نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

Journal: :IEEE Signal Processing Letters 2022

The invisible remote photoplethysmography (rPPG) signals in facial videos can reveal the cardiac rhythm and physiological status. Recent studies show that rPPG is a non-contact way for emotion recognition, disease detection, biometric identification, which means there potential privacy problem about information leakage from videos. Therefore, it essential to process prevent extraction privacy-s...

2017
Hui Zhao Haoxin Dong H. Zhao H. X. Dong

The purpose of this essay is to investigate the privacy concerns of Chinese, and to develop relevant protective measures. The groups are divided into two parts by gender and six parts by ages to analyze the different gender and different age groups of privacy concerns. The significance of this study is protecting personal data property. The data of personal information after finishing processin...

2007
Rhonda Chaytor

Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. A number of heuristic solutions have been proposed that satisfy a privacy-protection property called k-Anonymity. These solutions use generalization (e.g., transform Federal Government and Local Government into a less ...

2004
Martin Lengwiler

The paper examines the relation between the realms of privacy and civil society by analyzing the recent history of privacy legislation in general and the developments in Switzerland since the 1970s in particular. It argues that the conceptual distinction between the spheres of privacy, civil society and the state should not entice to ignore the interactions and interdependencies between these s...

2007
ILENE R. BERSON

The right to privacy is a firmly entrenched democratic principle that has been inferred in the U.S. Constitution and protected by the Fourteenth Amendment as a liberty of personal autonomy.I Although the Constitution does not include language that explicitly details privacy protections, since the 1800s justices have interpreted the text as promoting the "right to be left alone."2 Evidence of co...

2005
Geoff Skinner Song Han Elizabeth Chang

When considering information security and privacy issues most of the attention has previously focussed on data protection and the privacy of personally identifiable information (PII). What is often overlooked is consideration for the operational and transactional data. Specifically, the security and privacy protection of metadata and metastructure information of computing environments has not b...

Journal: :DEStech Transactions on Computer Science and Engineering 2018

2014
Ulrich Lang Sid Shetye

Does privacy protection matter in the internet of things (IoT) including consumer electronics (CE)? So what is privacy, how is it valued and where does it sit in your organization today? Chances are if you don’t have a chief privacy officer or data protection officer, your company is lacking in protecting critical data, let alone all the laws and statutory regulations dealing with privacy (e.g....

Journal: :Int. J. Web Service Res. 2009
George Yee

The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید