ABSTRACT
The unified user profiles (UUPs) include the creation of a single account to keep all data about a user across numerous platforms or websites. This data may contain sensitive information such as private details, preferences, and authentication information. UUPs is commonly used in housework, organization management, recreation, and shopping. The study can help Filipinos of local institutions and organizations in the Philippines make educated decisions about whether to implement UUPs by providing information on the potential benefits and downsides of UUPs as well as supporting them in doing so. In gathering information about UUPs in the Philippines, a survey with a sample size of fifty people ranging in age from eighteen to fifty-four years old was conducted. From the results, UUPs in the Philippines are mostly used for advertising and customization. The study also mentioned issues over data breaches and the usage of UUPs for increased security measures. However, UUPs’ cybersecurity benefits and risks are still being studied.
- Furkan Alaca and Paul C. Van Oorschot. 2020. Comparative Analysis and Framework Evaluating Web Single Sign-on Systems. ACM Computing Surveys 53, 5 (October 2020), 1–34. DOI:https://doi.org/10.1145/3409452Google ScholarDigital Library
- Ahmad R. Pratama, Firman M. Firmansyah, and Fayruz Rahma. 2022. Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality. PeerJ Computer Science 8, (March 2022), e918. DOI:https://doi.org/10.7717/peerj-cs.918Google ScholarCross Ref
- Oracle. 2023. Unified User Profiles. Oracle.com. Retrieved January 15, 2023 from https://docs.oracle.com/cd/E13218_01/wlp/docs81/users/uup.htmlGoogle Scholar
- Glenn Taylor. 2019. NRF19: 36% Of Shoppers Want Better Personalization, But Hesitate To Share Personal Info. Retail TouchPoints. Retrieved January 23, 2023 from https://www.retailtouchpoints.com/topics/customer-experience/nrf19-36-of-shoppers-want-better-personalization-but-hesitate-to-share-personal-infoGoogle Scholar
- Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, and Henry Friday Nweke. 2019. A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 7, (2019), 144907–144924. DOI:https://doi.org/10.1109/access.2019.2944243Google ScholarCross Ref
- Nathan Hart. 2022. The Evolution of the Smart Home: How it Started [Part 1]. Ubuntu. Retrieved January 24, 2023 from https://ubuntu.com/blog/the-evolution-of-the-smart-home-how-it-started-part-1Google Scholar
- Google. 2023. Google Assistant. Assistant. Retrieved January 24, 2023 from https://assistant.google.com/Google Scholar
- The Assistant. 2018. What is Alexa?. The Assistant. Retrieved January 24, 2023 from https://theassistant.io/guide/what-is-alexa/Google Scholar
- Microsoft. 2023. Free Microsoft Office 365 for Schools & Students | Microsoft Education. Microsoft.com. Retrieved January 24, 2023 from https://www.microsoft.com/en-ph/education/products/officeGoogle Scholar
- The Candy Staff. 2021. Perks Of Your .Edu Email Account You Might Not Be Aware Of. Candymag.com. Retrieved January 24, 2023 from https://www.candymag.com/lifestyle/perks-of-your-edu-email-account-you-might-not-be-aware-of-a00320-20210311Google Scholar
- Connected Platforms. 2021. Are There Any Risks When Signing Into Another Site with My Google or Facebook ID?. Connected Platforms. Retrieved January 24, 2023 from https://connectedplatforms.com.au/blog/risks-signing-into-another-site-facebook/Google Scholar
- Oracle. 2021. Making Sense of Unified Customer Profiles Spark Series. Retrieved from https://www.oracle.com/a/ocom/docs/making-sense-of-unified-customer-profiles.pdf?source=:ow:o:bl:po:::RC_WWMK201019P00027:Marketingblogtext&intcmp=:ow:o:bl:po:::RC_WWMK201019P00027:MarketingblogtextGoogle Scholar
- Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, and Henry Friday Nweke. 2019. A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 7, (2019), 144907–144924. DOI:https://doi.org/10.1109/access.2019.2944243Google ScholarCross Ref
- Azanguezet Quimatio Benoit Martin, Ndanteng Tchakounté Auvarique, Tsognong Fidèle, and Marcellin Julius Nkenlifack. 2022. Continuous Single-Sign-On (CSSO) method for authentication and authorization in microservices architectures. (April 2022). DOI:https://doi.org/10.21203/rs.3.rs-1579462/v1Google ScholarCross Ref
- Statista. 2023. Financial losses due to cyber attacks in the US 2022. Statista. Retrieved January 22, 2023 from https://www.statista.com/statistics/1334399/us-common-results-of-cyber-attacks/Google Scholar
- K. Muthamil Sudar, P. Deepalakshmi, P. Nagaraj, and V. Muneeswaran. 2020. Analysis of Cyberattacks and its Detection Mechanisms. 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) (November 2020). DOI:https://doi.org/10.1109/icrcicn50933.2020.9296178Google ScholarCross Ref
- Patrick Stacey, Rebecca Taylor, Omotolani Olowosule, and Konstantina Spanaki. 2021. Emotional reactions and coping responses of employees to a cyber-attack: A case study. International Journal of Information Management 58, (June 2021), 102298. DOI:https://doi.org/10.1016/j.ijinfomgt.2020.102298Google ScholarDigital Library
- Valdemar Sousa. 2019. A Review on Cyber Attacks and Its Preventive Measures. In Proceedings of the Digital Privacy and Security Conference 2019. Retrieved from https://privacyandsecurityconference.pt/proceedings/2019/DPSC2019-paper18.pdfGoogle Scholar
- Andrii Shalaginov, Geir Olav Dyrkolbotn, and Mamoun Alazab. 2020. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs. Malware Analysis Using Artificial Intelligence and Deep Learning (December 2020), 71–96. DOI:https://doi.org/10.1007/978-3-030-62582-5_3Google ScholarCross Ref
- Arash Habibi Lashkari, Min Chen, and Ali A. Ghorbani. 2018. A Survey on User Profiling Model for Anomaly Detection in Cyberspace. Journal of Cyber Security and Mobility 8, 1 (2019), 75–112. DOI:https://doi.org/10.13052/jcsm2245-1439.814Google ScholarCross Ref
- Prabhat Pokharel, Roshan Pokhrel, and Sandeep Sigdel. 2020. Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques. 2020 International Workshop on Big Data and Information Security (IWBIS) (October 2020). DOI:https://doi.org/10.1109/iwbis50925.2020.9255578Google ScholarCross Ref
- S. Kumaresan and Vijayaragavan Shanmugam. 2020. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. The Journal of Supercomputing 76, 8 (January 2020), 6094–6112. DOI:https://doi.org/10.1007/s11227-019-03118-8Google ScholarDigital Library
- Amina Elouazzani, Nouria Harbi and Hassan Badir. 2018. User Profile Management to protect sensitive data in Warehouses. International Journal of Next-Generation Computing. 9, 1 (Mar. 2018), 12–32. DOI:https://doi.org/10.47164/ijngc.v9i1.136.Google ScholarCross Ref
Index Terms
- Uncovering the effects of unified user profiles in local institutions and organizations
Recommendations
Fairtrade.com versus Fairtrade.org-how Fairtrade organisations use the Internet
This paper summarises the findings of a study, the first of its kind in Germany, which explored the potential that the Internet can offer for German Fairtrade organisations. Data was gathered from three organisations, comparing their e-commerce ...
Dynamic Security Assertion Markup Language: Simplifying Single Sign-On
Dynamic Security Assertion Markup Language (SAML) simplifies the establishment of secure single sign-on between Web applications in different organizations by automating the exchange of SAML configuration information and simplifying cryptographic trust ...
Information security assessment in public administration
AbstractThe aim of the article is to characterise and assess information security management in units of public administration and to define recommended solutions facilitating an increase in the level of information security. The article is ...
Comments