Requesting personal information in frontline service encounters raises privacy concerns among customers. The proximity contact tracing that occurred during the COVID-19 pandemic provides an ...intriguing context of information requests. Hospitality venues required contact tracing details from customers, and customer cooperation varied with concerns about privacy. Drawing on gossip theory, we investigate the roles of businesses’ data privacy practices and government support in driving customers’ responses to contact tracing. Our findings show that perceived transparency of a business’s privacy practices has a positive effect on customers’ commitment to the business, while perceived control exerts a negative effect on commitment. These effects are mediated by customers’ information falsification rather than disclosure, because the former is a sensitive behavioral indicator of privacy concerns. The results also reveal the moderating roles of government support. This research contributes to the customer data privacy literature by demonstrating the distinct effects of perceived transparency and control on commitment and revealing the underlying mechanism. Moreover, the research extends the conceptual understanding of privacy practices from online contexts to face-to-face contexts of frontline service. The findings offer implications for the management of customer data privacy.
•Businesses need to improve their privacy practices of information request.•Privacy practices influence customers’ commitment to the business.•Transparency and control in privacy practices affect customer behavior differently.
With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band ...has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.
The presence of a notary in the Association of legal Communities is significant. Nevertheless, in carrying out its role and function, the Notary is very vulnerable in the vortex of deed against the ...law. Although in many instances, the public Notary can not be held accountable for the unlawful acts, in some cases, the Notary is unable to circumvent his involvement. This article presents two issues related to notary involvement in unlawful acts, especially the criminal offense. Each of these is: first, how is the form of notary involvement in criminal acts of document falsification? Secondly, can the public Notary be held accountable for his involvement in criminal acts of document falsification? This research was conducted through normative legal research. The results show that there are many forms of notary involvement in criminal acts of document counterfeiting. Secondly, the Notary may be held accountable and may be asked for criminal liability because of his involvement in criminal acts of document falsification.
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of ...cognitive radio networks (CRNs). Over the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Then, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we analyze the spear-and-shield relation between Byzantine attack and defense from an interactive game-theoretical perspective. Moreover, we highlight the unsolved research challenges and depict the future research directions.
In this study, falsification-aware semantics and sequent calculi for first-order classical logic are introduced and investigated. These semantics and sequent calculi are constructed based on a ...falsification-aware setting for first-order Nelson constructive three-valued logic (N3). In fact, these semantics and sequent calculi are regarded as those for a classical variant of N3 (i.e., a classical variant of N3 is identical to first-order classical logic). The completeness and cut-elimination theorems for the proposed semantics and sequent calculi are proved using Schütte’s method. Similar results for the propositional case are also obtained.
Does more media censorship imply more regime stability? We argue that censorship may cause mass disapproval for censoring regimes. In particular, we expect that censorship backfires when citizens can ...falsify media content through alternative sources of information. We empirically test our theoretical argument in an autocratic regime—the German Democratic Republic (GDR). Results demonstrate how exposed state censorship on the country's emigration crisis fueled outrage in the weeks before the 1989 revolution. Combining original weekly approval surveys on GDR state television and daily content data of West German news programs with a quasi-experimental research design, we show that recipients disapproved of censorship if they were able to detect misinformation through conflicting reports on Western television. Our findings have important implications for the study of censoring systems in contemporary autocracies, external democracy promotion, and campaigns aimed at undermining trust in traditional journalism.
Machine learning has been applied in wireless communications. In this paper, we consider the case that a cognitive transmitter senses the spectrum and transmits on idle channels determined by a ...machine learning algorithm. We then present an adversarial machine learning approach to launch a spectrum data poisoning attack. That is, an adversary learns the transmitter's behavior and attempts to falsify the spectrum sensing data over the air by transmitting for a short period of time when the channel is idle to manipulate the input for the decision mechanism of the transmitter. The cognitive engine at the transmitter is a deep neural network model that predicts idle channels with minimum sensing error for data transmissions. The transmitter collects spectrum sensing data and uses it as the input to its machine learning algorithm. In the meantime, the adversary also builds a cognitive engine using another deep neural network model to predict when the transmitter will have a successful transmission based on its spectrum sensing data. The adversary then performs the over-the-air spectrum data poisoning attack, which aims to change the channel occupancy status from idle to busy when the transmitter is sensing, so that the transmitter is fooled into making incorrect transmit decisions. This attack is more energy efficient and harder to detect compared to jamming of data transmissions. We show that this attack is very effective and reduces the throughput of the transmitter substantially.
Communication scholars demonstrated a remarkable level of methodological creativity to overcome the restrictions on conducting research necessitated by the pandemic. This methodological creativity ...allowed us to provide answers to many critical questions that arouse during the pandemic. Now the risk is that scholars will diminish data gathered during the pandemic as tainted by pandemic-related confounds. Certainly, the pandemic offered many threats to the internal validity of research, but this should be embraced as an opportunity to learn from these unique confounds to increase the specificity of our theories.