Welcome to the Globethics.net Library!

 

  • The Formation Of The Big Data Industry And Related Strategies

    Shang, Shari S.C.; Chen, Sheng-Chi (AIS Electronic Library (AISeL), 2015-12-06)
    Big Data, as moving into the post-cloud era in year 2015, is changing the way software is applied by industries. Meanwhile, the Open Data is transforming the sources of value for software development in which comprehensive digital data value creation is set to be the mainstream in IT application strategies. Big Data applications can enhance the knowledge level of technology applications as well as drive value growth for products and services. The key issue affecting Big Data development is the question of how to leverage mechanisms for joint creation by the general public to identify the value that Big Data can provide. This paper proposes that an effective Big Data industry ecosystem should encompass data owners, application innovators, technology leaders, and open API platforms. Using the methods of design science, the paper evaluates the way in which Big Data creates value in the industrial development process, and argues that it is important to attract mass participation and to satisfy the needs of both industrial and social development when putting forward a value proposition. Moving further, the next step is value creation initiatives, in which the first priority should be to promote the digitalization of industry seeking to create digitalized industries that can contribute to the gradual optimization of the industrial ecosystem as a whole.
  • Isolation in Cloud Computing and Privacy-Enhancing Technologies Suitability of Privacy-Enhancing Technologies for Separating Data Usage in Business Processes

    Sonehara, Noboru; Echizen, Isao; Wohlgemuth, Sven (AIS Electronic Library (AISeL), 2011-06-17)
    Cloud Computing lifts the borders betweenthe access control domain of individuals’and companies’ IT systemsby processing their data within the applicationframeworks and virtualizedruntime environments of Cloud serviceproviders. A deployment of traditionalsecurity policies for enforcing confidentialityof Cloud users’ data wouldlead to a conflict with the availabilityof the Cloud’s software services: confidentialityof data would be assured butCloud services would not be availablefor every user of a Cloud. This stateof-the-art contribution shows the analogyof the confidentiality of externaldata processing by Cloud services withmechanisms known and applied in privacy.Sustainability in Cloud is a matterof privacy, which in Cloud is called “isolation”.
  • Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing

    Huang, Qinlong; 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 3. Beijing National Security Science and Technology Co. Ltd, Beijing 100086, China; Ma, Zhaofeng; 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 3. Beijing National Security Science and Technology Co. Ltd, Beijing 100086, China; Fu, Jingyi; 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China 3. Beijing National Security Science and Technology Co. Ltd, Beijing 100086, China; Niu, Xinxin; 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China; Yang, Yixian; 1. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China 2. National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China (ACADEMY PUBLISHER, 2013-11-01)
    The existing digital rights management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, we propose an attribute-based DRM scheme in cloud computing by combining the techniques of ciphertext-policy attribute-based encryption (CP-ABE) and proxy re-encryption (PRE). We first divide the content encryption key into two parts, content master key and assistant key. Then we enforce access policies based on attributes to distribute the content master key securely. Thus the users who satisfy the access policy can recover the content master key, and then obtain assistant key from the key server and decrypt the content. Furthermore, we achieve efficient attribute and user revocation by allowing the attribute authority to delegate the key server to refuse to issue the assistant key for the revoked users. The security and performance analyses indicate that the proposed scheme is secure, efficient, and privacy-preserving. 
  • Using the Internet for Health-Related Information from Perspectives of the Patients with Chronic Diseases and Their Relatives

    AKMAN YILMAZ, Arzu; ; BOLU ABANT İZZET BAYSAL ÜNİVERSİTESİ; IZGU, Nur; ; Hacettepe University; KAV, Sultan; ; Baskent University; ÖZHAN ELBAŞ, Nalan; ; Baskent University (Süleyman Demirel UniversitySüleyman Demirel Üniversitesi, 2020-06-15)
    Objective: This study was conducted to investigate patients’ with chronic diseases and their relatives’experiences and characteristics of internet usage for access to health-related information.Material-Method: 196 patients and 171 relatives included in this study. The data of the study was collected using literature based questionnaires developed by the researchers.Results: In the study, 68.8% of the patients and 71.9% of the relatives used internet for access to health-related information. The difference between participants in terms of using the internet for health-related information was determined in variables including age, type and numbers of chronic diseases. Additionally, their internet using frequency, searching topics and online resources used to access to health-related information were significantly different (p<0.05). More than half of the participants (Patients: 65.4%; Relatives:56.9%) stated they did not share the information obtained from the internet with health care providers, and no internet source has been recommended by health professionals.Conclusions: Results of the study indicated that although characteristics of seeking health related information on the internet were different between patients and relatives, their experiences and opinions were similar on the issue. According to this, health care professionals should consider the internet usage status for access to health-related information of the patients and relatives and lead them to use reliable and up to date internet resources.
  • Let the People Know the Facts: Can Government Information Removed From the Internet Be Reclaimed?

    Mart, Susan Nevelow (eScholarship, University of California, 2005-09-07)
    This article examines the legal bases of the public's right to access government information, and examines and analyzes the types of information that have recently been removed from the Internet and the rationales given for the removals. The concerted use of FOIA by public interest groups and their constituents is suggested as a possible method of returning the information to the Internet.

View more