نتایج جستجو برای: privacy

تعداد نتایج: 44656  

2007
NORA J. RIFON

Using social cognitive theory, this study experimentally examines the effects of explicit privacy warnings, a clear, conspicuous, and concise presentation of the benefits and risks associated with database information practices stated in a Web site’s privacy policy. Warnings increased perceptions of the risks associated with information practices and decreased disclosures, but not in the presen...

Journal: :Government Information Quarterly 2008
Wilhelm Peekhaus

This paper explores whether the Canadian legislative protections in place to safeguard medical privacy meet the expectations of Canadians. An overview of current governance systems designed to protect the privacy of personal health information at both the federal and provincial levels is first presented. This is followed by an empirical analysis of the results of a public opinion survey conduct...

Journal: :CoRR 2017
Ke Yan Wen Shen Huijuan Lu Qun Jin

Fast development of sharing services becomes a crucial part of the process in constructing a cyber-enabled world, as sharing services reinvent how people exchange and obtain goods or services. However, privacy leakage or disclosure is a key concern which may hinder the development of sharing services. While significant efforts have been undertaken to address various privacy issues in recent yea...

2013
Shan Chen Mary-Anne Williams

The Privacy-by-Design approach has gained an increasing acceptance for privacy management in the privacy community. However, there is still a research gap in methodologies for implementing this approach and a need to develop frameworks and systems to support Privacy-by-Design practice. In an attempt to bridge this gap, this paper uncovers hidden issues of the Privacy-by-Design approach as a mea...

Journal: :Data Knowl. Eng. 2005
Bhavani M. Thuraisingham

This paper views the privacy problem as a form of inference problem. It first provides an overview of the privacy problem and then introduces the notion of privacy constraints. Next it describes architecture for a privacy-enhanced database management system and discusses algorithms for privacy constraint processing. A note on privacy constraints processing and release control are given next. Fi...

2014
Lydia Kraus Ina Wechsung Sebastian Möller

This paper investigates to which degree privacy and security knowledge and global information privacy concern of a user influence mobile protection behavior. We performed a survey with 154 participants. The results of the survey suggest that both privacy and security knowledge and global information privacy concern are influential for mobile protection behavior. We find that low knowledge and l...

2012
Anthony Morton Angela Sasse

Privacy research has not helped practitioners – who struggle to reconcile users’ demands for information privacy with information security, legislation, information management and use – to improve privacy practice. Beginning with the principle that information security is necessary but not sufficient for privacy, we present an innovative layered framework the Privacy Security Trust (PST) Framew...

Journal: :CoRR 2017
Genqiang Wu Xianyao Xia Yeping He

Differential privacy is a strong privacy notion based on indistinguishability of outputs of two neighboring datasets, which represent two states of one’s information is within or without of a dataset. However, when facing dependent records, the representation would lose its foundation. Motivated by the observation, we introduce a variant of differential privacy notion based on the influence of ...

2005
George Yee Larry Korba

The growth of the Internet is increasing the deployment of e-services in such areas as e-commerce, e-learning, and e-health. In parallel, service providers and consumers are realizing the need for privacy. Managing privacy using privacy policies is a promising approach. In this approach, an eservice consumer and an e-service provider each have separate privacy policies. Before an eservice is en...

Journal: :CoRR 2010
Gerben Broenink Jaap-Henk Hoepman Christian van 't Hof Rob Van Kranenburg David Smits Tijmen Wisman

The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator betw...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید