دانلود رایگان مقاله انگلیسی امنیت کامپیوتر برای فن آوری های جمع آوری داده ها - الزویر 2017

عنوان فارسی
امنیت کامپیوتر برای فن آوری های جمع آوری داده ها
عنوان انگلیسی
Computer security for data collection technologies
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
28
سال انتشار
2017
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6521
رشته های مرتبط با این مقاله
مهندسی کامپیوتر
گرایش های مرتبط با این مقاله
امنیت اطلاعات
مجله
مهندسی توسعه - Development Engineering
دانشگاه
ICTD Lab and Computer Security & Privacy Research Lab Computer Science & Engineering - University of Washington - USA
کلمات کلیدی
ICTD، مجموعه داده ها، امنیت
چکیده

Abstract


Many organizations in the developing world (e.g., NGOs), include digital data collection in their workflow. Data collected can include information that may be considered sensitive, such as medical or socioeconomic data, and which could be affected by computer security attacks or unintentional mishandling. The attitudes and practices of organizations collecting data have implications for confidentiality, availability, and integrity of data. This work, a collaboration between computer security and ICTD researchers, explores security and privacy attitudes, practices, and needs within organizations that use Open Data Kit (ODK), a prominent digital data collection platform. We conduct a detailed threat modeling exercise to inform our view on potential security threats, and then conduct and analyze a survey and interviews with technology experts in these organizations to ground this analysis in real deployment experiences. We then reflect upon our results, drawing lessons for both organizations collecting data and for tool developers.

نتیجه گیری

9. Conclusion


Digital data collection is an important activity for many organizations in the developing world. We focused on ODK as a widespread digital data collection platform and conduct a computer security threat modeling exercise to evaluate attacks that could target ODK deployments. We conducted a survey and interviews with organizations using ODK to understand what threat models are considered in the field. Leveraging our threat model, survey, and interview results, we explore the challenges of computer security in digital data collection in an ICTD context and make recommendations to organizations seeking to keep their data secure.


بدون دیدگاه