Results 41 to 50 of about 22,742,798 (333)

Rethinking digital identity for post-COVID-19 societies: Data privacy and human rights considerations

open access: yesData & Policy, 2021
The COVID-19 pandemic has exposed the need for more contactless interactions, leading to an acceleration in the design, development, and deployment of digital identity tools and contact-free solutions. A potentially positive outcome of the current crisis
A. Beduschi
semanticscholar   +1 more source

The Data Privacy Paradox and Digital Demand

open access: yesSocial Science Research Network, 2021
A central issue in privacy governance is understanding how users balance their privacy preferences and data sharing to satisfy service demands. We combine survey and behavioral data of a sample of Alipay users to examine how data privacy preferences ...
Long Chen   +3 more
semanticscholar   +1 more source

Privacy in Data Mining

open access: yesData Mining and Knowledge Discovery, 2005
Peer ...
Domingo-Ferrer, Joan, Torra, Vicenç
openaire   +3 more sources

Data privacy preservation algorithm with k-anonymity

open access: yesWorld wide web (Bussum), 2021
With growing concern of data privacy violations, privacy preservation processes become more intense. The k-anonymity method, a widely applied technique, transforms the data such that the publishing datasets must have at least k tuples to have the same ...
Waranya Mahanan   +5 more
semanticscholar   +1 more source

Why the Economics Profession Must Actively Participate in the Privacy Protection Debate [PDF]

open access: yes, 2019
When Google or the U.S. Census Bureau publish detailed statistics on browsing habits or neighborhood characteristics, some privacy is lost for everybody while supplying public information. To date, economists have not focused on the privacy loss inherent
Abowd, John M   +3 more
core   +2 more sources

Practical Data-in-Use Protection Using Binary Decision Diagrams

open access: yesIEEE Access, 2020
Protection of data-in-use, contrary to the protection of data-at-rest or data-in-transit, remains a challenge. Cryptography advances such as Fully Homomorphic Encryption (FHE) provide theoretical, albeit impractical, solutions to functionally-complete ...
Oleg Mazonka   +4 more
doaj   +1 more source

Harnessing the power of synthetic data in healthcare: innovation, application, and privacy

open access: yesnpj Digit. Medicine, 2023
Data-driven decision-making in modern healthcare underpins innovation and predictive analytics in public health and clinical research. Synthetic data has shown promise in finance and economics to improve risk assessment, portfolio optimization, and ...
M. Giuffré, Dennis L. Shung
semanticscholar   +1 more source

Detecting Android Locker-Ransomware on Chinese Social Networks

open access: yesIEEE Access, 2019
In recent years, an increasing amount of locker-ransomware has been posing a great threat to the Android platform as well as users' properties. Locker-ransomware blackmails victims for ransom by compulsorily locking the devices.
Dan Su   +3 more
doaj   +1 more source

Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants [PDF]

open access: yesarXiv, 2023
Understanding and managing data privacy in the digital world can be challenging for sighted users, let alone blind and low-vision (BLV) users. There is limited research on how BLV users, who have special accessibility needs, navigate data privacy, and how potential privacy tools could assist them.
arxiv  

Data Privacy

open access: yesJournal International Economy, 2022
We define personal data as name, telephone number, address, photograph, or fingerprints, as well as any other data that can identify you, it is critical that we take care of this data for security reasons and because it is our right.
Adrian B. Vazquez
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy