Results 321 to 330 of about 1,939,766 (365)

Disaster Privacy/Privacy Disaster [PDF]

open access: possibleSSRN Electronic Journal, 2019
AbstractPrivacy expectations during disasters differ significantly from nonemergency situations. This paper explores the actual privacy practices of popular disaster apps, highlighting location information flows. Our empirical study compares content analysis of privacy policies and government agency policies, structured by the contextual integrity ...
Yan Shvartzshnaider   +8 more
openaire   +2 more sources

A Survey on Differential Privacy for Unstructured Data Content

ACM Computing Surveys, 2022
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously generated and shared, and it is a challenge to protect sensitive personal information in them, such as human faces, voiceprints, and authorships.
Ying Zhao, Jinjun Chen
semanticscholar   +1 more source

Practical Secure Aggregation for Privacy-Preserving Machine Learning

IACR Cryptology ePrint Archive, 2017
We design a novel, communication-efficient, failure-robust protocol for secure aggregation of high-dimensional data. Our protocol allows a server to compute the sum of large, user-held data vectors from mobile devices in a secure manner (i.e.
Keith Bonawitz   +8 more
semanticscholar   +1 more source

MONEY IS PRIVACY* [PDF]

open access: possibleInternational Economic Review, 2004
An extensive literature in monetary theory has emphasized the role of money as a record‐keeping device. Money assumes this role in situations where using credit would be too costly, and some might argue that this role will diminish as the cost of information and thus the cost of credit‐based transactions continues to fall.
James McAndrews   +3 more
openaire   +4 more sources

SecureML: A System for Scalable Privacy-Preserving Machine Learning

IEEE Symposium on Security and Privacy, 2017
Machine learning is widely used in practice to produce predictive models for applications such as image processing, speech and text recognition. These models are more accurate when trained on large amount of data collected from different sources. However,
Payman Mohassel, Yupeng Zhang
semanticscholar   +1 more source

Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model

Information systems research, 2004
The lack of consumer confidence in information privacy has been identified as a major problem hampering the growth of e-commerce. Despite the importance of understanding the nature of online consumers' concerns for information privacy, this topic has ...
N. Malhotra, Sung S. Kim, James Agarwal
semanticscholar   +1 more source

Privacy, Privacy, Privacy

2011
There was a time in the not-so-distant past when most people shared their life experiences via email or direct instant messaging (IM). With respect to privacy and security, it was a simpler time—users logged in directly to their email or IM accounts and sent links, pictures, and so on directly from their desktop or laptop to one or more specific ...
Christopher White, Chris Dannen
openaire   +2 more sources

Privacy-preserving deep learning

Allerton Conference on Communication, Control, and Computing, 2015
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text.
R. Shokri, Vitaly Shmatikov
semanticscholar   +1 more source

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

IEEE Symposium on Security and Privacy, 2016
Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties.
Ahmed E. Kosba   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy