Results 1 to 10 of about 2,213,706 (287)

INTERNET PRIVACY PROTOCOLS

open access: yesZfM - Zeitschrift für Medienwissenschaft, 2023
Offenes und verdecktes Sammeln von Daten ist integraler Bestandteil des Webs. Schon früh versuchten verschiedene Initiativen, Protokolle und globale Standards für Datenschutz im Internet zu entwickeln, aber angesichts der offenen Struktur des Webs konnten sich diese Techniken, die von datenorientierten Marktakteure*innen abgelehnt wurden, nicht ...
Degeling, Martin, Human, Soheil
openaire   +2 more sources

Privacy and Trust in the Internet of Vehicles [PDF]

open access: yesIEEE Transactions on Intelligent Transportation Systems, 2022
The Internet of Vehicles aims to fundamentally improve transportation by connecting vehicles, drivers, passengers, and service providers together. Several new services such as parking space identification, platooning and intersection control--to name just a few--are expected to improve traffic congestion, reduce pollution, and improve the efficiency ...
Efstathios Zavvos   +5 more
openaire   +4 more sources

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [PDF]

open access: yesIEEE Internet of Things Journal, 2021
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging.
Bin Jiang   +3 more
arxiv   +3 more sources

Personal Information Privacy Settings of Online Social Networks and their Suitability for Mobile Internet Devices [PDF]

open access: bronzeInternational Journal of Security, Privacy and Trust Management (IJSPTM), vol 2, No 2, April 2013, 2013
Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft.
Nahier Aldhafferi   +2 more
arxiv   +2 more sources

Governing the internet in the privacy arena [PDF]

open access: diamondInternet Policy Review, 2016
The surveillance disclosures triggered by Snowden have fueled the public re-negotiation of privacy. To follow resulting controversies we present a methodology that links social worlds theory to approaches asking for the democratic governance character of issue-centred arenas. After having outlined this approach it is put to the test.
Carsten Ochs   +3 more
openalex   +6 more sources

Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance [PDF]

open access: yes, 2016
The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot be trusted makes the IP Internet inherently vulnerable ...
Garcia-Luna-Aceves, J. J.
core   +2 more sources

In Things We Trust? Towards trustability in the Internet of Things [PDF]

open access: yesarXiv, 2011
This essay discusses the main privacy, security and trustability issues with the Internet of ...
A. Bandura   +9 more
core   +2 more sources

Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’ [PDF]

open access: greenInternational Journal of Human-Computer Studies, 2007
A consistent finding reported in online privacy research is that an overwhelming majority of people are 'concerned' about their privacy when they use the Internet. Therefore, it is important to understand the discourse of Internet users' privacy concerns, and any actions they take to guard against these concerns.
Carina Paine   +4 more
openalex   +6 more sources

Privacy Preserving Internet Browsers: Forensic Analysis of Browzar

open access: green, 2017
With the advance of technology, Criminal Justice agencies are being confronted with an increased need to investigate crimes perpetuated partially or entirely over the Internet. These types of crime are known as cybercrimes.
C Flowers   +9 more
core   +3 more sources

Home - About - Disclaimer - Privacy