نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

2002
Winnie Chung John Paynter

An increasing number of people are using the Internet, in many instances unaware of the information being collected about them. In contrast, other people concerned about the privacy and security issues are limiting their use of the Internet, abstaining from purchasing products online. Businesses should be aware that consumers are looking for privacy protection and a privacy statement can help t...

Journal: :Int. J. Hum.-Comput. Stud. 2013
Sören Preibusch

The debate about online privacy gives testimony of Web users’ concerns. Privacy concerns make consumers adopt data protection features, guide their appreciation for existing features, and can steer their consumption choices amongst competing businesses. However, approaches to measure privacy concern are fragmented and often ad-hoc, at the detriment of reliable results. The need for measurement ...

2004
Dawn N. Jutla Liming Xu

Conducting international e-business requires knowledge about the privacy and consumer protection laws, and regulations that affect transacting parties. To support this requirement, we describe a high-level organization for a Web-privacy ontology composed of a hierarchical organization of formal laws and acts, informal cultural guidelines and standards for business in general, and specific legis...

2014
Fei Yu Zhanglong Ji

In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healt...

2010
Faye Fangfei Wang

In the old ages, spies could enter one’s residence, organizations or companies and collect valuable data information such as personal sensitive data, trade secrets or transaction records. Nowadays, the open architecture of the Internet has generated an environment in which it is much easier, quicker and wider to collect data than it used to be as a variety of sensitive information can be captur...

2004
Bradley Malin

Objectives: In order to supply patient-derived genomic data for medical research purposes, care must be taken to protect the identities of the patients from unwanted intrusions. Recently, several protection techniques that employ the use of trusted third parties (TTPs), and other identity protecting schemas, have been proposed and deployed. The goal of this paper is to analyze the susceptibilit...

Journal: :Trans. Data Privacy 2014
Salvatore Ruggieri

“The Mobile Office” Image courtesy of Charis Tsevis (tsevis.com) Invited Speaker Ann Cavoukian Dr. Ann Cavoukian is recognized as one of the world’s leading privacy experts. She is presently the Executive Director of the Privacy and Big Data Institute at Ryerson University. Appointed as the Information and Privacy Commissioner of Ontario , Canada in 1997, Dr. Cavoukian served an unprecedented t...

Journal: :Information Polity 2009
Janice Warner Soon Ae Chun

The Web 2.0 technologies allow dynamic content creation using syndications or mashups, extracted from diverse data sources, including government enterprise data. As a primary source of citizen data, the US government has the obligation not only to make public data available for citizen access as stated in the Freedom of Information Act, but also to protect the privacy of individual citizen’s re...

2010
John J. Borking

Risk control plays an important role at privacy protection. Article 17 (1) of the Directive 95/46/EC (DPD) requires that the controller must implement appropriate technical and organizational measures to protect personal data. ICT offers solutions in the shape of privacy protection for users, consumers and citizens. The application of ICT to protect privacy has become widely known under the nam...

2014
Patrick Grofig Isabelle Hang Martin Härterich Florian Kerschbaum Mathias Kohler Andreas Schaad Axel Schröpfer Walter Tighzert

There are a few reliable privacy mechanisms for cloud applications. Data usually needs to be decrypted in order to be processed by the cloud service provider. In this paper we explore how an encrypted database can (technically) ensure privacy. We study the use case of a mobile personalized healthcare app. We show that an encrypted database can ensure data protection against a cloud service prov...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید