Results 41 to 50 of about 1,212,365 (214)

Data Privacy and Temptation

open access: yesSSRN Electronic Journal, 2020
This paper derives a preference for data privacy from consumers' temptation utility. This approach facilitates a welfare analysis of different data privacy regulations, such as the GDPR enacted by the European Union and the CCPA enacted by the state of California, when a fraction of the consumers may succumb to targeted advertising of temptation goods.
Wei Xiong, Zhuang Liu, Michael Sockin
openaire   +2 more sources

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping

open access: yes, 2018
Big data collection practices using Internet of Things (IoT) pervasive technologies are often privacy-intrusive and result in surveillance, profiling, and discriminatory actions over citizens that in turn undermine the participation of citizens to the ...
Arabie   +76 more
core   +1 more source

Differentially Private Regression for Discrete-Time Survival Analysis

open access: yes, 2017
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core   +1 more source

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Utility maximization for multi-vehicle multimedia dissemination in vehicular ad hoc networks

open access: yesInternational Journal of Distributed Sensor Networks, 2018
In vehicular ad hoc networks, maximizing the satisfaction level of multimedia services is a significant issue of concern to users. Relying on the vehicle-to-infrastructure communications, how to schedule the disseminations of multiple vehicles for ...
Bin Pan, Hao Wu
doaj   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

Data protection: the future of privacy [PDF]

open access: yes, 2011
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the ...
Wong, R
core   +1 more source

FAIRification of health-related data using semantic web technologies in the Swiss Personalized Health Network

open access: yesScientific Data, 2023
The Swiss Personalized Health Network (SPHN) is a government-funded initiative developing federated infrastructures for a responsible and efficient secondary use of health data for research purposes in compliance with the FAIR principles (Findable ...
Vasundra Touré   +10 more
doaj   +1 more source

Quantifying Differential Privacy under Temporal Correlations

open access: yes, 2017
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy