Results 41 to 50 of about 23,477,104 (364)
Background New technologies such as mobile health (mHealth) apps and smart speakers make intensive use of sensitive personal data. Users are typically aware of this and express concerns about their data privacy.
Tanja Schroeder +2 more
semanticscholar +1 more source
Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M +3 more
core +2 more sources
Data protection: the future of privacy [PDF]
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the ...
Wong, R
core +1 more source
Detecting Android Locker-Ransomware on Chinese Social Networks
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su +3 more
doaj +1 more source
Data Formation and Privacy Threat of Blockchain [PDF]
The blockchain technology utilizes cryptography, consensus algorithms, incentive mechanism, Peer-to-Peer(P2P) network, distributed ledgers, smart contracts, and other key technologies.This enabled its application in a network environment without third ...
Qun WANG, Fujuan LI, Xueli NI, Lingling XIA, Guangjun LIANG
doaj +1 more source
The COVID-19 pandemic has exposed the need for more contactless interactions, leading to an acceleration in the design, development, and deployment of digital identity tools and contact-free solutions. A potentially positive outcome of the current crisis
A. Beduschi
semanticscholar +1 more source
From distributed machine learning to federated learning: In the view of data privacy and security [PDF]
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server.
Sheng Shen +4 more
semanticscholar +1 more source
Practical Data-in-Use Protection Using Binary Decision Diagrams
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka +4 more
doaj +1 more source
Privacy Preserving Data Mining [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire +2 more sources
The Data Privacy Paradox and Digital Demand
A central issue in privacy governance is understanding how users balance their privacy preferences and data sharing to satisfy service demands. We combine survey and behavioral data of a sample of Alipay users to examine how data privacy preferences ...
Long Chen +3 more
semanticscholar +1 more source

