GR Semicolon EN

Show simple item record

dc.contributor.author
Papakyriazis, Ioannis
en
dc.date.accessioned
2015-06-23T14:20:52Z
dc.date.available
2015-09-27T05:58:30Z
dc.date.issued
2015-06-23
dc.identifier.uri
https://repository.ihu.edu.gr//xmlui/handle/11544/498
dc.rights
Default License
dc.title
An analysis and a web based wizardlike decision support system to countermeasure electronic surveillance
en
heal.type
masterThesis
heal.keyword
Security, International
en
heal.keyword
Computer networks--Security measure
en
heal.keyword
Internet--Security measures
en
heal.keyword
Internet Society
en
heal.keyword
Privacy, Right of
en
heal.keyword
Dissertations, Academic
en
heal.keywordURI.LCSH
Privacy
heal.keywordURI.LCSH
surveillance
heal.keywordURI.LCSH
security
heal.keywordURI.LCSH
NSA
heal.keywordURI.LCSH
Technology Acceptance Model
heal.keywordURI.LCSH
questionnaire
heal.keywordURI.LCSH
countermeasures
heal.keywordURI.LCSH
wizard
heal.keywordURI.LCSH
proposals
heal.language
en
heal.access
free
el
heal.license
http://creativecommons.org/licenses/by-nc/4.0
heal.recordProvider
School of Science and Technology, MSc in Information & Communication Technology Systems
heal.publicationDate
2013-12
heal.bibliographicCitation
Papakyriazis Ioannis, 2013, An analysis and a web based wizard-like decision support system to countermeasure electronic surveillance,Master's Dissertation, International Hellenic University
en
heal.abstract
The topic of online privacy, seen as an extremely valuable but endangered commodity is analyzed within the scope of recent developments. Online privacy is a fundamental right of every individual, but at the same time it is not easily defined or borderlined. As a result, it is under permanent threat for violation and given the latest surveillance facts is one of the topics on top of the list of global interest for more awareness and transparency. The main thesis of this project is that individual users should try to keep an acceptable level of privacy by applying practices that help him be as immune as possible to both state and corporate arbitrariness. After a n extensive literature review of surveillance, privacy and notions about modern state and corporate monitoring, the key theories of technology acceptance are analyzed and some modifications are proposed for connecting social psychology with tangible results, with the use of some privacy and technology competence related survey tools. The results of those tools are then analyzed to drive to the practical part of the project, which is a simple wizard-like decision support system that helps the individual achieve the maximum possible personal level of privacy, regarding his technology level and habits. Following this work, a number of additions should be applied so that it best integrates to the future nature of online security problems related to the topic.
en
heal.tableOfContents
ABSTRACT .................................................................................................................... 3 CONTENTS .................................................................................................................... 5 1 INTRODUCTION ...................................................................................................... 7 1.1 MOTIVATION ....................................................................................................... 7 1.2 RISE OF A NEW ERA OF SURVEILLANCE ............................................................. 9 1.3 ROADMAP ......................................................................................................... 10 2 LITERATURE REVIEW ........................................................................................ 11 2.1 DEFINITIONS AND NOTIONS ABOUT SURVEILLANCE AND PRIVACY ................... 11 2.1.1 Surveillance ........................................................................................ 11 2.1.2 Information Privacy and relation to surveillance .......................... 12 2.2 SURVEILLANCE SOCIETY ................................................................................. 13 2.2.1 Facts about surveillance and privacy ............................................. 16 2.2.2 Metadata ............................................................................................. 17 2.3 PRISM AND OTHER SURVEILLANCE PROGRAMS ............................................. 18 2.3.1 PRISM ................................................................................................. 18 2.3.2 XkeyScore and Bullrun ..................................................................... 21 2.4 SURVEILLANCE ON NON-AMERICAN CITIZENS ................................................. 25 2.5 POSSIBLE COUNTERMEASURES TO SURVEILLANCE ......................................... 25 2.5.1 D-Central ............................................................................................ 26 2.5.2 Hemlis ................................................................................................. 27 2.5.3 Dark Mail Alliance ............................................................................. 27 2.6 THEORETICAL FOUNDATIONS OF TECHNOLOGY ACCEPTANCE ........................ 28 2.6.1 Theory of Reasoned Action (TRA) ................................................. 28 2.6.2 Theory of planned Behavior (TPB) ................................................. 29 2.6.3 Technology acceptance model (TAM) ........................................... 29 2.6.4 Some more theory based on TAM ................................................. 30 2.6.5 Need for a new conceptual model .................................................. 32 3 PROBLEM DEFINITION AND ARCHITECTURE ............................................ 33 3.1 THE PROBLEM OF PRIVACY VIOLATION ............................................................ 33 3.2 MODIFYING TAM ............................................................................................. 35 3.2.1 Level of Technical Competence (LTC) .......................................... 36 3.2.2 Need for Privacy (PRIV) .................................................................. 37 3.2.3 Perceived Ease of Use (PEOU) ..................................................... 38 3.3 RELATIONS OF THE VARIABLES ....................................................................... 38 3.3.1 Breaking down the tables ................................................................ 39 3.4 DATA COLLECTION AND ANALYSIS ................................................................... 40 3.4.1 Level of Technical Competence (LTC) quiz ................................. 41 3.4.2 Need for privacy ................................................................................ 45 4 IMPLEMENTATION .............................................................................................. 47 4.1 CLASSIFICATION OF PRIVACY ENHANCING PROPOSALS .................................. 47 4.1.1 Browsers and browser addons ....................................................... 49 4.1.2 Web search Alternatives .................................................................. 54 4.1.3 Email clients and services ............................................................... 54 4.1.4 Email clients addons ........................................................................ 55 4.1.5 Generic Privacy enhancing tools .................................................... 55 4.2 DEVELOPMENT TECHNOLOGY: THE JOOMLA CMS ........................................ 56 4.3 DEVELOPMENT CORE: THE WIZARD ................................................................ 56 4.3.1 Step One: The flow ........................................................................... 57 4.3.2 Step Two: The questions ................................................................. 57 4.4 SAMPLE QUESTION FLOW (WORKING EXAMPLE) ............................................. 58 5 CONCLUSION AND FUTURE WORK .............................................................. 62 5.1 CONTRIBUTION AND ORIGINALITY .................................................................... 62 5.2 PERSONAL REFLECTION .................................................................................. 62 5.3 FUTURE IMPROVEMENTS ................................................................................. 63 5.4 CONCLUSIONS ................................................................................................. 64 6 BIBLIOGRAPHY ................................................................................................... 65 7 APPENDIX ............................................................................................................. 68 7.1 GOOGLE SCRIPT FOR GRADING THE QUIZ ....................................................... 68 7.2 SOFTWARE INSTALLATION GUIDE .................................................................... 70 7.3 PRIVACY ENHANCING WIZARD XML FILE ......................................................... 71
en
heal.advisorName
Katos, Prof. Vasileios
en
heal.committeeMemberName
Katos, Prof. Vasileios
en
heal.committeeMemberName
Ass. Prof. Bassileiades, Nick
en
heal.committeeMemberName
Koutitas, G.
en
heal.academicPublisher
School of Science &Technology, Master of Science (MSc) in Information and Communication Systems
en
heal.academicPublisherID
ihu
heal.numberOfPages
76
heal.fullTextAvailability
true


This item appears in the following Collection(s)

Show simple item record

Related Items