2022
DOI: 10.1016/j.telpol.2022.102334
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in AI and the IoT: The privacy concerns of smart speaker users and the Personal Information Protection Law in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…Next is FTP mode, that is, File Transfer Protocol, abbreviated as "File Protocol," mainly used for two-way transmission on the Internet, is a file distribution method similar to HTTP [12]. FTP is an application layer protocol based on C/S architecture, and the underlying application is TCP/IP protocol to ensure the reliability of transmission.…”
Section: Data File Transmissionmentioning
confidence: 99%
See 1 more Smart Citation
“…Next is FTP mode, that is, File Transfer Protocol, abbreviated as "File Protocol," mainly used for two-way transmission on the Internet, is a file distribution method similar to HTTP [12]. FTP is an application layer protocol based on C/S architecture, and the underlying application is TCP/IP protocol to ensure the reliability of transmission.…”
Section: Data File Transmissionmentioning
confidence: 99%
“…For Figure 7, traditional pasv mode, because the server will open a port for the client to connect, but if the opening of this port does not detect which client's IP is connected, then the security of the data file is naturally threatened and affected when the interaction is carried out. Also, since many FTP servers open data connections randomly, if the FTP server does not determine whether the port requested by the client is a legitimate login when receiving data, other illegal users may attack it in order to get some critical data files [12]. In addition, the FTP server can also generate buffer overflow when interacting with data files on the client side, which can cause data file loss problems.…”
Section: General Framework Of Data File Security Policy Undermentioning
confidence: 99%
“…A large number of studies on teens' online privacy have been conducted in different countries, such as Belgium and the U.S., concerning their attitudes towards privacy [5], discussion of social media privacy [6], their online privacy management behavior, and its influencing factors such as gender, age, networked social environment, and parental influence [7]. Moreover, some research has investigated China's privacy policy [8][9][10]. However, existing studies mainly focus on Western countries.…”
Section: Introductionmentioning
confidence: 99%
“…The objective is to forestall the aggressive efforts to distinguish intimidations before using any smart model and cogent. This innovative perception rests with existing security systems, which respond to known threats on a large scale [19].…”
Section: Introductionmentioning
confidence: 99%
“…However, it represents other benefits for various companies irrespective of the underlying area where it can operate or undertake the projects. Before and after digitization, the authors have examined the attached issues and the requirements of various industries and termed them IoTv4 [19]- [22]. The authors have labeled some paybacks of digital societies, the consequences of cyber security, and the definition of threats with different strategy types adopted to evade security jeopardies.…”
Section: Introductionmentioning
confidence: 99%