نتایج جستجو برای: similar privacy setting

تعداد نتایج: 944992  

2011
Jaewoo Lee Chris Clifton

Differential privacy is a recent notion, and while it is nice conceptually it has been difficult to apply in practice. The parameters of differential privacy have an intuitive theoretical interpretation, but the implications and impacts on the risk of disclosure in practice have not yet been studied, and choosing appropriate values for them is non-trivial. Although the privacy parameter in diff...

Journal: :JASIST 2015
Asimina Vasalou Anne-Marie Oostveen Chris P. Bowers Russell Beale

This paper reports findings from participatory design research aimed at uncovering how technological interventions can engage users in the domain of privacy. Our work was undertaken in the context of a new design concept “Privacy Trends” whose aspiration is to foster technology users’ digital literacy regarding ongoing privacy risks and elucidate how such risks fit within existing social, organ...

Journal: :IACR Cryptology ePrint Archive 2017
Gilad Asharov Shai Halevi Yehuda Lindell Tal Rabin

The growing availability of genomic data holds great promise for advancing medicine and research, but unlocking its full potential requires adequate methods for protecting the privacy of individuals whose genome data we use. One example of this tension is running Similar Patient Query on remote genomic data: In this setting a doctor that holds the genome of his/her patient may try to find other...

Journal: :Computers in Human Behavior 2014
Yang Feng Wenjing Xie

U.S. teens are spending substantial time on social networking sites (SNSs). Yet, only a few studies have documented teens’ privacy-protecting behaviors on SNSs. Using data of Facebook teen users and their parents in the U.S. from the Pew Internet’s Teens & Privacy Management Survey (N = 622), this study investigated the socialization agents of teens’ level of online privacy concern, and the rel...

Journal: :archives of pediatric infectious diseases 0
mina foroozadeh medical ethics department, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شهید بهشتی (shahid beheshti university of medical sciences) mehrzad kiani medical ethics department, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شهید بهشتی (shahid beheshti university of medical sciences) leila afshar medical ethics department, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iranسازمان اصلی تایید شده: دانشگاه علوم پزشکی شهید بهشتی (shahid beheshti university of medical sciences) shabnam bazmi medical ethics department, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iran; researcher of medical ethics and law research center, medical ethics department, school of traditional medicine, shahid beheshti university of medical sciences, tehran, iran. tel: +98-22277821سازمان اصلی تایید شده: دانشگاه علوم پزشکی شهید بهشتی (shahid beheshti university of medical sciences)

conclusions the results showed that the level of respect for informational privacy was relatively acceptable. however, the level of respect for physical privacy was poor. therefore, it is essential to provide appropriate training on the issue of children’s privacy, especially physical privacy (e.g., using separate rooms and ensuring that medical staff knock before entering a room), and to ensur...

2014
Fei Yu Zhanglong Ji

In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healt...

2008
Ashwin Kumar V. Machanavajjhala

Recent advances in processing and storing information has led to an explosion of data collec-tion. Many organizations like the Census, hospitals and even search engine companies collect, analyze anddistribute personal information in return for useful services. However, the collected data track entire pub-lic and private lives of individuals, thus resulting in an immense privacy risk...

Journal: :New Media & Society 2012
Sandra Braman

Discourse analysis of the technical document series that records the internet design history, the RFCs, shows that those involved during the first decade saw privacy as a multi-dimensional and interactive problem requiring use of a suite of solutions at the network, individual, and data levels that had to take into account the need to balance privacy against experimentation and innovation. Inte...

2016
Peter Kairouz Keith Bonawitz Daniel Ramage

The collection and analysis of user data drives improvements in the app and web ecosystems, but comes with risks to privacy. This paper examines discrete distribution estimation under local privacy, a setting wherein service providers can learn the distribution of a categorical statistic of interest without collecting the underlying data. We present new mechanisms, including hashed k-ary Random...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید