نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

Journal: :پژوهش های فقهی 0
سجاد شهباز قهفرخی عضو هیئت علمی دانشگاه شهرکرد- وکیل پایه یک دادگستری

privacy is the realm and territory of every person's characteristics and behaviors which is not disclosed to the public and in the first stage, it is allocated to a particular person which he is not also inclined to disclose this privacy to others. people cannot tolerate any kind of others' entrance and supervision on this domain. they indicate reactions to the strangers' interfe...

2005
Leping Huang Hiroshi Yamane Kanta Matsuura Kaoru Sezaki

The lack of a formal model in wireless location privacy protection research makes it difficult to evaluate new location privacy protection proposals, and difficult to utilize existing research results in anonymous communication into this new problem. In this paper, we analyze a wireless location privacy protection system (WLP S), and generalize it to a MIX based formal model, which includes a M...

2012
Rainer Böhme

Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...

1999
Tom Tietenberg Mitchell

One of the central tenets of a property rights approach to environmental protection holds not only that people respond to incentives, but also that the structure of entitlements conveyed by property rights affects incentives. It follows that a careful study of entitlements in various environmental contexts can provide a foundation for greater understanding about why human behavior can be so env...

Journal: :IACR Cryptology ePrint Archive 2014
Edward Lui Rafael Pass

We introduce a generalization of differential privacy called tailored differential privacy, where an individual’s privacy parameter is “tailored” for the individual based on the individual’s data and the data set. In this paper, we focus on a natural instance of tailored differential privacy, which we call outlier privacy : an individual’s privacy parameter is determined by how much of an “outl...

2011
Marit Hansen

Privacy requirements are often not well considered in system design. The objective of this paper is to help interested system designers in three ways: First, it is discussed how “privacy” should be understood when designing systems that take into account the protection of individuals’ rights and their private spheres. Here specifically the concept of linkage control as an essence of privacy is ...

2006
Giovanni Sartor

The present contribution analyses the connection between privacy and trust, with regard to data protection. In particular, it shows how the need to facilitate trust-based relationships may justify some limitations of privacy (in the sense of a right to self-determination over personal data), but may also provide some grounds for the protection of privacy.

Journal: :Soft Comput. 2016
Feilong Tang Jie Li Ilsun You Minyi Guo

The popularity of mobile devices, especially intelligent mobile phones, significantly prompt various location-based services (LBSs) in cloud systems. These services not only greatly facilitate people’s daily lives, but also cause serious threats that users’ location information may be misused or leaked by service providers. The dummy-based privacy protection techniques have significant advantag...

Journal: :JASIST 2007
Tom Buchanan Carina Paine Adam N. Joinson Ulf-Dietrich Reips

As the Internet grows in importance, concerns about online privacy have arisen. We describe the development and validation of three short Internet-administered scales measuring privacy related attitudes ('Privacy Concern') and behaviors ('General Caution' and 'Technical Protection'). Internet Privacy Scales 1 In Press: Journal of the American Society for Information Science and Technology UNCOR...

2010
Frank Kargl Florian Schaub Stefan Dietzel

Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such systems. We outline general principles for data protection and their legal basis and argue why pure legal protection is insufficient. Strong p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید