1. Data breaches in healthcare: security mechanisms for attack mitigationLili Nemec Zlatolas, Tatjana Welzer-Družovec, Lenka Lhotska, 2024, original scientific article Abstract: The digitalisation of healthcare has increased the risk of cyberattacks in this sector, targeting sensitive personal information. In this paper, we conduct a systematic review of existing solutions for data breach mitigation in healthcare, analysing 99 research papers. There is a growing trend in research emphasising the security of electronic health records, data storage, access control, and personal health records. The analysis identified the adoption of advanced technologies, including Blockchain and Artificial Intelligence, alongside encryption in developing resilient solutions. These technologies lay the foundations for addressing the prevailing cybersecurity threats, with a particular focus on hacking or malicious attacks, followed by unauthorised access. The research highlights the development of strategies to mitigate data breaches and stresses the importance of technological progress in strengthening data security. The paper outlines future directions, highlighting the need for continuous technological progress and identifying the gaps in the attack mitigations. Keywords: data security, privacy, sensitive personal information, electronic health records, cybersecurity Published in DKUM: 23.08.2024; Views: 109; Downloads: 9
Full text (1,51 MB) |
2. Cyber (in)security of personal data and information in times of digitizationMiha Dvojmoč, Mojca Tancer Verboten, 2022, original scientific article Abstract: In an employment relationship, work and pay are no longer the only important aspects, as importance is increasingly shifting toward obligations concerning the protection of personal data and privacy arising from the prohibition of causing harm to the employer and the duty of loyalty to the employer. The article deals with the constitutionally protected right to privacy and the protection of personal data from the point of view of ensuring cyber security at the employer. The employer is obligated to protect the right to privacy by legal provisions, whereas from the point of view of ensuring the protection of privacy and information, the employer must protect, first and foremost, the personal data of employees. The main purpose of the legal protection of personal data is the lawful and fair processing of the personal data of individuals. Employers are thus facing an increasing number of risks related to the safety of employees and the security of business processes, and it is therefore important to establish comprehensive corporate security to ensure adequate security across all levels. Keywords: cyber security, protection of personal data, protection of privacy, cyber threats, protection of business secrets Published in DKUM: 11.06.2024; Views: 150; Downloads: 30
Full text (375,13 KB) This document has many files! More... |
3. Cyber Security- Training Students and Scholars for the Challenges of Information and Communication Technologies in Research and Studies for Internationalisation : handbook2023 Abstract: This handbook is a product of the Erasmus+ Strategic Partnership between the partners Université Polytéchnique Hauts-de-France, Politechnika Poznanska, Brandenburgische Technische Universität Cottbus-Senftenberg and the coordinator University of Maribor. Contentuous contribution were made by staff of University of Maribor and Politechnika Poznanska, evaluations by staff of the other two partners. The handbooks handles virtual learning environments in the international education and research area and exposure of the systems to cybercrime. Besides introductory contributions on legal aspects of challenges in the fields of human rights, European regulations of data security, civil law and criminal law aspects of caber security of virtual learning environments and methodologies of their introduction w8ithin organisations, the handbook also gives useful instructions for elaboration of virtual courses within virtual learning environments relevant for the internationalised research and education not only since the Covid-19 pandemic. The handbook is dedicated to use on the internet within the Moodle system. Keywords: cyber security, virtual learning environment, data security, cyber crime, systems Published in DKUM: 13.04.2023; Views: 554; Downloads: 43
Full text (5,72 MB) This document has many files! More... |
4. Security analysis and improvements to the psychopass methodBoštjan Brumen, Marjan Heričko, Ivan Rozman, Marko Hölbl, 2013, original scientific article Abstract: Background: In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed.
Objective: To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method.
Methods: We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses.
Results: The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart.
Conclusions: The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. Keywords: passwords, cryptanalysis, data security Published in DKUM: 02.08.2017; Views: 1339; Downloads: 703
Full text (542,01 KB) This document has many files! More... |
5. Outsourcing medical data analyses : can technology overcome legal, privacy and confidentiality issues?Boštjan Brumen, Marjan Heričko, Andrej Sevčnikar, Jernej Završnik, Marko Hölbl, 2013, original scientific article Abstract: Background: Medical data are gold mines for deriving the knowledge that could change the course of a single patient’s life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner.
Objective: Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data.
Methods: Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different.
Results: The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P=.19).
Conclusions: The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data. Keywords: medical data, disclosure control, medical confidentiality, data analysis, data security Published in DKUM: 02.08.2017; Views: 1383; Downloads: 225
Full text (3,34 MB) This document has many files! More... |
6. E-everything: e-commerce, e-government, e-household, e-democracy : conference proceedings2001 Keywords: electronic commerce, CD-ROM, computer diskette, compact disc, government, administration, budgets, democration, computer application, users, electronic money, electronic payments, security, data analysis, information system, information science, business, commerce, models, advertising, Internet, computer networks, electronic mail, services, media, public services, regional policy, cases, retail trade Published in DKUM: 01.06.2012; Views: 1989; Downloads: 36
Link to full text |
7. E-everything: e-commerce, e-government, e-household, e-democracy : proceedings2001, proceedings Keywords: electronic commerce, government, administration, budgets, democration, computer application, users, electronic money, electronic payments, security, data analysis, information system, information science, business, commerce, models, advertising, Internet, computer networks, electronic mail, services, media, public services, regional policy, cases, retail trade Published in DKUM: 01.06.2012; Views: 2350; Downloads: 58
Link to full text |
8. Building data mining applications for CRMAlex Berson, Stephen Smith, Kurt Thearling, manual Keywords: information society, informatics, information technology, computer networks, internet, enterprise, electronic commerce, electronic marketing, marketing strategy, new economy, data warehousing, data base, data analysis, security, application, data structures, customer, information resources, consumer, statistics, cluster analysis, neural networks, data, trends, cases, case study Published in DKUM: 01.06.2012; Views: 2743; Downloads: 87
Link to full text |
9. An algorithm for protecting knowledge discovery dataBoštjan Brumen, Izidor Golob, Tatjana Welzer-Družovec, Ivan Rozman, Marjan Družovec, Hannu Jaakkola, 2003, original scientific article Abstract: In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data values are preserved while the values themselves change, so that the resulting model is equivalent to the one built with original data. The presented formal approach is especially useful when the knowledge discovery process is outsourced. The application of the algorithm is demonstrated through an example. Keywords: data protection algorithm, classification algorithm, disclosure control, data mining, knowledge discovery, data security Published in DKUM: 01.06.2012; Views: 2365; Downloads: 58
Link to full text |