Pregled bibliografske jedinice broj: 430153
The Influence of Increasing Security Systems and the Destruction of Privacy
The Influence of Increasing Security Systems and the Destruction of Privacy // Proceedings of the 1st International Conference on Information Society and Information Technologies ISIT 2009 / Matej Mertik, Nadja Damij (ur.).
Dolenjske Toplice: Fakulteta za informacijske študije v Novem mestu, 2009. (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 430153 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
The Influence of Increasing Security Systems and the Destruction of Privacy
Autori
Bača, Miroslav ; Schatten, Markus
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the 1st International Conference on Information Society and Information Technologies ISIT 2009
/ Matej Mertik, Nadja Damij - Dolenjske Toplice : Fakulteta za informacijske študije v Novem mestu, 2009
Skup
1st International Conference on Information Society and Information Technologies ISIT 2009
Mjesto i datum
Dolenjske Toplice, Slovenija, 12.10.2009. - 13.10.2009
Vrsta sudjelovanja
Predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
security; privacy; open systems; protection; cancellable biometrics
Sažetak
The strong development of information and communication technology (ICT) as well as the fact that there are currently over 800 million on-line users worldwide, bring us to the position of rethinking carefully about where all this data is going. Sending and receiving secure data is a well known concept. But what about data in the "open space" where everyone who knows how and has adequate technology can intercept or eavedrop our data and use it against us, to harm us or our family or to destroy the organization where we working in. The traditional answer to these influences is the development of strong security mechanisms and systems which will be able to protect us (in most cases) from our self and from others as well. Such security systems have the possibility to monitor all communication between users in a specific network or subnet and collect all information exchanged between them. And this is what we see as the main problem. Someone who monitors the system has access to all information about the network's users and can take advantage of these data as he pleases. This means that someone always has full access to all private user data. Herein we introduce some ways of protecting users from legally monitoring of their private data.
Izvorni jezik
Engleski
Znanstvena područja
Informacijske i komunikacijske znanosti
POVEZANOST RADA
Projekti:
016-0161199-1721 - Metodika evaluacije biometrijskih karakterstika (Bača, Miroslav, MZOS ) ( CroRIS)
Ustanove:
Fakultet organizacije i informatike, Varaždin