نتایج جستجو برای: similar privacy setting
تعداد نتایج: 944992 فیلتر نتایج به سال:
Differential privacy is a recent notion, and while it is nice conceptually it has been difficult to apply in practice. The parameters of differential privacy have an intuitive theoretical interpretation, but the implications and impacts on the risk of disclosure in practice have not yet been studied, and choosing appropriate values for them is non-trivial. Although the privacy parameter in diff...
This paper reports findings from participatory design research aimed at uncovering how technological interventions can engage users in the domain of privacy. Our work was undertaken in the context of a new design concept “Privacy Trends” whose aspiration is to foster technology users’ digital literacy regarding ongoing privacy risks and elucidate how such risks fit within existing social, organ...
The growing availability of genomic data holds great promise for advancing medicine and research, but unlocking its full potential requires adequate methods for protecting the privacy of individuals whose genome data we use. One example of this tension is running Similar Patient Query on remote genomic data: In this setting a doctor that holds the genome of his/her patient may try to find other...
U.S. teens are spending substantial time on social networking sites (SNSs). Yet, only a few studies have documented teens’ privacy-protecting behaviors on SNSs. Using data of Facebook teen users and their parents in the U.S. from the Pew Internet’s Teens & Privacy Management Survey (N = 622), this study investigated the socialization agents of teens’ level of online privacy concern, and the rel...
conclusions the results showed that the level of respect for informational privacy was relatively acceptable. however, the level of respect for physical privacy was poor. therefore, it is essential to provide appropriate training on the issue of children’s privacy, especially physical privacy (e.g., using separate rooms and ensuring that medical staff knock before entering a room), and to ensur...
In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healt...
Recent advances in processing and storing information has led to an explosion of data collec-tion. Many organizations like the Census, hospitals and even search engine companies collect, analyze anddistribute personal information in return for useful services. However, the collected data track entire pub-lic and private lives of individuals, thus resulting in an immense privacy risk...
Discourse analysis of the technical document series that records the internet design history, the RFCs, shows that those involved during the first decade saw privacy as a multi-dimensional and interactive problem requiring use of a suite of solutions at the network, individual, and data levels that had to take into account the need to balance privacy against experimentation and innovation. Inte...
The collection and analysis of user data drives improvements in the app and web ecosystems, but comes with risks to privacy. This paper examines discrete distribution estimation under local privacy, a setting wherein service providers can learn the distribution of a categorical statistic of interest without collecting the underlying data. We present new mechanisms, including hashed k-ary Random...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید