نتایج جستجو برای: privacy

تعداد نتایج: 44656  

2008
Gaurav Bansal Fatemeh Zahedi David Gefen

Privacy policy statements and privacy-assurance cues are among the most important website features that online providers could use to alleviate web customers’ privacy concerns. This study examines the moderating role of privacy concern on how privacy assurance cues and argument quality contribute to increased trust, and the subsequent decision to disclose health information online. This study h...

2014
Jennifer M. Urban Chris Jay Hoofnagle Alan Furman Westin

Alan Westin’s well-known and often-used privacy segmentation fails to describe privacy markets or consumer choices accurately. The segmentation divides survey respondents into “privacy fundamentalists,” “privacy pragmatists,” and the “privacy unconcerned.” It describes the average consumer as a “privacy pragmatist” who influences market offerings by weighing the costs and benefits of services a...

2017
Yod-Samuel Martín José M. del Álamo

Engineering privacy in information systems requires systematic methods to capture and address privacy issues throughout the development process. However, the diversity of both privacy and engineering approaches, together with the specific context and scope of each project, have spawned a plethora of privacy engineering methods. Method engineering can help to cope with this landscape, as it allo...

2016
Kelly Quinn

The contradiction between the stated preferences of social media users toward privacy and actual privacy behaviors has suggested a willingness to trade privacy regulation for social goals. This study employs data from a survey of 361 social media users, which collected data on privacy attitudes, online privacy strategies and behaviors, and the uses and gratifications that social media experienc...

2007
GEOFF SKINNER

In order to sustain privacy in digital collaborative environments a comprehensive multidimensional privacy protecting framework is required. Such information privacy solutions for collaborations must incorporate environmental factors and influences in order to provide a holistic information privacy solution. Our Technical, Legal, and Community Privacy Protecting (TLC-PP) framework addresses the...

Journal: :J. Algorithms 2009
Hugo L. Jonker Sjouke Mauw Jun Pang

Privacy is a necessary requirement for voting. Without privacy, voters can be forced to vote in specific ways, and the forcing party can check their compliance. But offering privacy does not suffice: if a voter can reduce her privacy, an attacker can force her to do so. In this paper, we distinguish various ways that a voter can communicate with the intruder to reduce her privacy and classify t...

2012
Chul Woo Yoo H. J. Ahn H. Raghav Rao

Even though information privacy literature has been studying the negative influence of privacy concerns on personal information disclosure, the issue is more complex because often the actual behavior of the individual does not reflect the influence. However, limited explanations have been directed toward examining the contradictory phenomenon between privacy concerns and various subsequent beha...

Journal: :Journal of Research and Practice in Information Technology 2008
Kirsten Wahlstrom Gerald Quirchmayr

Innovative approaches to searching for hidden meaning in data have recently emerged. In some cases, however, the support of privacy is compromised and consistent privacy protection remains elusive. Privacy perceptions and requirements differ from person to person and over time, leading to diverse privacy preferences within a community. This paper reports on a privacy-enhancing database architec...

2009
Michael Carl Tschantz Jeannette M. Wing

Privacy means something different to everyone. Against a vast and rich canvas of diverse types of privacy rights and violations, we argue technology’s dual role in privacy: new technologies raise new threats to privacy rights and new technologies can help preserve privacy. Formal methods, as just one class of technology, can be applied to privacy, but privacy raises new challenges, and thus new...

2007
Ling Liu

This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in data privacy area, the presenter describes the essential concepts, the alternative models, and the suite of techniques for providing location privacy in mobile and ubiquitous data management systems. The tutorial consi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید