Search
Skip to Search Results- 1Akinade, Sarat Kehinde
- 1Alghamdi, Mazen
- 1Doshi, Dhruvilkumar
- 1Gondaliya, Krishna
- 1Kosasih, Wilson
- 1MacDormand, Scott
- 7Concordia University of Edmonton
- 5Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 2Concordia University of Edmonton/Master of Science in Information Technology Project Reports (Concordia University of Edmonton)
- 1University of Alberta Library
- 1University of Alberta Library/Libraries Staff Publications
-
12/18/2014
While privacy issues in children's mobile applications are becoming increasingly sophisticated, the permissions in these applications are undergoing development without proper security implementation. Mobile applications with excessive privacy features can cause serious data leakages and other...
-
Biometrics privacy impact assessment checklist for public educational institutions in Alberta
Download11/28/2010
This research stems from an assumption that the use of biometrics will eventually become commonplace in public educational institutions in Alberta. This paper proposes a Biometrics Privacy Impact Assessment Checklist (BPIAC) that can be used by public educational institutions in Alberta during...
-
2020
Database as a Service (DBaaS) is one of the key cloud computing services that is well-known as a type of Application-as-a-Service which gives users access to a database without downloading and installing software or performance configuration but maintains the customers database. DBaaS assumes the...
-
2022
With the easing of COVID-19 regulations in Alberta, people are gradually back to their normal life. However, we cannot be careless, since there is a possibility for a new variant. The technology could help to prevent the further spread of the pandemic. In addition, in terms of contact tracing,...
-
2022
A wide range of application sectors is progressively using machine learning (ML). A successful ML model often requires a huge amount of training data and powerful computational resources. Due to thepotential risks of highly sensitive information being leaked, the need for and use of such enormous...
-
Proxying the Data Body: Artificial Intelligence, Federated Identity, and Machinic Subjection
Download2020-08-06
Academic libraries have recently seen a shift from self-management of user-authentication of licensed resources themselves, to cloud-based implementations of "federated identity" technologies. Such technologies aim to solve the problems of fragile access to licensed resources while also better...
-
2022
This research analyzed selected contact tracing applications to identify potential vulnerabilities and geolocation of services used by these applications. MobSF framework and Android emulators were used to perform static and dynamic analysis of the applications. Security policies of applications...
-
2020
Intelligent Chatbot services become one of the mainstream applications in user help and many other areas. Apart from bringing numerous benefits to users these services may bring additional risks to the companies that employ them. The study starts with the review of the scale of chatbot industry...