Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
DOI: 10.1145/3538969.3543797
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Management in Shared Mobility Integration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…In addition, to improve the quality of the use of these services, we should pay special attention to security, both on the operator’s side (i.e., monitoring and transferring information about user abuse and ensuring high protection of personal data and payment data) and on the society’s side (i.e., reporting any irregularities in IT system use). Specifically, research on security and privacy issues in shared mobility integration is scarce [ 48 ].…”
Section: Discussionmentioning
confidence: 99%
“…In addition, to improve the quality of the use of these services, we should pay special attention to security, both on the operator’s side (i.e., monitoring and transferring information about user abuse and ensuring high protection of personal data and payment data) and on the society’s side (i.e., reporting any irregularities in IT system use). Specifically, research on security and privacy issues in shared mobility integration is scarce [ 48 ].…”
Section: Discussionmentioning
confidence: 99%
“…This agreement generally includes cooperation between countries to reduce non-tariff barriers to trade and increase trade between them. For example, ECOWAS manages a free trade area in which tariffs on intra-regional imports have been eliminated for goods that meet the rules of origin; this theme had already been pinpointed just before the COVID-19 pandemic in the context of the definition of a regional strategy converging on mechanisms for minimizing online attacks [4,5].…”
Section: Positioning the Problemmentioning
confidence: 99%
“…Cloud computing allows today's small and medium businesses and their employees to work from anywhere, anytime, using multiple devices. They can transfer files using Drop Box, video conference globally with Skype and other sites, and access work remotely from their smartphones and tablets [5,6]. But as some small businesses have painfully learned, the price of these collaborative benefits is the potential for a serious data security breach.…”
Section: Current Statusmentioning
confidence: 99%
“…Moreover, for a recovered NFC bank card, the attacker can apply a cloning attack using a blank card to create a new identical card to use in future services (payment, transport, etc.) [6] (see section II-A5).…”
Section: A Attacks On An Nfc Bank Card or An Nfc Smartphonementioning
confidence: 99%