Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Information Security
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
User Privacy Suffers At The Hands Of Access Controls, Chad N. Hoye
KSU Proceedings on Cybersecurity Education, Research and Practice
With advancements in personal hand held devices, smaller more mobile computers, tablets, and the world’s population connected with social media the threat to the user’s privacy has been diminished. I will look at how access control policies have opened the proverbial door to user’s privacy being attacked and threatened. You will see examples of how users have to divulge personal information to get better service and even be monitored while at work to prevent intrusions in to the company.