Results 21 to 30 of about 1,497,806 (238)

Data protection: the future of privacy [PDF]

open access: yes, 2011
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the ...
Wong, R
core   +1 more source

Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]

open access: yes, 2019
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M   +3 more
core   +2 more sources

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Privacy preserving data visualizations

open access: yesEPJ Data Science, 2021
Data visualizations are a valuable tool used during both statistical analysis and the interpretation of results as they graphically reveal useful information about the structure, properties and relationships between variables, which may otherwise be ...
Demetris Avraam   +7 more
doaj   +1 more source

Practical Data-in-Use Protection Using Binary Decision Diagrams

open access: yesIEEE Access, 2020
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka   +4 more
doaj   +1 more source

Privacy Attitudes among Early Adopters of Emerging Health Technologies. [PDF]

open access: yes, 2016
IntroductionAdvances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals.
Bietz, Matthew J   +3 more
core   +3 more sources

Quantifying Differential Privacy under Temporal Correlations

open access: yes, 2017
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang   +3 more
core   +1 more source

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Context-Aware Generative Adversarial Privacy

open access: yes, 2017
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao   +4 more
core   +2 more sources

Differentially Private Regression for Discrete-Time Survival Analysis

open access: yes, 2017
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core   +1 more source

Home - About - Disclaimer - Privacy