Seven Types of Privacy
نویسندگان
چکیده
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملAdjustment Mechanisms of Privacy in extroverted homes of Gilan (Case Study: Rural Homes)
Privacy as a human need, is the result of adjustment of the interaction between human environment, which under the influence of current patterns of activity and cultural background, leads to a favorable atmosphere. Adjusting the privacy in Iranian homes is one of the fundamental features of Iranian architecture, which has had a profound effect on the formation of the spatial organization and th...
متن کاملبازشناسی تأثیر شغل و سطح اجتماعی مالکان مسلمان خانههای قجری بوشهر در شکلگیری سلسلهمراتب محرمیّت فضای ورودی
Privacy is one of the basic principles of Islamic architecture. Islamic texts like Quran and Hadiths indicate that privacy is an important subject in the house which provides peace for the family. The houses that are built in Islamic era represent this principle, but unfortunately, this important architectural principle is nowadays ignored in houses. Therefore, reviewing the privacy principle i...
متن کاملLexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies
Privacy policies are used to communicate company data practices to consumers and must be accurate and comprehensive. Each policy author is free to use their own nomenclature when describing data practices, which leads to different ways in which similar information types are described across policies. A formal ontology can help policy authors, users and regulators consistently check how data pra...
متن کاملSecurity for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-preserving schemes for 4G and 5G cellular networks. We start by providing an overview of existing surveys that deal with 4G and 5G communications, applications, standardization, and security. Then, we give a classification of threat models in 4G and 5G cellular networks in four categories, including, attacks again...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013