these services, which require the
user to generate an account in the website, including (user name, postal address and password).
The user may use the same information for multi registering in multi websites, which generates
multi problems to the user in respect of his privacy and security.
Therefore, we can conclude from the foregoing that the recent developments in the area of the
internet usage and its created broad space to provide various services to various categories users,
has become risky.
DOI : 10.5121/ijcsit.2013.5601
1
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Due to the novelty of users dealing with websites in the Arab countries, the users face a problem
in dealing with the websites and how to maintain their main e-mail privacy and security. The
most important difficulty rose through dealing with the use of the main e-mail address when
registering in more than one websites or the use of the same name and password. The problem
becomes complicated by picking simple password, for example, the use of birth year or the name
of his child or any other easy-detected by hackers, or he did not read the conditions of privacy
and use defined by the websites, assuming that the websites would protect his privacy or the
conditions are written in English and he is not able to read and understand as his interest is to get
access to the services provided by these websites.
The lack of interest in these matters may make it suffers from the problem of the infringement of
his email address security and privacy, which may be represent the email of his employment
institution, leading to endanger his work place privacy an security to be infringed as his email
contains many private work emails messages. He may also be bothered by receiving many
messages from unknown people which contain viruses. Users and many interested in this subject
might think that the users are responsible for this problem, but in fact the designers also share
liability because the design of the user’s page may does not keep, technically, the privacy and
security of the user data.
This survey conducted on a random sample of various websites users, who have email accounts,
concluded that these people face such difficulties. The major reason behind these problems may
be the lack of experience in privacy and security of this area. Therefore, the researchers will
attempt in this research to detect the problems of privacy and security the internet websites users
face by frequent use of their email address when registering in these websites, explore the reasons
and set recommendations that guarantee the privacy and security of the users in their dealing with
the various internet websites. The presentation of the concept, importance and security and
privacy of e-mail addresses will be addressed as one of this research aims. Furthermore, Clarifies
the basic requirements set by Internet websites from the user when creating an account therein to
get benefit of its various services. This research analyzes the impact of repeated use of e-emails
when registering in more than one website s on the security and privacy of the user.
The importance of this research arises in dealing with a new-generated subject covered by few
researchers at world-wide level to the knowledge of the researchers, in addition to the scarcity of
Arab studies in this area. The results and recommendations of this study may contribute to add
scientific knowledge and draw the attention of researchers to be interested in such topics.
Hypotheses
On the basis of the problem, the following hypothesis can be formulated:
"There is no moral impactful relation of statistical significance at the level of ≤ (0.05)
between the repeated use of email address by the user when registering at the different
websites and the protection of his privacy and security”.
The rest of the paper is organized as follows: Related work is presented in Section 2. Section 3
covers Approach of the research. Theoretical framework is covered in Section 4. Section 5
introduces the result discussion. The conclusion and future work recommendation are discussed
in Section 6.
2
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
2. PREVIOUS WORKS
Edward W. Felten & Shieley Gaw Study in [1] introduced a use of the password in each
correspondence on the Internet, subscription with services, and shopping accompanied by
growing concern about the possibility of theft of email addresses as a result of repeated use of the
same password in multiple accounts. This may weaken the password and potential of being
hacked. The study was conducted on (49) undergraduate students who were questioned “how
many passwords they have and how often they reuse them”.
It was found that that the majority of users have three passwords or less. The passwords are used
twice at least. They do not use new a password in each new account they sign up. This is wrong
behaviour because users think their re-use of the same password would enable them to manage it.
The users point out that threats emerge from close people and they used their phone numbers as a
password. The study provides several recommendations relevant to the improvement the
management of current password and the use of strong password.
A large-Scale Study of Web Password Habits by Dinei Florencio & Cormac Herley in [2], the
authors addressed the negative effects resulting from the use of the password by the users. The
Study includes half million user and lasted for three months, focusing on the mechanism of
registration the password and the strength of the different passwords used by the user, as well as
the measurement of these passwords. The study concluded to calculate or estimate the average
number of passwords and the average number of accounts of each user and the extent of
password participation in the user accounts, in addition to the number of times the user forgets the
password, strength, length, and type of the password and its difference according to the websites.
The subject of the passwords was addressed in a study conducted in [3], the user-specific
information and access to it is secured by a password, which has become one of the most
important topics today. The users have become more interested than ever before in maintaining
the security and privacy of the password. The establishment and management of the password has
become of topics of vital importance. Therefore, certain policy for the password must be
developed and applied. The study concentrated on identifying and modelling password policy and
discussed the password policy being followed in its management. The study provided a
simulation model, with a set of variables and algorithms, to simulate the password; in addition to
several results to the password simulation.
A study in [4], conducted by the group of information security. The survey study was conducted
on more than (1000) Internet users aged between 18 - 82 years old. It indicated that privacy is of
deemed a major concern of internet users. The study concluded that (51.3 % ) of the users do not
trust the privacy policy declared by the websites and (28.5 %) only had answered the question
positively when asked: Do you think that Websites would adhere to and meet the privacy policy
they declare?
In [5], an important topic related to the wrong behaviour of the user when using his email, or
sometimes called the user name, when registering in the websites, and subsequent problems
relevant the security and privacy of the user. This was made through studying the design diagram
of password recovery system used by the websites or the technology used to maintain the user
privacy. The study concluded that the repeated use of email as ID faces many risks pertinent to
the privacy and security of the user. There are difficulties facing the current solutions. The study
suggested many solutions that can be used to protect the ID user on the internet and achieve better
system management to the user ID in the future.
3
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Through this rapid review to the conclusions of the previous studies, this study attempts to
diagnose the problems the Arab users suffered in using the websites, their awareness of such
problems and the impact of the frequent use of the email address on the user privacy and security.
3. APPROACH OF THE RESEARCH
The descriptive analytical approach has been adopted in the research, depending on the field
method in collecting the data through the questionnaire, which has been statistically analyzed to
the test the reliability of the hypotheses using Statistical packages (SPSS). Moreover, the
researchers conducted personal interviews with some individuals of the sample, reviewed
previous studies for the purpose of preparing the questionnaire. Desktop survey also took place
through the references, scientific journals and websites to develop the theoretical framework of
the research, beside exploration of the most important previous studies, which constitute a vital
resource to the research and their content of core knowledge.
3.1 Community of the Search Sample
The research community consists of individuals of Jordanian society working in commercial
companies, telecoms, banks and universities, including students, employees of computer centres
and faculty members. The sample, 220 individuals, was randomly selected, represents those who
have emails accounts that able to use the computer and internet. Table 1 shows the number of
analyzable questionnaires that have been distributed and collected. Table 2 points out the personal
features of the research sample.
Table 1. The number of analyzable questionnaires distributed and collected
Number of
Questionnaires
distributed
220
Number of
questionnaires
collected
210
Number of
non-analyzable
questionnaires
Number of
Analyzable
questionnaires
200
10
Table 2. The personal characteristics of the research sample (200 individuals)
Postgraduate
studies
Diploma
higher
Diploma
16
115
58
22
11
7
4
31
Bachelor
Secondary
T % T % T % T %
23
%
6
T % T % T % T % T % T % T % T % T % T
12
48- above
43-47
Sscientific Qualification
38-42
33-37
28-32
23-27
18-22
Female
Age
124
62
75
38
48
24
61
31
31
16
18
9
11
6
16
8
12
Male
Sex
3.2 Research Tool and Variables
The variables that are adopted in this research are represented in the preparation of the
questionnaire as follows: 1. Personal variables 2- Data pertinent to dealing with computer
technology, internet, using email addresses and the nature of such usage. 3-independent
variable represented by: the repeated use of email accounts represented by the frequent use of
email address by the user. 4-the dependent variable is represented in security and privacy of the
email address. The answers of the respondents were analyzed by using Likert five-point scale as
4
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
follows: Completely agree (5), agree (4), neutral (3) do not agree (2) completely disagree (1). The
arithmetic averages of the measurement tool adopted was (3), because the average answers equal
of greater means agreement, while less than that value means disagree.
The results were presented to arbitrators consist of specialized professors at the University of
Jordan. Their comments were taken in to accounts by paragraphs were reformulated in addition to
modifications required were designed to obtains precise accurate balance between the
questionnaire content and paragraphs. The internal consistency of the questionnaire validated
through Cranach’s Alpha coefficient in its whole final formulation and all variables. It is noted in
were high as the reliability coefficient of all variables was (0.82) which a high reliability percent
and acceptable for this research.
Table 3. The reliability coefficients of all variables
Variable
The frequent use of emails by the user
The security and privacy of email accounts
Reliability Coefficient
0.84
0.81
4. THEORETICAL FRAMEWORK
Dealing with the internet is often considered risky, especially the security aspect. Many users are
concerned about their private information that other may have access to. Many electronic sites use
e- mail as a tool of communication through the activation of subscriptions, sending invitations
and information to the users. Sometimes, the email may be used as a means of promoting
products of companies and sometimes the users are sorted according to their types to accomplish
effective and rapid commercial targets. If this user’s information is leaked, then it might be used
for non-commercial purposes, which may cause his privacy be hacked.
4.1 Browsing Websites Risk
The use of the services and applications on the Internet requires the user to create an account with
a user name and password. The problems pertaining to the use of the password and identified
name of user as an ID are due to wrong habits followed by the user. Many researchers become
more interested in these topics in the last decade; such as [6], [2], [7] and [8].
Perlman and Kaufman addressed the ongoing problems related to the use of the user name as an
ID as well as the diagram of using the password and the problems generated by using the same
password and user name in multi websites [7]. Aspinall in [8] discussed in his study the behaviour
of the user pertaining to how to choose or design the security question as sometimes weak
question and answer are used, then subsequently easily hacked.
In [9], the author pointed out that the use of the email address as an ID becomes common and
replaces the use of the user name as a hobby. This leads to many benefits; First) it is easy for the
user to remember his email address which is better than using multi user names as he needs to
remember one email address for multi websites than using multi user names. Second) internet
services providers consider it more convenient to communicate with users by using their emails
collected by the steps of signing up an account. Amazon and EBay use this method. Third; the
user can recover and change his password whenever he forgets his password through his email.
This method is convenient and secure to the internet service providers. Many websites require the
user to use his email to have access to their web pages because of the benefits mentioned herein.
Despite all that, the users will face several problems relevant to the privacy and security due to
5
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
the potential of disclosure of their information to others compared to using the user name as an
ID.
It is noted that some websites track the visitors' performance and save a lot of information
through their visitors' files. These files contain the websites he moved from, IP, his type of
account and the browser used. There is a possibility that the website might have special software
that could identify the user’s emails and other information. Such software can be disabled, whole
or part, within the browser of the user. This would lead to limit the abilities to get the information
from his personal PC by deactivating Java in the browser through the following orders: from the
View menu, we choose option and then advance and then activation boxes (enable Java JIT
compiler & enable Java logging) or as per the browser features, we can enable or disable java
script. There are some websites working on recognition the information recorded about the user in
the visited sites; such as this websites: www.consumer.net/analyze. It has a great ability to
know the details of what has been stored in those visited websites. The user should be careful to
divulge private information in his visits to the websites and make sure the websites is reliable and
does not exchange or pass such information to another party to harm him.
It is also noticeable that many of the sites use Cookies, called (cookie) hypertext file, in the hard
disk. This type of file is used to save some information about the visitor, such as the user name
and password. These files are stored on the user hard disk drive, in addition to IP and the websites
visited. They are often written in encrypted text files in a manner that the processors in the sites
could decrypt, (https://docs.google.com). It is not necessary that cookies are used for good
purposes every time, where others can see that information, which is it sacrilege to the user
privacy. As we said, cookies are usually used to collect information about users, so it is preferable
to clean such files after each browsing, especially non-secure sites. For example, the news sites
use spaces in their websites aiming to collect comments and subscription. These spaces also
require your email and save those views for a long time, where can be read by any one, so the
user must be careful in his writings or information he delivers that might hurt him later [10].
4.2 Use of Passwords in the E-mail
The password in the email is very important and must be strong. It should not depend on simple
words derived from a name of a city, work place, or career, so as not to be hacked easily. There
are specialized programs in the market to discover the password through speculation these words
several thousand times. There are also gaps in the use of electronic mail, which attackers can take
advantage of them, for example, ability to remember the password automatically from programs
or the possibility of saving browsing or auto completion to names or records of websites visited.
With the large number of websites and services provided on the websites, we always find
websites request user to enter the user name and password. The user could have been forced to do
so several times a day; at work PC station, any forum he subscribed and at the end of the day, his
bank account. Therefore, there must be some basics and information be developed to assist the
user to remember his password by using complicated characters which cannot be hacked or
detected.
Some users use one password for multi accounts, believing that using a consolidated password,
which is wrong in terms of security. Suppose that someone has stolen this password, including the
user's bank account, work place account, thus the thief will try to use this word in all the user
accounts.
6
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
4.3 Overcome the Problem of Frequent Use of Email Account and Password
The user has to take into account not using easy peculated words, such as the first name or
surname, car model or well known names as well as not to use the hones numbers or his ID
number or sequence numbers or characters, such as 1234 or abcd. User must enter some symbols
too, such as @, $ ,# *, to get a complicated password. For example, the word passwords can be
complicated by adding symbols that cannot be encrypted, to become as p@s$w0rd. You can also
use small and capital letters and insert numbers, such as A9b3C7d.
There is another way similar to the previous one, by dividing the password, according to its
importance into two or three parts; main password and subsidiary. The bank account and private
email passwords are classified as main passwords, while passwords used in forums or websites
are classified as subsidiary. Hard strong passwords must be used for main passwords, where must
include 8 characters (letters, numbers and symbols). The simple easy passwords can be used for
the second subsidiary websites for their little importance. To tackle security and privacy problem,
there are some programs which can save multi passwords and store that in one file, which can be
encrypted and protected by one password, to facilitate saving the passwords and the user is
requested to remember one password to enter into this program to review his passwords. Among
these programs, "Web Confidential", "LastPass", "KeePass", in addition to free websites such as
http://www.mirekw.com/winfreeware/pins.html and http://passwordsafe.sourceforget.net
and http://keepass.sourceforget.net.
Some of these sites can be used in the cell phone or attach to a file in the USB flash memory.
The password must not be given to anybody, and if given or be known to anybody, you must
change it promptly. The user must not write down is password and leave near his PC not on the
desktop. The user must cancel auto save characteristic to save his password and change his
password periodically (preferable once every 40 days). In case of suspension of virus infection,
the password must be changed as precaution measurement.
User can tackle the problem of repeated use of the password by creating a special password for
each account or email or websites. The user may find difficult to remember, leading to cancel his
subscription in certain websites. At the same time, using one password for all accounts will make
his password vulnerable, and then all his account will be lost.
Those who do not want to use this solution; they can develop a special algorithm and use it in
their all accounts. Suppose that the web name is abcd.com and his name is Ahmad, he can use, for
example the first three letters of his name, add number 3 and then add the last 3 letter of the web
name to be ahm3cde. Whenever he wants to enter into xyz.net, he can use the algorithm as
follows, but with changing the last letters to be ahm3xyz. This system is called the mask. It can be
applied to all websites and accounts he subscribed, which is easy way and he needs only to
remember the method and application [11]. The researchers in [12] used a graphical passwords or
biological features of the user, such as fingerprint or biometric passwords [13]. The graphical one
needs the user to remember the graphic of the password, while the biological type does not need
the user to remember anything.
The graphical type needs, like the text one, the user to remember many graphics and has the
problems the same as text one. The biological password requires special receiver devices, unlike
the text one, such as the intelligent card, or the use of the cell phones to receive the password,
which may not be convenient to the user, because of the probability of loss in addition to the
security problems related to such devices [14]. The user may face another kind of problems
concerning the password recovery. When the user creates an account, some companies, like
7
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Yahoo, develop some additional security questions to recover the lost password, which is the
answer of security question/s; such as the name of father. Some users write the real answers to
such personal questions. It is preferable not to write the real answer of you father's name. for
example, but counterfeited answers known only to the user in order to avoid misuse by others and
trick the web by true answers to have access and the password of the user.
5. ANALYSIS AND RESULT DISCUSSION
This section looks at what we do with all the information have been collected. The
analysis of focus group information can be done at a whole range of levels depending on
what we want to do with the information.
5.1 Dealing with Computer, Internet Technology and Main Emails
1. Are you able to use the computer?
The results shown in table 4 indicate that all the members of a sample research have the capacity
to use the computer and this is due to the method of selecting the sample by researchers, which
included those who have the ability to use computers and the Internet.
Table 4. Answers to Members of the Sample on their Capacity to Use Computers
The Phrase
Do you have the ability to use computers
Yes
Not
T
%
T
%
200
100
0
0
2. Do you have the Knowledge to Surf Enter the Websites?
The results shown in Figure 1 indicate that (76 %) of the members of the research sample have
the knowledge to surf the websites, and (22 %) have medium level, while 3% little knowledge.
The results indicate that the majority of the sample members have good knowledge enables them
to surf the websites well.
Figure 1. The answers of the research sample in respect of their ability to enter into websites
8
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
3. Do you deal with the following websites?
The results shown in the Figure 2 that the social websites came in the first order by 90%, while
the digital news versions came the second by 80%, and the scientific researches websites came
the third in order by 74 %, forums came forth by 59%, the e-government websites came fifth by
56%, shopping came sixth by 55% and the stock market came the seventh by 17%. Therefore, the
largest portion uses the internet for social communication and news purposes.
Figure 2. The proportion of users dealing with websites according to nature of websites
4. The language of the websites the users deal with:
The results shown in Figure 3 indicate that 43% of the users deal with both Arabic and foreign
websites, 26 % of the users deal with Arabic websites only and 16% deal with foreign websites
only. The results indicate that half of the users approximately deal with both Arab and foreign
websites, which good signal to the Arab citizen and 15% of the research sample do not deal with
any web, which points out that little of sample members have no certain interest to get knowledge
of the websites.
Figure 3. The language of the websites dealt by the users
9
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
5. The number of email accounts possessed by the research sample:
The results shown in Figure 4 indicate that 54% of the sample members have (1-2) email
accounts, 8 % have (3-4) email accounts and 38% have more than 5 email accounts. The results
indicate that more than half of the research sample have (1-2) email accounts, which reflect the
reality of the Arab email users have do not have the multi accounts culture to protect their
privacy; i.e. dividing them into major and secondary accounts as mentioned here in above.
Figure 4. The Number of the Email Accounts and the Users Proportion
6. How many email accounts being used frequently:
The results shown in the Figure 5 indicate that proportion of the users who use (2) email accounts
frequently was 43% which the highest, then (1) email account with 38% and the minimum
proportion, 18 %, represents the users of 3 email accounts. The result is logical and reflects the
general condition of the email users, which are 2 emails with frequent use.
Figure 5. The Number of the Email Accounts used by the Sample Members Frequently
7. The availability of email account or work:
Figure 6 shows that 72% of the sample members have work email account at jobsite and 26% do
not have. This result reflects the method of selecting the sample members which almost focused
on workers at commercial and communication companies in addition to banks and university staff
members who likely have email at jobsites.
10
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
Figure 6. The Provision of Email Accounts for Work
8. The email Accounts used by the sample members:
The results shown in Figure 7 points out that 61% of the sample members use email account at
Hotmail, 53% use Yahoo, 52% use the work email accounts and 31% use Gmail. These
proportions reflect the real use of the email accounts of the sample members which highlight the
existence of email accounts for work, which are used the highest portion of frequent use.
Moreover, the majority of the sample members have personal email accounts at Hotmail and
Yahoo mail.
Figure 7. The email accounts frequently used by the members of the sample
9. The Method of sorting the emails by the members of the sample
The results shown in Figure 8 indicate that 47% of the members of the sample pointed out that
they have "main email account to receive the emails for work only", 23% of the members pointed
out that they do not have such email, while 59% of the members have a main email account for
personal emails only. The proportion of those who do not have main email account was 15%
while 35% pointed out they have secondary email for subscription in all websites only. The
proportion of those who do have secondary email account was 28%. The results reveal that 30%
of the sample members "do not use such division and they have only one email for all purposes".
The proportion of those who use this division was 33%, i.e. they have main and secondary email
accounts. The results confirm that significant proportion of users do not depend on division their
email accounts, thus their privacy would be vulnerable.
11
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
1- The Main email for work only
2-Main personal email
3- Secondary email for subscription
with websites
4- Do no use this division but one email
for all
Figure 8 The answers of the members of the sample on their method of sorting their emails
5.2 Respondents answers on the phrases related to the variable of frequent use of
emails
Table 5 shows the members of the sample in general do not agree on all the phrases of the
variable. The arithmetic average of their answers was (2.23) with diversion standard (0.80). Their
arithmetic average of their answers to the phrase No 1 of the variable, stated "When the password
of a secondary email, I rely on the main email to receive the link message to password recovery",
was (1.84) with diversion standards (1.87), which is less than the average of the measurement tool
(3). This indicates their disagreement which positive status. The arithmetic average second
phrase stated "my secondary email account always transfer all the messages to my main email"
was (1.23) with deviation standard (1.41), which is less than the average of the measurement tool
(3); i.e. they refuse to depend on the secondary email account to transfer all their messages to the
main email, which positive status.
Table 5. The Analysis of the Research Sample Answers on the Phrases of the Variable "the Re-use/
Frequent Use of the Email"
Ser.
1
2
3
4
5
6
7
Phrase
Arithmetic Standard
Average
Deviation
When the password of a secondary email, I rely on the
main email to receive the link message to password 1.84
recovery
My secondary email account always transfer all the
1.23
messages to my main email
I always prefer to transfer the email message from the
1.77
work email messages to my main email
I use the main email to register in all Internet sites
I always use the same password and user name when
registering in all Internet sites
I use the same password and user name when registering
in some Internet sites
I do not use the same password and user name to register
in the various Internet sites
1.87
1.41
1.55
2.17
1.30
1.59
0.71
1.92
0.57
1.33
0.41
12
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
8
9
I use the same user name in Hotmail, Yahoo &
1.8
Gmail..etc"
I prefer using a special email account in registering in all
Internal
sites
(Scientific,
shopping,
social 1.46
communication, news and e-gov. sites)
General Average of the Variable
2.23
0.61
0.09
0.80
The arithmetic average of the third phrase stating "I always prefer to transfer the email message
from the work email messages to my main email" was (1.77) with deviation standard (1.55),
which is less than the average of the measurement tool (3). This confirms their disagreement,
which positive status. The arithmetic average of the fourth phrase, stating "I use the main email to
register in all Internet sites", was (2.17) with deviation standard (1.30), which is less than the
average of the measurement tool (3), which confirms their disagreement on using the main email
in registering in all Internet sites, which is positive status. The arithmetic average of the fifth
phrase, stating "I always use the same password and user name when registering in all Internet
sites" was (1.59) with aviation standard (0.71), which less than the average of the measurement
tool average. This confirms their disagreement, which is positive status. The arithmetic average of
the sixth phrase, stating "I use the same password and user name when registering in some
Internet sites", was (1.92) with deviation standard (0.57), which is less that the average of the
measurement tool. This affirms the previous results, which is also positive status. The arithmetic
average of the seventh phrase, stating "I do no use the same password and user name to register in
the various Internet sites", was (1.33) with deviation standard (0.41), which less than the average
of measurement tool. The result here is contrary to the previous phrases. This reveals negative
status; i.e. they use the same password and user name when registering in the various Internet
sites. The arithmetic average of the eighth phrase, stating "I use the same user name in Hotmail,
Yahoo & Gmail..etc", was (1.80 with deviation standard (0.61), which is less than the average of
the measurement tool. The results were positive.
The arithmetic average of the ninth phrase, stating "I prefer to use a special email to register in all
Internet sites (scientific, shopping, social communication, new and e-gov.)", was (1.46) with
deviation standard (0.09), which is less than the average of the measurement tool. This result is
negative; i.e. they prefer to use special email account to register in all Internet sites. Therefore, we
can summarize, according to the above-mentioned results, that the culture of protecting the emails
and use them appropriately, to some extent, available among some Arabs, represented by the
members of the research sample. This is obvious through the difference of the degree of their
agreement about the variable phrases. In the other hand, we find contradiction in their answers,
which may be due to the fact that some members were not objective in their answers, or they are
not aware enough of privacy and security of their emails.
5.3 Answers of sample members on the phrases related to the privacy and security
of the emails.
Table 6 shows that the member of research sample disagree on all the phrases of this variable, as
the arithmetic average of their answers was (1.31) with derivation standard (0.54). The arithmetic
average of the tenth phrase, stating "I cannot remember the user name and password of all my
emails because of it is easy", was (1.84) with deviation standard (1.87), which is less than the
average of the measurement tool (3). It is a negative status. The arithmetic average of the 11th
phrase, stating "I do not think that the protection of the user name and password is relevant to the
privacy and security of the user", was (1.07) with deviation standard (0.77), which is less than the
average (3). This means that there no agreement among the members of the sample, which is a
13
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
positive status, indicates their awareness of the importance of protecting their user name and
password. The arithmetic average of the 12th phrase, stating "I think that all Internet sites protect
the privacy and security of the user to encourage him to benefit of the service provided", was
(1.14) with deviation standard (0.75), which is less than (3). This affirms their disagreement,
which is negative status indicates the users content that not all Internet sites protect their user's
privacy and security. The arithmetic average of the 13th phrase, stating "picking simple password
do not contribute in the protection of the user account", was (1.15) with deviation standard (0.88),
which is less than the average of the measurement tool. This also confirms their disagreement
which is positive status. The arithmetic average of the14th phrase, stating "I prefer to use multi
passwords for the same email when using in subscription with the Internet sites", was (1.14) with
deviation standard (0.92), which less than the average (3), indicating their disagreement. This is
negative status. The arithmetic average of the 15th phrase, stating "I think that the password
recovery Figure or steps adopted by all sites do not secure the privacy and security of the user",
was (2.81) with deviation standard (0.17), which is less than the average (3) and it is also a
negative status. The arithmetic average of the 16th phrase, stating "the request to specify question
and answer of the user is known only the user adopted by Internet sites contributes to the
protection of security and safety of the account", was (2.28) with deviation standard (1.40), which
is less than the average of the measurement tool. It is also a negative status. This is due to the
failure of the user to use a difficult question and their answers were logical as it is mentioned in
the theoretical aspect.
Table 6. The analysis of the answers of the sample members on the phrases related the variable of security
and privacy of the emails
Ser.
10
11
12
13
14
15
16
17
18
19
Arithmetic
Average
I cannot remember the user name and password of all my 1.055
emails because of it is easy
I do not think that the protection of the user name and 1.07
password is relevant to the privacy and security of the
user
I think that all Internet sites protect the privacy and 1.14
security of the user to encourage him to benefit of the
service provided
picking simple password do not contribute in the 1.15
protection of the user account
I prefer to use multi passwords for the same email when 1.14
using in subscription with the Internet sites
I think that the password recovery Figure or steps 2.81
adopted by all sites do not secure the privacy and security
of the user
the request to specify question and answer of the user is 2.28
known only the user adopted by Internet sites contributes
to the protection of security and safety of the account
I always read the use, security and privacy policy when 1.73
registering in the Internet sites
I do not receive many message from unknown sites just 1.91
after creating account in the Internet sites which give the
impression that they sell the emails of the subscribers to
others
the use of the password consisting four numbers and 1.91
letters does not secure the privacy and security of my
Phrase
Standard
Deviation
0.65
0.77
0.75
0.88
0.92
0.17
1.40
1.42
1.18
1.53
14
15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
email
Sometimes, I give the user name and password of my
20
account of the Internet sites to my friends to benefit from
their services
I have the technical knowledge enough to manage the
password which depends on special programming that
21
assist to achieve the coordination between the password
and user name
the subscription in the Internet sites makes me face the
22
problem of hacking the emails
General Average of the Variable
2.55
0.47
2.68
1.53
2.55
1.58
1.31
0.54
Main Hypothesis Test: "There is no moral impact relation of statistical significance at the
level ≤ (0.05) between the re-use of the email by the user when registering in the Internet
sites and its security and privacy".
The arithmetic of the 17th phrase, stating "I always read the use, security and privacy policy when
registering in the Internet sites", was (1.73) with deviation standard (1.42), which is less than the
average of the measurement tool. These results were negative, indicating the lack of user
awareness of the necessity to read the privacy policy. The arithmetic average of the 18th phrase,
stating "I do not receive many message from unknown sites just after creating account in the
Internet sites which give the impression that they sell the emails of the subscribers to others", was
(1.67) with deviation standard (0.48), which is less than average of the measurement tool. This is
negative status. The arithmetic average of the 19th phrase, stating "the use of the password
consisting four numbers and letters does not secure the privacy and security of my email", was
(1.91) with deviation standard (1.53), which less than the average of measurement tool. This
result is positive. The arithmetic average of the 20th phrase, stating "Sometimes, I give the user
name and password of my account of the Internet sites to my friends to benefit from their
services", was (2.55) with deviation standards ().47), which is less than the average of the tool.
This result is positive. The arithmetic average of the 21st phrase, stating " I have the technical
knowledge enough to manage the password which depends on special programming that assist to
achieve the coordination between the password and user name", was (2.68) with deviation (1.58),
which is less than the average of the tool. This result is logical because the users, in general, are
no specialized in IT, so it is normal they have that skill. The arithmetic average of the last phrase,
stating "the subscription in the Internet sites makes me face the problem of hacking the emails",
was (2.55) with deviation standard (0.73), which is less than average of the tool. This result is
logical because the subscription in the Internet sites is not necessary to expose the user email to
be hacked. This is affirmed by the security and privacy policy being followed. Therefore, it is
obvious that users are aware of some aspect and unaware other aspects related to the protection of
the privacy and security of the password and their emails. It is good indicator to the Arab user the
members of the sample are a part thereof.
Tables 7 and 8 herein below show the results of the slight descending analysis test, by which the
differentiation of the descending analysis results obtained to ensure the validity of the model to
test the hypothesis. The data of the table 7, give evidence to the validity of the model to test the
said hypothesis, because the value of moral level (0.00) is less than (0.05). It is also obvious in the
same table the independent variable of repeated use of the email by the user when registering in
the Internet sites has construed (0.53) the difference in the variable adopted, which is "The
Protection of the Privacy and Security of the User", i.e. it is interpretable, which indicates that
there is significant statistical impact to the effect of reusing the email by the user when registering
in the Internet sites. The significance was good because the coefficient of definition was (50%).
15
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
This result was confirmed by the coefficient correlation between the two variables, which was
(0.72).
Table 7. The results of the slight descending of the relationship between the re-use of the email by the user
when registering in the Internet sites and the protection of his privacy and security
Identification
Coefficient R2
Coefficient
Correlation
R
57,581
0,256
Variable in R2
1
198
199
0,532
F Value
57,581
50,650
108,231
Moral Level Sig
Degree of Freedom
Descending
Remaining
Total
Average of Cells
Total of cells
Model
0,532
0,729
0,00
The statistical results shown t-test value point out the independent variable of repeated use of
email by the user when registering in the Internet sites impacts the protection of the privacy and
security of the user (dependent variable), as the calculation of (t value), which is moral value at
the significant level (0.05) was (0.00). So, we can conclude the following: the rejection of the
Null Hypothesis at the level (0.05) stating "there is relationship of moral statistical significance
affect at level ≤ (0.05) between the frequent use of the email by the user when registering in the
Internet sites and the protection of his privacy and security" and the acceptance of the alternative
hypothesis which indicates that there is a relation between the two variables.
Table 8. The results of the analysis of slight descending the impactful relation between the frequent use of
the email by the user when registering in the Internet sites and the protection of his privacy and security
Independent
B Value
Variable*
Re-use of the email 2,809
by the user when
registering in the
Internet sites
-0.606
Deviation
Error
0.73
0.40
Beta
0.729
t- Calculated
value
38,378
Significant
moral level
0.00
- 15.003
0.00
*The dependent variable: the Protection of the User Privacy and
6. CONCLUSIONS AND RECOMMENDATIONS
6.1 Conclusions
The results of data analysis related to the variables of the research and the tests of the hypotheses,
the following results can be concluded:
1-In respect of the variable concerning the dealing with computer technology, Internet and use of
email accounts; the result indicate the following:
16
17. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
-
-
-
All the research sample members are able to use the computer
The social communication websites are the first in the order of using, while finance and
stock sites became the last.
The highest proportion deals with Arab sites and very low percent of the sample members
do not deal with any site. This indicates that little are not interested to get knowledge
online sites.
The results reveal that more than half of the sample members have 1-2 email account
This result reflect the facts of the Arab users of emails; i.e. they do not have the culture of
multi accounts to protect their privacy by dividing such sites into main and secondary as
discussed in the theoretical framework.
The results show that the proportion of frequent email users (2) was the highest and
lowest is those who use (3) email accounts. The result is logical reflects the status of the
email users.
The results highlighted that the majority of the research sample members have work
email. This is refection to the way the sample was selected, which focused on those who
have work emails.
The results pointed out that the highest portion of the email users uses Hotmail and the
lowest uses Gmail.
The results pointed out that the highest proportion of users who have work emails to
receive their personal emails and high proportion of users have main email to receive
personal message. High per cent of the members have subsidiary email account for
subscription in Internet sites only. The results also reveal that high proportion the sample
members do not used such division of emails and get only one email. This results affirm
that not high percent divide their emails into which make their email vulnerable.
2- In respect of the frequent email use variable: it was found that the sample members, in general,
disagree with all the phrases of this variable with arithmetic average (2.23) and deviation standard
(0.80). Their answers were are positive and negative on the phrases of the variable according to
the results statistical analysis shown in the research context.
We can conclude that the main email protection and appropriate use are, to some extent, are
available to the Arab users, represented by the sample members better than the past in most
aspects, which is revealed through the differentiation of their agreement on the phrases of the
variable.
3-In respect of the Privacy and Security of the emails Variable: it was found that the sample
members, in general, disagree with all the phrases of this variable with arithmetic average (1.31)
and deviation standard (0.54). Their answers were are positive and negative on the variable
phrases according to the results statistical analysis shown in the research context. These results
confirm the results of the frequent use of email variable analysis.
4-The results of analysis the main hypothesis "there is no moral impactful of statistical
significance relation at the level ≤ (0.05) between the frequent use of the email by users when
registering in the Internet sites and the protection of his privacy and security" indicate that there is
a impactful relation of statistical significance between the frequent use of the email by the users
when registering in the Internet sites and the protection of his privacy and security. The result was
so great because the definition coefficient was (0.53) which is more than 50 percent to confirm
the good coefficient correlation between the two variables which was (0.72).
17
18. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
6.2 Recommendations
6.2.1 Recommendations relevant to the result of the field research
The users who use their emails frequently should not use the same password and user name when
registering in the Internet sites to protect their privacy and security and to use only one (private)
email to register in the Internet sites (scientific, shopping, social communication, news and egov.).
The user must not pick easy words to their user name and passwords for all their online accounts
for easy hacking, which endanger protect their privacy and security. Be sure that the sites are able
to maintain privacy and security of the users through reading the privacy and security policy by
which the user is encourage to benefit their services, the use of multi passwords for the same
account when subscribing with Internet sites, make sure that the password and user name
recovery system of the site guarantee the privacy and security of the user, reliance on the question
and answer related to user only known to the user when registering in the internet sites, and be
sure that such site don’t give the user account to others.
Do not use the service of transferring the messages from multi accounts to the main email account
for the protection of user and keep him away from the risks of transfer process because the risks
of the secondary accounts may exposed might transfer to the main account during transfer
process.
6.2.2 The Recommendation Related to the Subject of the Research
In the behaviour of re-using the same email with the same password and user name in multi
internet sites, user has to understand that there are two aspects control the determination the
password; its length and then complexity. There are certain rules, agreed by many researchers,
should be followed in writing any password [6] and [2], namely:
-
-
The password must not be sorter than 8 characteristics and not to exceed 14.
The password must contain four elements; symbols, capitals, small letters, and numbers.
If you use a capital letter, it must be placed at the beginning or end of the password.
Do not use your name or a part of your email in the password.
There are many secure sites which may save the passwords.
Do not use a password easy detected from your life in the communication sites; such as
band name, date of birth or phone number.
User when surfing web pages must be sure that the web use SSL (Secure Socket Layer)
Technology, which is used to encrypt the data and assist to save the password in the web,
and keep away from websites do not use such technology.
Never store your personal confidential data in the same website, according to [15], in
order to protect your privacy and security of the email, to be used whenever he wants to
enter a web, but to use the Federate Identity System by adding a third party to store his
confidential data and these information are encrypted when stored [15]. Encrypt system is
call knowledge protocols zero aims to secure the information from detection. The danger
still exist in case that system is hacked, then all private information of the user in all sites
will be vulnerable. Therefore, this system must be well designed to achieve high
confidentiality [16].
9- Schechter in [17] proposed a solution to manage the user ID as he used a system he
called (Social-authentication for identifying users). The system depends on questioning
trusty people selected by the user to verify the information of a third party account when
the user wishes to enter into the system, but he problem how can we find those people
18
19. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013
(third party) on time. This problem can be overcome by the intelligent phones connected
to internet or any device connected to Internet.
REFERENCES
[1]
[3]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Felten, Edward W& Gaw, Shirley, (2006)" Password Management Strategies for Online Accounts"
Proceeding SOUPS '06 Proceedings of the second symposium on Usable privacy and security Pages
44 - 55 ACM New York, NY, USA.
[2]Florence, Dinei & Herley, Cormac, (2007) "A large-scale study of web password habits" Paper
presented at the 16th international conference on World Wide Web, pp.657–666, 8–12 May, Banff,
Alberta, Canada.
Shay, Richard J. K& Spantzel Abhilasha Bhargav & Bertino, Elisa, (2007) "Password Policy
Simulation and Analysis" Proceeding DIM Proceedings of the 2007 ACM workshop on Digital
identity management ACM New York, NY, USA.
[4]A Study of the Internet Users and Privacy of Internet sites (the Saudi Ministry of communication
and IT) conducted by Information Security Team.
Takabi, Lei Jin, Hassan and Joshi, James B.D, (2011)" Analyzing security and privacy issues of using
e-mail address as identity" International Journal of Information Privacy, Security and Integrity, Vol.
1, No. 1.
Florêncio, D., Herley, C. and Coskun, B. (2007) "Do strong web passwords accomplish anything?",in
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, pp.1–6, 7 August, Boston,
MA, USA
Perlman, R. and Kaufman, C. (2008) "User-centric PKI" in Proceedings of the 7th Symposium on
Identity and Trust on the Internet, 4–6 March, pp.59–71, Gaithersburg, MD, USA.
Aspinall, D.& M Just, (2009) "Personal choice and challenge questions: a security and usability
assessment" in Proceedings of the 5th Symposium on Usable Privacy and Security, pp.1–11, 15–17
July, Mountain View, CA, USA.
Jin, L. (2010)" Investigations of Users’ and Websites’ Behaviors" available at
www.sis.pitt.edu/~leijin/investigation.htm (accessed on 1/9/2010)
Sophos "Security at risk as one third of surfers admit they use the same password for all websites",
[Online Document][cited 2010 July 14] Available HTTP.
http://www.abunawaf.com/post-5283.html
Everitt, K.M. & Bragin, T., Fogarty J. & Kohno, T. (2009) "A comprehensive study of frequency,
interference, and training of multiple graphical passwords", in Proceedings of the 27thinternational
conference on Human factors in computing systems, pp.889–898, 4–9 April, Boston, MA, USA
James, L.W. (2008) "Biometrics in identity management systems", IEEE Security and Privacy, Vol. 6,
No.2, pp.30–37.
Liao, K.C., Lee, W.H., Sung, M.H. and Lin, T.C. (2009) "A one-time password scheme with QRcode based on mobile phone", in Proceedings of the 5th International Joint Conference on INC, IMS
and IDC, pp.2069–2071, 25–27 August, Seoul, Korea.
Bertino, E., Paci, F., Ferrini, R. and Shang, N. (2009) "Privacy-preserving digital identity
management for cloud computing", IEEE Data Eng, Vol. 32, No.1, pp.21–27.
Camenisch, J. and Herreweghen, E.V. (2002) "Design and implementation of the idemix anonymous
credential system", in Proceedings of the 9th ACM conference on Computer and Communications
Security, pp.21–30, 18–22 November, Washington, DC, USA.
Schechter, S., Egelman, S. and Reeder, R.W. (2009) "It’s not what you know, but who you know: a
social approach to last-resort authentication", in Proceedings of the 27th International Conference on
Human Factors in Computing Systems, pp.1983–1992, 04–09 April, Boston, MA, USA.
19