Results 31 to 40 of about 731,874 (341)
Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne +2 more
core +1 more source
The fact that the cyber environment does not have clear boundaries, and the difficulties in taking control of this environment, can turn online sharing into a source of concern in terms of privacy.
Çağdaş Ümit Yazgan
doaj +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
Is the Privacy Paradox a Domain-Specific Phenomenon
The digital era introduces significant challenges for privacy protection, which grow constantly as technology advances. Privacy is a personal trait, and individuals may desire a different level of privacy, which is known as their “privacy concern”.
Ron S. Hirschprung
doaj +1 more source
Shifts in Privacy Concerns [PDF]
This paper explores how digitization and the associated use of customer data have affected the evolution of consumer privacy concerns. We measure privacy concerns by reluctance to disclose income in an online marketing research survey. Using over three million responses over eight years, our data show: (1) Refusals to reveal information have risen ...
Tucker, Catherine Elizabeth +1 more
openaire +3 more sources
Differential Privacy: on the trade-off between Utility and Information Leakage [PDF]
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent ...
Alvim, Mário S. +4 more
core +6 more sources
Why concern regarding privacy differs: The influence of age and (non-)participation on Facebook
Young people have obtained a reputation for caring less about their privacy due to their self-revealing presence on social media. Although one might easily be inclined to think that young people do not care about their privacy, an explanation for this ...
Wouter M. P. Steijn +2 more
doaj +1 more source
ABSTRACT Background The HIT network was established in 2000 to create a population‐based structure aiming to improve survival rates and reduce late effects for children with central nervous system (CNS) tumors by conducting comprehensive clinical trials.
Stefan Rutkowski +59 more
wiley +1 more source
“Anchoring Effect” of Privacy in Targeted Persuasive Advertising Competition
Consumer privacy information is used to target persuasive advertising in E-commerce, which raises consumer privacy concern. Consumer privacy concern is relative to consumer’s intrinsic privacy concern and social concern over the application of consumer ...
Yuxiang Zhang, Weijun Zhong
doaj +1 more source
Implanting Life-Cycle Privacy Policies in a Context Database [PDF]
Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction.
Anciaux, Nicolas +3 more
core +2 more sources

