نتایج جستجو برای: privacy and surveillance
تعداد نتایج: 16846830 فیلتر نتایج به سال:
The Snowden revelations have demonstrated that the US and other nations are amassing data about people’s lives at an unprecedented scale. Furthermore, these revelations have shown that intelligence agencies are not only pursuing passive surveillance over the world’s communication systems, but are also seeking to facilitate such surveillance by undermining the security of the internet and commun...
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
Today’s online marketing industry has widely employed email tracking techniques, such as embedding a tiny tracking pixel, to track email opens of potential customers and measure marketing effectiveness. However, email tracking could allow miscreants to collect metadata information associated with email reading without user awareness and then leverage the information for stealthy surveillance, w...
One of the main challenges faced by a user today is protecting their privacy, especially during widespread surveillance. This led to the development of privacy infrastructures whose main purpose is to guarantee users privacy. However, they are being misused by attackers who consider them to be an exploitable resource to perform illegitimate activities. This paper proposes to analyze and assess ...
View Book review: Surveillance and Privacy in the Digital Age: European Transatlantic Global Perspectives, edited by Valsamis Mitsilegas Niovi Vavoula. (Oxford: Hart Publishing, 2021) Jan-Jaap Oerlemans - Common Market Law Review
Video surveillance has been widely used in recent years to enhance public safety and privacy protection. A video surveillance system needs efficient transmission and storage of video data. Video compression techniques can be used to achieve this. State-of-the-art video compression methods such as H.264/AVC often lead to high computational complexity at the encoder, which is generally implemente...
Drawing on the existing body of primarily youth-focused research, combined with two newer studies examining adults this annotated bibliography provides an examination of user understandings of digitally mediated surveillance (DMS) and privacy practices on social network sites (SNS). Particular focus will be paid to the key debate around youth and privacy attitudes (the ‘privacy paradox’), with ...
RFID technology has become one of the most hotly debated ubiquitous computing technologies, and public fears of its alleged capability for comprehensive surveillance have prompted a flurry of research trying to alleviate such concerns. The following chapter aims at introducing and briefly evaluating the range of proposed technical RFID privacy solutions. It also attempts to put the problem of R...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید