skip to main content
10.1145/3638209.3638232acmotherconferencesArticle/Chapter ViewAbstractPublication PagesciisConference Proceedingsconference-collections
research-article

Uncovering the effects of unified user profiles in local institutions and organizations

Published:28 February 2024Publication History

ABSTRACT

The unified user profiles (UUPs) include the creation of a single account to keep all data about a user across numerous platforms or websites. This data may contain sensitive information such as private details, preferences, and authentication information. UUPs is commonly used in housework, organization management, recreation, and shopping. The study can help Filipinos of local institutions and organizations in the Philippines make educated decisions about whether to implement UUPs by providing information on the potential benefits and downsides of UUPs as well as supporting them in doing so. In gathering information about UUPs in the Philippines, a survey with a sample size of fifty people ranging in age from eighteen to fifty-four years old was conducted. From the results, UUPs in the Philippines are mostly used for advertising and customization. The study also mentioned issues over data breaches and the usage of UUPs for increased security measures. However, UUPs’ cybersecurity benefits and risks are still being studied.

References

  1. Furkan Alaca and Paul C. Van Oorschot. 2020. Comparative Analysis and Framework Evaluating Web Single Sign-on Systems. ACM Computing Surveys 53, 5 (October 2020), 1–34. DOI:https://doi.org/10.1145/3409452Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmad R. Pratama, Firman M. Firmansyah, and Fayruz Rahma. 2022. Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality. PeerJ Computer Science 8, (March 2022), e918. DOI:https://doi.org/10.7717/peerj-cs.918Google ScholarGoogle ScholarCross RefCross Ref
  3. Oracle. 2023. Unified User Profiles. Oracle.com. Retrieved January 15, 2023 from https://docs.oracle.com/cd/E13218_01/wlp/docs81/users/uup.htmlGoogle ScholarGoogle Scholar
  4. Glenn Taylor. 2019. NRF19: 36% Of Shoppers Want Better Personalization, But Hesitate To Share Personal Info. Retail TouchPoints. Retrieved January 23, 2023 from https://www.retailtouchpoints.com/topics/customer-experience/nrf19-36-of-shoppers-want-better-personalization-but-hesitate-to-share-personal-infoGoogle ScholarGoogle Scholar
  5. Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, and Henry Friday Nweke. 2019. A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 7, (2019), 144907–144924. DOI:https://doi.org/10.1109/access.2019.2944243Google ScholarGoogle ScholarCross RefCross Ref
  6. Nathan Hart. 2022. The Evolution of the Smart Home: How it Started [Part 1]. Ubuntu. Retrieved January 24, 2023 from https://ubuntu.com/blog/the-evolution-of-the-smart-home-how-it-started-part-1Google ScholarGoogle Scholar
  7. Google. 2023. Google Assistant. Assistant. Retrieved January 24, 2023 from https://assistant.google.com/Google ScholarGoogle Scholar
  8. The Assistant. 2018. What is Alexa?. The Assistant. Retrieved January 24, 2023 from https://theassistant.io/guide/what-is-alexa/Google ScholarGoogle Scholar
  9. Microsoft. 2023. Free Microsoft Office 365 for Schools & Students | Microsoft Education. Microsoft.com. Retrieved January 24, 2023 from https://www.microsoft.com/en-ph/education/products/officeGoogle ScholarGoogle Scholar
  10. The Candy Staff. 2021. Perks Of Your .Edu Email Account You Might Not Be Aware Of. Candymag.com. Retrieved January 24, 2023 from https://www.candymag.com/lifestyle/perks-of-your-edu-email-account-you-might-not-be-aware-of-a00320-20210311Google ScholarGoogle Scholar
  11. Connected Platforms. 2021. Are There Any Risks When Signing Into Another Site with My Google or Facebook ID?. Connected Platforms. Retrieved January 24, 2023 from https://connectedplatforms.com.au/blog/risks-signing-into-another-site-facebook/Google ScholarGoogle Scholar
  12. Oracle. 2021. Making Sense of Unified Customer Profiles Spark Series. Retrieved from https://www.oracle.com/a/ocom/docs/making-sense-of-unified-customer-profiles.pdf?source=:ow:o:bl:po:::RC_WWMK201019P00027:Marketingblogtext&intcmp=:ow:o:bl:po:::RC_WWMK201019P00027:MarketingblogtextGoogle ScholarGoogle Scholar
  13. Christopher Ifeanyi Eke, Azah Anir Norman, Liyana Shuib, and Henry Friday Nweke. 2019. A Survey of User Profiling: State-of-the-Art, Challenges, and Solutions. IEEE Access 7, (2019), 144907–144924. DOI:https://doi.org/10.1109/access.2019.2944243Google ScholarGoogle ScholarCross RefCross Ref
  14. Azanguezet Quimatio Benoit Martin, Ndanteng Tchakounté Auvarique, Tsognong Fidèle, and Marcellin Julius Nkenlifack. 2022. Continuous Single-Sign-On (CSSO) method for authentication and authorization in microservices architectures. (April 2022). DOI:https://doi.org/10.21203/rs.3.rs-1579462/v1Google ScholarGoogle ScholarCross RefCross Ref
  15. Statista. 2023. Financial losses due to cyber attacks in the US 2022. Statista. Retrieved January 22, 2023 from https://www.statista.com/statistics/1334399/us-common-results-of-cyber-attacks/Google ScholarGoogle Scholar
  16. K. Muthamil Sudar, P. Deepalakshmi, P. Nagaraj, and V. Muneeswaran. 2020. Analysis of Cyberattacks and its Detection Mechanisms. 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) (November 2020). DOI:https://doi.org/10.1109/icrcicn50933.2020.9296178Google ScholarGoogle ScholarCross RefCross Ref
  17. Patrick Stacey, Rebecca Taylor, Omotolani Olowosule, and Konstantina Spanaki. 2021. Emotional reactions and coping responses of employees to a cyber-attack: A case study. International Journal of Information Management 58, (June 2021), 102298. DOI:https://doi.org/10.1016/j.ijinfomgt.2020.102298Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Valdemar Sousa. 2019. A Review on Cyber Attacks and Its Preventive Measures. In Proceedings of the Digital Privacy and Security Conference 2019. Retrieved from https://privacyandsecurityconference.pt/proceedings/2019/DPSC2019-paper18.pdfGoogle ScholarGoogle Scholar
  19. Andrii Shalaginov, Geir Olav Dyrkolbotn, and Mamoun Alazab. 2020. Review of the Malware Categorization in the Era of Changing Cybethreats Landscape: Common Approaches, Challenges and Future Needs. Malware Analysis Using Artificial Intelligence and Deep Learning (December 2020), 71–96. DOI:https://doi.org/10.1007/978-3-030-62582-5_3Google ScholarGoogle ScholarCross RefCross Ref
  20. Arash Habibi Lashkari, Min Chen, and Ali A. Ghorbani. 2018. A Survey on User Profiling Model for Anomaly Detection in Cyberspace. Journal of Cyber Security and Mobility 8, 1 (2019), 75–112. DOI:https://doi.org/10.13052/jcsm2245-1439.814Google ScholarGoogle ScholarCross RefCross Ref
  21. Prabhat Pokharel, Roshan Pokhrel, and Sandeep Sigdel. 2020. Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques. 2020 International Workshop on Big Data and Information Security (IWBIS) (October 2020). DOI:https://doi.org/10.1109/iwbis50925.2020.9255578Google ScholarGoogle ScholarCross RefCross Ref
  22. S. Kumaresan and Vijayaragavan Shanmugam. 2020. Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile. The Journal of Supercomputing 76, 8 (January 2020), 6094–6112. DOI:https://doi.org/10.1007/s11227-019-03118-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Amina Elouazzani, Nouria Harbi and Hassan Badir. 2018. User Profile Management to protect sensitive data in Warehouses. International Journal of Next-Generation Computing. 9, 1 (Mar. 2018), 12–32. DOI:https://doi.org/10.47164/ijngc.v9i1.136.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Uncovering the effects of unified user profiles in local institutions and organizations

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CIIS '23: Proceedings of the 2023 6th International Conference on Computational Intelligence and Intelligent Systems
      November 2023
      193 pages
      ISBN:9798400709067
      DOI:10.1145/3638209

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 February 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)6

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format