نتایج جستجو برای: personal privacy
تعداد نتایج: 189720 فیلتر نتایج به سال:
Because banks deal with highly personal detailed and sensitive information, they need to establish and maintain the confidence of their customers more assiduously than most other businesses. The rise of internet banking and the advantages to be gained from the garnering of personal data from websites places banks in a position to exploit customer data in a way that might infringe ethical consid...
Images convey a broad spectrum of personal information. If such images are shared on social media platforms, this personal information is leaked which conflicts with the privacy of depicted persons. Therefore, we aim for automated approaches to redact such private information and thereby protect privacy of the individual. By conducting a user study we find that obfuscating the image regions rel...
Transparency is a basic privacy principle and factor of social trust. However, the processing of personal data along a cloud chain is often rather intransparent to the data subjects concerned. Transparency Enhancing Tools (TETs) can help users in deciding on, tracking and controlling their data in the cloud. However, TETs for enhancing privacy also have to be designed to be both privacy-preserv...
Wireless sensor technologies gave rise to many new applications widely used by general citizens as well as military operations. Numerous cases of these applications are based on the information of personal locations. Observations of these locations with untrusted server cause privacy threats to the individuals being monitored. To deal with such a privacy break, the concept of aggregate location...
In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and protection to gain full entry into this new info...
Recent revelations about corporate use of customer data, government collection of personal data, and security lapses resulting in the release of private information call to light the increasing threats to privacy made possible by information systems (IS). Questions such as identity management, data ownership, secondary use, information disposal, etc. come into play when we consider the ramifica...
RFID is a powerful new technology that has the potential to allow commercial retailers to undermine individual control over private information. Despite the potential of RFID to undermine personal control over such information, the federal government has not enacted a set of practicable standards to ensure that personal data does not become widely misused by commercial entities. Although some p...
Recent progress in mobile phone technology enables the users to generate and store personal data, for example pictures taken with built-in digital cameras. This personal data can then be forwarded to other mobile devices. Currently, there are no mechanisms available that protect such user-generated content against unauthorized use and distribution, or that enforce the user privacy preferences. ...
Personal data is becoming more and more valuable because of new possibilities in gathering and analyzing data. Although, users integrate information systems in their most private spheres, they do not take adequate care of their privacy. In fact, they are becoming increasingly concerned about their information privacy, but act in a different way. This inconsistency in users’ behavior is known as...
Concern over online information privacy is widespread and rising. However, prior research is silent about the value of information privacy in the presence of potential benefits from sharing personally identifiable information. We analyzed individuals’ trade-offs between the benefits and costs of providing personal information to websites. We found that benefits – monetary reward and future conv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید