Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Engineering
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Alberto Coustasse, DrPH, MD, MBA, MPH
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Ransomware In Healthcare Facilities: The Future Is Now, Nikki Spence, David P. Paul Iii, Alberto Coustasse
Management Faculty Research
Cybercriminals have begun to target the healthcare industry with a type of malware called ransomware, malware that encrypts an infected device and any attached devices or network drives. After encryption, cybercriminals demand a sum of money, also known as a “ransom,” to release the devices from encryption. Without adequate disaster recovery and backup plans, many businesses are forced to pay the ransom. The purpose of this study was to determine the extent of recent ransomware infections in healthcare settings, the risk liabilities and cost associated with such infections, and to determine possible risk mitigation tactics. Financial costs associated with business …
Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo
Data Masking, Encryption, And Their Effect On Classification Performance: Trade-Offs Between Data Security And Utility, Juan C. Asenjo
CCE Theses and Dissertations
As data mining increasingly shapes organizational decision-making, the quality of its results must be questioned to ensure trust in the technology. Inaccuracies can mislead decision-makers and cause costly mistakes. With more data collected for analytical purposes, privacy is also a major concern. Data security policies and regulations are increasingly put in place to manage risks, but these policies and regulations often employ technologies that substitute and/or suppress sensitive details contained in the data sets being mined. Data masking and substitution and/or data encryption and suppression of sensitive attributes from data sets can limit access to important details. It is believed …
Blown To Bits Project, David Schmidt
Blown To Bits Project, David Schmidt
Informatics Open Educational Resources
The book, Blown to Bits, uncovers the many ways that the new digital world has changed and is changing our whole environment. Some changes are incremental but others are more revolutionary. Some of the changes that we welcome are slowly eroding our privacy and are changing the rules of ownership. This book illuminates the complexities of these changes. I have attempted to capture the central points in selected chapters, and in some cases I have added new material or new examples to replace dated material. I picked chapters to summarize that address the following topics (and more). There are many …
Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman
Analysis Of Outsourcing Data To The Cloud Using Autonomous Key Generation, Mortada Abdulwahed Aman
Masters Theses
"Cloud computing, a technology that enables users to store and manage their data at a low cost and high availability, has been emerging for the past few decades because of the many services it provides. One of the many services cloud computing provides to its users is data storage. The majority of the users of this service are still concerned to outsource their data due to the integrity and confidentiality issues, as well as performance and cost issues, that come along with it. These issues make it necessary to encrypt data prior to outsourcing it to the cloud. However, encrypting …