نتایج جستجو برای: similar privacy setting

تعداد نتایج: 944992  

2015
Daniel P. O’Brien Doug Smith

We compare the private and social incentives for privacy in a online market where: (i) customer information conveyed online is valuable to firms; (ii) using the information has heterogeneous effects on consumers; (iii) markets for customerspecific privacy do not exist; and (iv) a regulator can control privacy but not the price of the online activity. In this setting, privacy is effectively a pr...

Journal: :PVLDB 2011
Ashwin Machanavajjhala Aleksandra Korolova Atish Das Sarma

With the recent surge of social networks such as Facebook, new forms of recommendations have become possible – recommendations that rely on one’s social connections in order to make personalized recommendations of ads, content, products, and people. Since recommendations may use sensitive information, it is speculated that these recommendations are associated with privacy risks. The main contri...

2013
Meilof Veeningen Antonio Piepoli Nicola Zannone

More and more personal information is available digitally, both collected by organisations and published by individuals. People may attempt to protect their privacy by avoiding to provide uniquely identifying information and by providing different information in different places; however, in many cases, such profiles can still be de-anonymised. Techniques from the record linkage literature can ...

Journal: :CoRR 2015
Filipp Valovich Francesco Aldà

In this work, we investigate the problem of private statistical analysis in the distributed and semi-honest setting. In particular, we study properties of Private Stream Aggregation schemes, first introduced by Shi et al. [27]. These are computationally secure protocols for the aggregation of data in a network and have a very small communication cost. We show that such schemes can be built upon...

Journal: :CoRR 2010
Graham Cormode

Over the last decade there have been great strides made in developing techniques to compute functions privately. In particular, Differential Privacy gives strong promises about conclusions that can be drawn about an individual. In contrast, various syntactic methods for providing privacy (criteria such as kanonymity and l-diversity) have been criticized for still allowing private information of...

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

haydeh heidari, Marjan Mardani Hamooleh,

Background and Objectives: Respecting privacy means respecting individuals, their dignity and independence. It is mandatory to observe privacy in health-care systems. Therefore, this study was carried out with the aim of expressing nursing students’ experience of privacy in pediatrics ward. Methods: This qualitative study was done inductively using content analysis method. The participant...

Journal: :بررسی مسایل اجتماعی ایران 0
حمید عبداللهیان نویسنده ی مسئول، استاد گروه ارتباطات دانشگاه تهران حسین حسنی دانشجوی دکترای ارتباطات، دانشگاه تهران

this paper attempts to analyze the consequences of using facebook and how it affects iranian couples, especially where family privacy is concerned. to put it in other words, the paper offers an argument on the question of how facebook membership challenges stability of the family system in the iranian society.  a special focus will be laid on facebook and its effect on transforming social norms...

2009
Sabah Al-Fedaghi

In response to rising public awareness of information privacy, principles addressing the privacy of information have evolved and converged around a set of basic principles such as, for example, the Code of Fair Information Practice. Legislative developments such as the 1995 European Union's enactment of the Data Privacy Directive and the U.S. Health Insurance Portability and Accountability Act ...

Journal: :IACR Cryptology ePrint Archive 2011
Helger Lipmaa

Norwegian nationwide Internet voting will make use of a setting that we will call the codeverification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by Gjøsteen. As we show, Gjøsteen’s protocol has several undesirable properties. In particular, one of the online servers shares the secret key with the offline tallier. Even without considering that, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید