Results 61 to 70 of about 22,742,798 (333)
There is increasing need to build information systems that protect the privacy and ownership of data without impeding the flow of information. We will present some of our current work to demonstrate the technical feasibility of building such systems.
openaire +2 more sources
This paper derives a preference for data privacy from consumers' temptation utility. This approach facilitates a welfare analysis of different data privacy regulations, such as the GDPR enacted by the European Union and the CCPA enacted by the state of California, when a fraction of the consumers may succumb to targeted advertising of temptation goods.
Wei Xiong, Zhuang Liu, Michael Sockin
openaire +2 more sources
Data security and privacy in the cloud [PDF]
Relying on the cloud for storing data and performing computations has become a popular solution in today’s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions.
S. De Capitani di Vimercati+3 more
openaire +1 more source
DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES
In today's interconnected digital world, data privacy and security have emerged as paramount concerns for individuals, organizations, and governments alike. This review provides a comprehensive review of techniques and challenges surrounding data privacy
Oluwatoyin Ajoke Fayayola+2 more
semanticscholar +1 more source
Differentially Private Regression for Discrete-Time Survival Analysis
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core +1 more source
Privacy Attitudes among Early Adopters of Emerging Health Technologies. [PDF]
IntroductionAdvances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals.
Bietz, Matthew J+3 more
core +3 more sources
Adversarial attacks and defenses in deep learning
The adversarial example is a modified image that is added imperceptible perturbations, which can make deep neural networks decide wrongly. The adversarial examples seriously threaten the availability of the system and bring great security risks to the ...
LIU Ximeng+2 more
doaj +1 more source
Randori: Local Differential Privacy for All [PDF]
Polls are a common way of collecting data, including product reviews and feedback forms. However, few data collectors give upfront privacy guarantees. Additionally, when privacy guarantees are given upfront, they are often vague claims about 'anonymity'.
arxiv
An Examination of Privacy Policies of US Government Senate Websites. [PDF]
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core +2 more sources
Integrating Technical and Legal Concepts of Privacy
We provide an overview of legal and technical concepts of privacy protection. Data protection guarantees exist in European Union at a primary law level since 2009, when the Lisbon Treaty has become effective.
Ana Sokolovska, Ljupco Kocarev
doaj +1 more source