Results 41 to 50 of about 23,477,104 (364)

Data Privacy Concerns Using mHealth Apps and Smart Speakers: Comparative Interview Study Among Mature Adults

open access: yesJMIR Formative Research, 2021
Background New technologies such as mobile health (mHealth) apps and smart speakers make intensive use of sensitive personal data. Users are typically aware of this and express concerns about their data privacy.
Tanja Schroeder   +2 more
semanticscholar   +1 more source

Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]

open access: yes, 2019
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M   +3 more
core   +2 more sources

Data protection: the future of privacy [PDF]

open access: yes, 2011
The Art. 29 Working Party (hereinafter “Art. 29 WP”) is an influential body comprised of representatives from the Member State Data Protection Authorities2 established under the Data Protection Directive 95/46/EC, has recently issued an opinion with the ...
Wong, R
core   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Data Formation and Privacy Threat of Blockchain [PDF]

open access: yesJisuanji gongcheng, 2023
The blockchain technology utilizes cryptography, consensus algorithms, incentive mechanism, Peer-to-Peer(P2P) network, distributed ledgers, smart contracts, and other key technologies.This enabled its application in a network environment without third ...
Qun WANG, Fujuan LI, Xueli NI, Lingling XIA, Guangjun LIANG
doaj   +1 more source

Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations

open access: yesData & Policy, 2021
The COVID-19 pandemic has exposed the need for more contactless interactions, leading to an acceleration in the design, development, and deployment of digital identity tools and contact-free solutions. A potentially positive outcome of the current crisis
A. Beduschi
semanticscholar   +1 more source

From distributed machine learning to federated learning: In the view of data privacy and security [PDF]

open access: yesConcurrency and Computation, 2020
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server.
Sheng Shen   +4 more
semanticscholar   +1 more source

Practical Data-in-Use Protection Using Binary Decision Diagrams

open access: yesIEEE Access, 2020
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka   +4 more
doaj   +1 more source

Privacy Preserving Data Mining [PDF]

open access: yesJournal of Cryptology, 2000
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lindell, Yehuda, Pinkas, Benny
openaire   +2 more sources

The Data Privacy Paradox and Digital Demand

open access: yesSocial Science Research Network, 2021
A central issue in privacy governance is understanding how users balance their privacy preferences and data sharing to satisfy service demands. We combine survey and behavioral data of a sample of Alipay users to examine how data privacy preferences ...
Long Chen   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy