Results 41 to 50 of about 1,768,773 (316)

The Privacy Pragmatic as Privacy Vulnerable [PDF]

open access: yes, 2016
*Abstract: *Alan Westin’s well-known and often-used privacy segmentation fails to describe privacy markets or consumer choices accurately. The segmentation divides survey respondents into “privacy fundamentalists,” “privacy pragmatists,” and the “privacy unconcerned.” It describes the average consumer as a “privacy pragmatist” who influences market ...
openaire   +2 more sources

Privacy Games [PDF]

open access: yesACM Transactions on Economics and Computation, 2014
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss [4, 14, 20, 28].
Or Sheffet, Salil Vadhan, Yiling Chen
openaire   +3 more sources

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Fuzzing is a well-established technique in the software domain to uncover bugs and vulnerabilities. Yet, applications of fuzzing for security vulnerabilities in hardware systems are scarce, as principal reasons are requirements for design information ...
Maik Ender   +4 more
doaj   +1 more source

Group privacy management strategies and challenges in Facebook : a focus group study among Flemish youth organizations [PDF]

open access: yes, 2016
A large body of research has studied young people’s privacy practices and needs in Facebook. Less is known about group privacy. In this study 12 focus groups were organized with a total of 78 adolescents and young adults of local Flemish youth ...
De Wolf, Ralf
core   +3 more sources

What Do Our Choices Say About Our Preferences?

open access: yes, 2021
Taking online decisions is a part of everyday life. Think of buying a house, parking a car or taking part in an auction. We often take those decisions publicly, which may breach our privacy - a party observing our choices may learn a lot about our ...
Grining, Krzysztof   +2 more
core  

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Launching the Society for Privacy and Confidentiality Research to Own the Journal of Privacy and Confidentiality

open access: yesThe Journal of Privacy and Confidentiality
We describe the launching of the Society for Privacy and Confidentiality Research (SPCR). SPCR is the new owner of the Journal of Privacy and Confidentiality, with the goal of ensuring a sustainable future for the Journal, and continuing to publish the ...
John M. Abowd   +6 more
doaj   +1 more source

Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges

open access: yesIEEE Access, 2022
Targets of cyber crime are not exclusive to the private sector. Successful cyber attacks on nation-states have proved that cyber threats can jeopardize significant national interests.
Suhyeon Lee, Seungjoo Kim
doaj   +1 more source

Privacy-Preserving Public Information for Sequential Games

open access: yes, 2014
In settings with incomplete information, players can find it difficult to coordinate to find states with good social welfare. For example, in financial settings, if a collection of financial firms have limited information about each other's strategies ...
Blum, Avrim   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy