نتایج جستجو برای: personal privacy

تعداد نتایج: 189720  

2007
Yin Hua Li Hye-Young Paik Jun Chen

More and more personal data is exposed to automatic and programmatic access, making it more difficult to safeguard the personal information from unauthorised access at every step. We introduce a privacy inspection and monitoring framework provides two functions: (i) the process designers can look over the privacy aspects of the automated business processes and resolve potential problems before ...

Journal: :Decision Support Systems 2011
Han Li Rathindra Sarathy Heng Xu

a r t i c l e i n f o Based on the privacy calculus framework and the stimulus–organism–response (S–O–R) model, this study examines online information disclosure decision as a result of affective and cognitive reactions of online consumers over several stages, i.e. an initial stage where an overall impression is formed about an unfamiliar online vendor, and a subsequent information exchange sta...

2016
Florian Schaub Pascal Knierim

Providing users with awareness and control about privacysensitive information flows is a major challenge in Internet of Things scenarios, because of constrained input and output capabilities of the involved sensors and devices. We propose the use of autonomous personal drones, specifically nanocopters, as device-independent drone-based privacy interfaces. Nanocopters have the potential to indic...

2013
S. Suresh Kumar

Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monitoring system for wireless sensor networks. In our system, we design two in-network location anonymization algorithms, namely, resourceand quality-aware algorithms, that aim to enable the system to provide high quality lo...

2006
Steven Gevers Bart De Decker

When using electronic services, people are often asked to provide personal information. This raises many privacy issues. To gain the trust of the user, service providers can use privacy policy languages such as P3P to declare the purpose and usage of this personal information. User agents can compare these policies to privacy preferences of a user and warn the user if his privacy is threatened....

2007
ILENE R. BERSON

The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy.I Although the Constitution does not include language that explicitly details privacy protections, since the 1800s justices have interpreted the text as promoting the "right to be left alone."2 Evidence of co...

Journal: :JCP 2007
Sudip Chakraborty Indrajit Ray

Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control...

Journal: :IACR Cryptology ePrint Archive 2015
Iraklis Symeonidis Filipe Beato Pagona Tsormpatzoudi Bart Preneel

Establishing friendship relationships on Facebook often entails information sharing which is based on the social trust and implicit contract between users and their friends. In this context, Facebook offers applications (Apps) developed by third party application providers (AppPs), which may grant access to users’ personal data via Apps installed by their friends. Such access takes place outsid...

1998
Gerrit Bleumer

Personal documents and certificates that are not transferable between individuals are common and essential means in every day life, e.g., driver’s licenses, insurance certificates, etc. At the same time, personal documents are privacy critical as they tend to fully identify their owners, e.g., photo, address, etc. We are interested in personal offline credentials, i.e., secure, non-transferable...

2012
Meilof Veeningen Benne de Weger Nicola Zannone

With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. In particular, personal information is increasingly being exchanged in Identity Management (IdM) systems to satisfy the increasing need for reliable on-line identification and authentication. One of the key principles in protecting privacy is data minimization. Thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید