Results 11 to 20 of about 1,212,365 (214)
Unprecedented, exponential growth in the amount of consumer data collected by retailers across various customer touchpoints has made safeguarding data privacy a key priority. Data privacy in retail contexts requires convergence among three key stakeholders—consumer, retailer, and regulatory—each of which has unique roles and viewpoints.
Martin, KD+7 more
openaire +4 more sources
Automatic Assessment of Privacy Policies under the GDPR
To comply with the EU General Data Protection Regulation (GDPR), companies managing personal data have been forced to review their privacy policies. However, privacy policies will not solve any problems as long as users do not read or are not able to ...
David Sánchez+2 more
doaj +1 more source
KeyNet: An Asymmetric Key-Style Framework for Watermarking Deep Learning Models
Many organizations devote significant resources to building high-fidelity deep learning (DL) models. Therefore, they have a great interest in making sure the models they have trained are not appropriated by others. Embedding watermarks (WMs) in DL models
Najeeb Moharram Jebreel+3 more
doaj +1 more source
Government Access to Personal Data and Transnational Interoperability: An Accountability Perspective
This article applies the principle of ʻaccountabilityʼ to the issue of international transfers of personal data and government requirements for access to that data.
Christopher Docksey, Kenneth Propp
doaj +1 more source
Design and Security Analysis of Cryptosystems
The development of cryptography is closely related to the development of computers [...]
Suhri Kim, Seokhie Hong
doaj +1 more source
Privacy in Data Service Composition [PDF]
In modern information systems different information features, about the same individual, are often collected and managed by autonomous data collection services that may have different privacy policies. Answering many end-users' legitimate queries requires the integration of data from multiple such services.
Mahmoud Barhamgi+5 more
openaire +7 more sources
Big Technology and Data Privacy [PDF]
Kwangmo Yang
doaj +5 more sources
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj +1 more source
Privacy of Outsourced Data [PDF]
Data outsourced to an external storage server are usually encrypted since there is the common assumption that all data are equally sensitive. The encrypted data however cannot be efficiently queried and their selective release is not possible or require the application of specific solutions.
S. De Capitani di Vimercati, S. Foresti
openaire +2 more sources
Balancing smartness and privacy for the Ambient Intelligence [PDF]
Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint.
Anciaux, Nicolas+3 more
core +7 more sources