Search results

1 – 10 of over 197000
Article
Publication date: 15 March 2023

Qiao Li, Chunfeng Liu, Jingrui Hou and Ping Wang

As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship…

Abstract

Purpose

As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship between data search and access and the cognitive mechanisms underlying this relationship, this paper examines the associations between affective memories, perceived value, search effort and the intention to access data during users' interactions with data retrieval systems.

Design/methodology/approach

This study conducted a user experiment for which 48 doctoral students from different disciplines were recruited. The authors collected search logs, screen recordings, questionnaires and eye movement data during the interactive data search. Multiple linear regression was used to test the hypotheses.

Findings

The results indicate that positive affective memories positively affect perceived value, while the effects of negative affective memories on perceived value are nonsignificant. Utility value positively affects search effort, while attainment value negatively affects search effort. Moreover, search effort partially positively affects the intention to access data, and it serves a full mediating role in the effects of utility value and attainment value on the intention to access data.

Originality/value

Through the comparison between the findings of this study and relevant findings in information search studies, this paper reveals the specificity of behaviour and cognitive processes during data search and access and the special characteristics of data discovery tasks. It sheds light on the inhibiting effect of attainment value and the motivating effect of utility value on data search and the intention to access data. Moreover, this paper provides new insights into the role of memory bias in the relationships between affective memories and data searchers' perceived value.

Details

Journal of Documentation, vol. 79 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 15 January 2019

Spyros E. Polykalas and George N. Prezerakos

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant interaction…

2838

Abstract

Purpose

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant interaction takes place via native mobile apps that can be downloaded either freely or at a cost. This has opened the door to a number of issues related to privacy protection since the smartphone stores and processes personal data. The purpose of this paper is to examine the extent of access to personal data, required by the most popular mobile apps available in Google Play store. In addition, it is examined whether the relevant procedure is in accordance with the provisions of the new EU Regulation.

Design/methodology/approach

The paper examines more than a thousand mobile apps, available from the Google Play store, with respect to the extent of the requests for access to personal data. In particular, for each available category in Google Play store, the most popular mobile apps have been examined both for free and paid apps. In addition, the permissions required by free and paid mobile apps are compared. Furthermore, a correlation analysis is carried out aiming to reveal any correlation between the extent of required access to personal data and the popularity and the rating of each mobile app.

Findings

The findings of this paper suggest that the majority of examined mobile apps require access to personal data to a high extent. In addition, it is found that free mobile apps request access to personal data in a higher extent compared to the relevant requests by paid apps, which indicates strongly that the business model of free mobile apps is based on personal data exploitation. The most popular types of access permissions are revealed for both free and paid apps. In addition, important questions are raised in relation to user awareness and behavior, data minimization and purpose limitation for free and paid mobile apps.

Originality/value

In this study, the process and the extent of access to personal data through mobile apps are analyzed. Although several studies analyzed relevant issues in the past, the originality of this research is mainly based on the following facts: first, this work took into account the recent Regulation of the EU in relation to personal data (GDPR); second, the authors analyzed a high number of the most popular mobile apps (more than a thousand); and third, the authors compare and analyze the different approaches followed between free and paid mobile apps.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 2
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 1 March 2022

K. Madhura and R. Mahalakshmi

The blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and…

1284

Abstract

Purpose

The blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and requires a defined and arbitrary system for protective information sharing. The primary analysis of defining and providing the access to the data or information is proposed in this article. The major challenge faced by organizations is providing and maintaining security to the cumulated data infrastructure, protecting the confidential data flow within the infrastructure and to ascertain ethical operations within the organization.

Design/methodology/approach

In this paper, a top-down approach is utilized to solve the issues faced during confidential data storage, track and alert internal malignant access. The web content management system (WCMS) market is growing and the challenging desideratum of solving security issues are incrementing. This research proposes a top-down security implementation methodology which alters the access control of the organization running the WCMS, it is a highly secure access-control with activity tracker that records who did what activity and who is responsible for malignant access tracker.

Findings

The upgraded access control system is implemented utilizing the most influential blockchain technology where the hash engendered by the Inter Planetary File System (IPFS) cloud is stored on the block to implement a confidential data tracker; a supplemental level of security is integrated to the admin by verifying its account ID by storing it on to the astute contracts and applying two-step authentication. A caliber of security is integrated during storage by integrating RHS encryption.

Research limitations/implications

This system is proposed for the confidential student data storage (for e.g. educational documents, marks cards etc.) and tracking maleficent access.

Originality/value

The upgraded access control system is implemented using the most influential blockchain technology where the hash generated by the IPFS cloud is stored on the block to implement a confidential data tracker, an additional level of security is added to the admin by verifying its account ID by storing it on to the smart contracts and applying two-step authentication.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 16 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 30 July 2021

Tanvi Garg, Navid Kagalwalla, Shubha Puthran, Prathamesh Churi and Ambika Pawar

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of…

Abstract

Purpose

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of health-care infrastructure, effective treatment given to patients and encourage the development of new health-care technologies by researchers. These objectives are achieved through the proposed system, a “privacy-aware data tagging system using role-based access control for health-care data.”

Design/methodology/approach

Health-care data must be stored and shared in such a manner that the privacy of the patient is maintained. The method proposed, uses data tags to classify health-care data into various color codes which signify the sensitivity of data. It makes use of the ARX tool to anonymize raw health-care data and uses role-based access control as a means of ensuring only authenticated persons can access the data.

Findings

The system integrates the tagging and anonymizing of health-care data coupled with robust access control policies into one architecture. The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control.

Originality/value

The paper integrates three disparate topics – data tagging, anonymization and role-based access policies into one seamless architecture. Codifying health-care data into different tags based on International Classification of Diseases 10th Revision (ICD-10) codes and applying varying levels of anonymization for each data tag along with role-based access policies is unique to the system and also ensures the usability of data for research.

Details

World Journal of Engineering, vol. 20 no. 1
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 1992

Alice Robbin

The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the…

Abstract

The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the scientific enterprise. Between 1985 and 1990, the Survey of Income and Program Participation (SIPP) ACCESS data facility at the University of Wisconsin‐Madison provided social scientists in the United States and elsewhere with access through the electronic networks to complex and dynamic statistical data; the 1984 SIPP is a longitudinal panel survey designed to examine economic well‐being in the United States. This article describes the conceptual framework and design of SIPP ACCESS; examines how network users communicated with the SIPP ACCESS project staff about the SIPP data; and evaluates one outcome derived from the communications, the improvement of the quality of the SIPP data. The direct and indirect benefits to social scientists of electronic networks are discussed. The author concludes with a series of policy recommendations that link the assessment of our inadequate knowledge base for evaluating how electronic networks advance the scientific enterprise and the SIPP ACCESS research network experience to the policy initiatives of the High Performance Computing Act of 1991 (P.L. 102–194) and the related extensive recommendations embodied in Grand Challenges 1993 High Performance Computing and Communications (The FY 1993 U.S. Research and Development Program).

Details

Internet Research, vol. 2 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 1 January 1995

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's…

Abstract

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's resources follow. Each agency will implement the GCDIS at its own pace.

Details

Library Hi Tech, vol. 13 no. 1/2
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 9 April 2024

Ishrat Ayub Sofi, Ajra Bhat and Rahat Gulzar

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Abstract

Purpose

The study aims to shed light on the current state of “Dataset repositories” indexed in Directory of Open Access Repositories (OpenDOAR).

Design/methodology/approach

From each repository/record information, the Open-Access Policies, Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH), year of creation and the number of data sets archived in the repositories were manually searched, documented and analyzed.

Findings

Developed countries like the United Kingdom and the USA are primarily involved in the development of institutional open-access repositories comprising significant components of OpenDOAR. The most extensively used software is DSpace. Most data set archives are OAI-PMH compliant but do not follow open-access rules. The study also highlights the sites’ embrace of Web 2.0 capabilities and discovers really simple syndication feeds and Atom integration. The use of social media has made its presence known. Furthermore, the study concludes that the number of data sets kept in repositories is insufficient, although the expansion of such repositories has been consistent over the years.

Practical implications

The work has the potential to benefit both researchers in general and policymakers in particular. Scholars interested in research data, data sharing and data reuse can learn about the present state of repositories that preserve data sets in OpenDOAR. At the same time, policymakers can develop recommendations and policies to assist in the construction and maintenance of repositories for data sets.

Originality/value

According to the literature, there have been numerous studies on open-access repositories and OpenDOAR internationally, but no research has focused on repositories preserving content-type data sets. As a result, the study attempts to uncover various characteristics of OpenDOAR Data set repositories.

Details

Digital Library Perspectives, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2059-5816

Keywords

Book part
Publication date: 28 June 1991

Karen Horny

Abstract

Details

Library Technical Services: Operations and Management
Type: Book
ISBN: 978-1-84950-795-0

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1037

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 197000