IDEAS home Printed from https://ideas.repec.org/p/sek/iacpro/4006512.html
   My bibliography  Save this paper

Design and Implementation of a Software Application for Secure Web-Based Communication for People with Speech Disorders

Author

Listed:
  • Ayse Tuna

    (Trakya University)

  • Resul Da?

    (F?rat University)

  • Gurkan Tuna

    (Trakya University)

Abstract

All people need to communicate with their families, friends, neighbours, and physicians through various communication means. However, there are common barriers to communication needs of mute or/and deaf people, most importantly in terms of the declining sensory and physical abilities. On the other hand, technological advances have led to the development of a variety of new tools and technologies through various communication medium including the Internet for assistive and augmentative communication for individuals with disabilities. Although communication through the Internet seems highly attractive, it poses privacy and security issues. In this paper a web-based secure message transfer application is proposed to address privacy related information security threats directed to software-based communication of mute and deaf people. The proposed application is practical and easy-to-implement, and is based on the integration of cryptology and steganography. With its easy-to-use graphical user interface suitable for different devices, it can easily be used by its potential users for ensuring the privacy and security of their message transfers. The main limitation of the proposed application is that the application requires a public web server and hence may be vulnerable against attacks directed to web servers if required precautions are not taken.

Suggested Citation

  • Ayse Tuna & Resul Da? & Gurkan Tuna, 2016. "Design and Implementation of a Software Application for Secure Web-Based Communication for People with Speech Disorders," Proceedings of International Academic Conferences 4006512, International Institute of Social and Economic Sciences.
  • Handle: RePEc:sek:iacpro:4006512
    as

    Download full text from publisher

    File URL: https://iises.net/proceedings/24th-international-academic-conference-barcelona/table-of-content/detail?cid=40&iid=091&rid=6512
    File Function: First version, 2016
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    Security threats; message security; cryptology; steganography.;
    All these keywords.

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • C88 - Mathematical and Quantitative Methods - - Data Collection and Data Estimation Methodology; Computer Programs - - - Other Computer Software

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sek:iacpro:4006512. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Klara Cermakova (email available below). General contact details of provider: https://iises.net/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.