نتایج جستجو برای: privacy

تعداد نتایج: 44656  

2015
Simeon Schudy Verena Utikal

Privacy regulations can affect the willingness to collect personal health data that may be disclosed to insurers. Perfect privacy cannot always be guaranteed. Consequently, people may refrain from collecting personal health data. This paper provides a theoretical and experimental analysis of the importance of privacy regulations for information acquisition and disclosure behavior. We contrast t...

2010
Periambal L. Coopamootoo Debi Ashenden

A variety of privacy mechanisms have been designed for the online environment but they have not been effective in ensuring end-users’ privacy. In this study, we analyse existing privacy theories devised from offline sociopsychological studies and discuss which of those could be useful in the design of usable online privacy. We found that the Communication Privacy Management framework which prov...

Journal: :J. Inf., Comm, Ethics in Society 2011
Christian Fuchs

Purpose – There are a lot of discussions about privacy in relation to contemporary communication systems (such as Facebook and other “social media” platforms), but discussions about privacy on the Internet in most cases misses a profound understanding of the notion of privacy and where this notion is coming from. The purpose of this paper is to challenge the liberal notion of privacy and explor...

Journal: :CoRR 2015
Isabel Wagner David Eckhoff

The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, redundant new me...

2015
James PH Coleman

This paper presents a new framework for assessing and documenting the privacy risks associated with developing and managing internet applications. The Framework for Assessing Privacy of Internet Applications (FAPIA) provides a tool to aid the analysis of privacy risks and a structured means of analyzing the risks and documenting a control systems to ensure compliance with data protection and pr...

2003
Nicklas Lundblad

In this paper, an economic study of different levels of expected privacy, both individual and collective, is used to demonstrate that we live neither in a dystopian control society nor in a utopian privacy enhanced society, but rather in a noise society characterized by high collective expectations of privacy and low individual expectations of privacy. This has profound consequences for the des...

2003
L. Jean Camp Carlos A. Osorio

We examine privacy-enhancing technologies based on the consistency of the business plans, technology, stated objectives, and the concept of privacy as embedded in the technologies. Three distinct trust models result from the three distinct concepts of privacy: a right of autonomy, a right to seclusion and a right to property. We use these trust models to segment the privacy market and classify ...

2014
Susan Landau

T wo decades ago, the number of people thinking hard about electronic privacy roughly mirrored the attendance of the annual Computers, Freedom, and Privacy Conference—about 250 people. That sounds hard to believe now. Companies have Chief Privacy Officers, law schools have information privacy courses, and Internet companies have privacy counsels. The International Association of Privacy Profess...

2014

Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web. However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacysensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capa...

2004
Bhavani Thuraisingham

This article first describes the privacy concerns that arise due to data mining, especially for national security applications. Then we discuss privacy-preserving data mining. In particular, we view the privacy problem as a form of inference problem and introduce the notion of privacy constraints. We also describe an approach for privacy constraint processing and discuss its relationship to pri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید