نتایج جستجو برای: privacy protection

تعداد نتایج: 218145  

2011
Rong Chen

Traditional privacy research would suggest that whether to disclose personal information or not is an individual-based action. However in this paper, we suggest that the consideration of interpersonal level of interaction would also be of vital importance to privacy protection on Social Network Sites (SNS). Based on the theory of self-efficacy, we postulate a research framework that includes th...

Journal: :International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 2012
Sabrina De Capitani di Vimercati Sara Foresti Giovanni Livraga Pierangela Samarati

The proper protection of data privacy is a complex task that requires a careful analysis of what actually has to be kept private. Several definitions of privacy have been proposed over the years, from traditional syntactic privacy definitions, which capture the protection degree enjoyed by data respondents with a numerical value, to more recent semantic privacy definitions, which take into cons...

2006
Geoff Skinner Elizabeth Chang

There are numerous information privacy approaches based on the four major models of privacy protection. That is, Comprehensive Privacy Laws, Sectoral Privacy Laws, Privacy Self-Regulation, and Technologies of Privacy. These solutions, used individually or without proper system privacy design considerations, have not been very effective. This is because there has been little in the way of instru...

Journal: :I. J. Network Security 2013
Min-Yu Chen Chou Chen Yang Min-Shiang Hwang

For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...

Journal: :IJISP 2010
Munir Majdalawieh

This paper discusses the challenges that faced in the “DigNet” age in terms of privacy and proposes a framework for privacy protection. This framework is integral in ensuring that personal data protection is impeded part of business processes of any systems that are involved in collecting, disseminating, and accessing an individual’s data. The cooperation and partnership between nations in pass...

2005
DAVID LINDSAY

[Recent years have seen significant developments in the protection of privacy at general law in common law jurisdictions, including the United Kingdom and New Zealand. Although the general law protection of privacy in Australia is uncertain, there has been a proliferation of information privacy laws at both federal and state levels. This article contends that the future development of privacy l...

2001
Gio Wiederhold

Balyard had stopped off at the local personnel office for the name of a representative American in the neighborhood. The personnel machines had considered the problem and ejected the card of E. R. B. Hagstrohm, who was statistically average in every respect save for the number of his initials: his age (36), his height (5'7"), his weight (148 lbs.), his years of marriage (11), his I.Q. (83), the...

2014
Hajer Fradi Yiqing Yan Jean-Luc Dugelay

The steady growth in the adoption of video surveillance systems emphasizes the need for privacy protection techniques. In this paper, we present a method inspired from image abstraction and non-photorealistic rendering fields for creating privacy protection filters. The effectiveness of the proposed filter has been demonstrated by assessing the intelligibility vs. privacy vs. pleasantness in a ...

2015
Christina M. Steiner Michael D. Kickmeier-Rust Dietrich Albert

To find a balance between learning analytics research and individual privacy a learning analytics project needs to appropriately address privacy and data protection issues and comply with relevant legal regulations. A range of general guidelines, model codes, and principles for appropriate data and privacy protection exist that may serve the consideration of these topics in a learning analytics...

Journal: :IEEE Computer 2003
Bill N. Schilit Jason I. Hong Marco Gruteser

A fter more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA this holiday season is whether to get integrated cellular service or...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید