نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

2013
Martin Kost Raffael Dzikowski Johann-Christoph Freytag

In the domain of Intelligent Transportation Systems (ITS) manufacturers and service providers start to implement and deploy plenty of (new) applications running on a vehicle. These applications involve the user and external services. Therefore, we must incorporate mechanisms providing the individual for controlling his/her privacy. Existing approaches only consider to control the event of data ...

2007
Zhen Xiao Xiaofeng Meng Jianliang Xu

Protection of users’ privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location anonymity and identifier anonymity. While the location cloaking technique under the k-anonymity model can provide a good protection of users’ privacy, it reduces the resolution of location information and, hence, may d...

2001
V. ZORKADIS E. SIOUGLE

The rapid development and extensive use of digital technologies, electronic mail, Internet and mobile communication systems, and electronic commerce applications lead to the collection and processing of huge amounts of personal data. The increasing reliance on the information systems conducts to the selection of security controls, that are driven by the business needs and the associated securit...

2012
Hye-chung Kum

Objective Secondary data analysis is becoming more powerful and commonly utilized for biomedical research using patient records and genomic data. In both data, de-identification has been proven to be ineffective due to linkage attacks that can re-identify some subpopulation of the data. We need a better model for privacy protection in secondary analysis of biomedical data. Design In this paper,...

2012
Daniel Janusz Martin Kost Johann-Christoph Freytag

Health care providers need to exchange medical data to provide complex medical treatments. In general, regulations of privacy protection define strong constraints for exchanging such personal data within a distributed system. Privacy-preserving query protocols provide mechanisms for implementing and maintaining these privacy constraints. In this paper, we introduce a new two-phase protocol for ...

2010
Anh Tuan Truong Quynh Chi Truong Tran Khanh Dang

Location privacy protection is a key factor to the development of location-based services. Location privacy relates to the protection of a user’s identity, position, and path. In a grid-based approach, the user’s position is obfuscated in a number of cells. However, this grid does not allow users to adjust the cell size which relates to a minimum privacy level. Therefore, it is hard to fix vari...

2009
Robert J. Kauffman Yong J. Lee Ryan Sougstad W. P. Carey

Extensive personal information is gathered explicitly or implicitly when a customer interacts with a firm. Significant risks are associated with handling such personal information. Providing protection may reduce risk of misuse or loss of private information, but it imposes some costs on the firm and its customers. Risk is associated with improper handling of sensitive customer information. Pro...

2014
Xiaoqian Jiang Yongan Zhao Xiaofeng Fang Bradley Malin Shuang Wang Lucila Ohno-Machado Haixu Tang

To answer the need for the rigorous protection of biomedical data, we organized the Critical Assessment of Data Privacy and Protection initiative as a community effort to evaluate privacy-preserving dissemination techniques for biomedical data. We focused on the challenge of sharing aggregate human genomic data (e.g., allele frequencies) in a way that preserves the privacy of the data donors, w...

Journal: :IJISP 2009
Ian Reay Patricia Beatty Scott Dick James Miller

Numerous countries around the world have enacted privacy-protection legislation, in an effort to protect their citizens and instill confidence in the valuable business-to-consumer E-commerce industry. These laws will be most effective if and when they establish a standard of practice that consumers can use as a guideline for the future behavior of e-commerce vendors. However, while privacy-prot...

Journal: :Behavior research methods 2017
Adrian Hoffmann Berenike Waubert de Puiseau Alexander F Schmidt Jochen Musch

On surveys that assess sensitive personal attributes, indirect questioning aims at increasing respondents' willingness to answer truthfully by protecting confidentiality. However, the assumption that subjects understand questioning procedures fully and trust them to protect their privacy is rarely tested. In a scenario-based design, we compared four indirect questioning procedures in terms of t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید