Questionnaires and abuse of privacy.

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy-Aware Protocol for Sociometric Questionnaires

In the paper we design a protocol for sociometric questionnaires, which serves the privacy of responders. We propose a representation of a sociogram by a weighted digraph and interpret individual and collective phenomena of sociometry in terms of graph theory. We discuss security requirements for a privacy-aware protocol for sociometric questionnaires. In the scheme we use additively homomorphi...

متن کامل

A Review of Childhood Abuse Questionnaires and Suggested Treatment Approaches

The focus of this chapter is on providing a review of childhood sexual abuse, physical abuse and combined abuse assessment questionnaires. Prevalence rates of childhood abuse in the United States will also be provided along with symptom and diagnostic correlates found to be associated with a childhood history of abuse. The following seven abuse screens are reviewed. (1) The Rape Aftermath Sympt...

متن کامل

A Study of Whois Privacy and Proxy Service Abuse

When Internet domain names are registered for malicious purposes the registrants are unlikely to want their identity to be published in the Whois system. We show that around 90% of such registrants completely fail to provide valid contact phone numbers. However, there are significant variations, dependent upon the type of wickedness, as to whether or not privacy and proxy services are used as a...

متن کامل

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings

System designers have long struggled with the challenge of determining how to control when untrusted applications may perform operations using privacy-sensitive sensors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors....

متن کامل

Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks

Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and pri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: BMJ

سال: 1977

ISSN: 0959-8138,1468-5833

DOI: 10.1136/bmj.2.6094.1086-b