Results 61 to 70 of about 22,742,798 (333)

Data Privacy [PDF]

open access: yes, 2004
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the technical feasibility of building such systems.
openaire   +2 more sources

Data Privacy and Temptation

open access: yesSSRN Electronic Journal, 2020
This paper derives a preference for data privacy from consumers' temptation utility. This approach facilitates a welfare analysis of different data privacy regulations, such as the GDPR enacted by the European Union and the CCPA enacted by the state of California, when a fraction of the consumers may succumb to targeted advertising of temptation goods.
Wei Xiong, Zhuang Liu, Michael Sockin
openaire   +2 more sources

Data security and privacy in the cloud [PDF]

open access: yesMobile Multimedia/Image Processing, Security, and Applications 2019, 2019
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati   +3 more
openaire   +1 more source

DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES

open access: yesComputer Science & IT Research Journal
In today's interconnected digital world, data privacy and security have emerged as paramount concerns for individuals, organizations, and governments alike. This review provides a comprehensive review of techniques and challenges surrounding data privacy
Oluwatoyin Ajoke Fayayola   +2 more
semanticscholar   +1 more source

Differentially Private Regression for Discrete-Time Survival Analysis

open access: yes, 2017
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core   +1 more source

Privacy Attitudes among Early Adopters of Emerging Health Technologies. [PDF]

open access: yes, 2016
IntroductionAdvances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals.
Bietz, Matthew J   +3 more
core   +3 more sources

Adversarial attacks and defenses in deep learning

open access: yes网络与信息安全学报, 2020
The adversarial example is a modified image that is added imperceptible perturbations, which can make deep neural networks decide wrongly. The adversarial examples seriously threaten the availability of the system and bring great security risks to the ...
LIU Ximeng   +2 more
doaj   +1 more source

Randori: Local Differential Privacy for All [PDF]

open access: yesarXiv, 2021
Polls are a common way of collecting data, including product reviews and feedback forms. However, few data collectors give upfront privacy guarantees. Additionally, when privacy guarantees are given upfront, they are often vague claims about 'anonymity'.
arxiv  

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Integrating Technical and Legal Concepts of Privacy

open access: yesIEEE Access, 2018
We provide an overview of legal and technical concepts of privacy protection. Data protection guarantees exist in European Union at a primary law level since 2009, when the Lisbon Treaty has become effective.
Ana Sokolovska, Ljupco Kocarev
doaj   +1 more source

Home - About - Disclaimer - Privacy