Results 61 to 70 of about 941,166 (211)
A Privacy by Design Approach to Lifelogging [PDF]
Technologies that enable us to capture and publish data with ease are likely to pose new concerns about privacy of the individual. In this article we examine the privacy implications of lifelogging, a new concept being explored by early adopters, which utilises wearable devices to generate a media rich archive of their life experience.
Gurrin, Cathal+3 more
openaire +2 more sources
Privacy-enhancing Aggregation of Internet of Things Data via Sensors Grouping
Big data collection practices using Internet of Things (IoT) pervasive technologies are often privacy-intrusive and result in surveillance, profiling, and discriminatory actions over citizens that in turn undermine the participation of citizens to the ...
Arabie+76 more
core +1 more source
Privacy in Electronic Health Records (EHR) has become a significant concern in today’s rapidly changing world, particularly for personal and sensitive user data.
Farida Habib Semantha+3 more
doaj +1 more source
Quantifying Differential Privacy under Temporal Correlations
Differential Privacy (DP) has received increased attention as a rigorous privacy framework. Existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do ...
Cao, Yang+3 more
core +1 more source
Privacy as an International Human Right and the Right to Obscurity in Cyberspace
Fundamental rights are considered to be those which human beings have by the fact of being human and are neither created nor can be abrogated by any government absent extraordinary circumstances.
Alexandra Rengel
doaj +1 more source
The importance of being aware when acting in a commercial world
The Italian SA (Garante perla protezione dei dati personali)fined Enel Energia (‘EE’) over EUR 26.5 million on account of unlawfully processing users’ personal data for telemarketing purposes. The Authority also imposed EE to implement several corrective
Ivana Genestrone
doaj +1 more source
Prochlo: Strong Privacy for Analytics in the Crowd
The large-scale monitoring of computer users' software activities has become commonplace, e.g., for application telemetry, error reporting, or demographic profiling. This paper describes a principled systems architecture---Encode, Shuffle, Analyze (ESA)--
Abadi M.+22 more
core +1 more source
A Privacy-by-Design Contextual Suggestion System for Tourism
We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism.
Pavlos S. Efraimidis+4 more
doaj +1 more source
Rethinking Location Privacy for Unknown Mobility Behaviors
Location Privacy-Preserving Mechanisms (LPPMs) in the literature largely consider that users' data available for training wholly characterizes their mobility patterns.
Oya, Simon+2 more
core +1 more source
Open-source intelligence and privacy by design [PDF]
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the
Koops, B.J., Hoepman, J.H., Leenes, R.
openaire +5 more sources