Understanding Cyberprivacy: Context, Concept, and Issues
2022 | International Conference on Business Informatics | Citations: 0
Authors: Eltahawy, Bahaa; Dang, Duong
Abstract: Cyberprivacy has become one of the most worrisome issues in the age of digitaliz ...
Expand
Abstract: Cyberprivacy has become one of the most worrisome issues in the age of digitalization, as data breaches have increased at an alarming rate, and the development of technology has changed privacy norms themselves. Thus, maintaining cyberprivacy is important for both academia and practitioners. However, the literature on cyberprivacy is fragmented, since the topic is multidisciplinary and often confused with cybersecurity and data privacy. In this study, we seek to understand cyberprivacy by conducting a comprehensive literature review and analyzing 79 selected articles on the topic between 2008 and 2021. Our analysis shows that there are eight contexts associated with cyberprivacy. We proposed concepts on cyberprivacy from different views and highlighted four issues related to cyberprivacy for future consideration. Taken together, the knowledge on cyberprivacy, its challenges and its practices does not seem to accumulate. Consequently, there is a need for more targeted research on the topic to cover different contexts.
Collapse
Semantic filters:
end-to-end encryption
Topics:
privacy legal context differential privacy database system blockchain
Methods:
literature sample literature study
SECURING MEDICAL SAAS SOLUTIONS USING A NOVEL END-TO-END ENCRYPTION PROTOCOL
2014 | European Conference On Information Systems | Citations: 0
Abstract: E-Health solutions using the Internet provide many benefits for health centers; ...
Expand
Abstract: E-Health solutions using the Internet provide many benefits for health centers; hosting such solutions in public Cloud Computing environments as Software-as-a-Service becomes increasingly popular. However, the deployment of e-health services in shared environments is restricted due to regulations prohibiting medical data access by illegitimate parties, such as cloud computing intermediaries. A pivotal requirement is therefore having security “end-to-end”, namely from a user agent to the server process; yet there is no viable approach for contemporary browser-based SaaS solutions. This paper outlines a blueprint for e-health solution architectures featuring an end-to-end security mechanism to prevent intermediary data access and therefore to ensure appropriate patient data privacy and security. This blueprint is instantiated based on a novel security protocol, the Trusted Cloud Transfer Protocol (TCTP) in the form of a prototype implementation. The evaluation of the prototype demonstrates its fulfilment of healthcare-specific security and privacy requirements, as well as low implementation efforts for similar architectures, and no measurable performance overhead in a practical benchmark.
Collapse
Semantic filters:
end-to-end encryption
Topics:
cloud computing software as a service end-to-end encryption healthcare data data encryption
Methods:
design artifact design science qualitative interview literature study design principle