Results 11 to 20 of about 883,754 (339)
GDPR-oriented intelligent checking method of privacy policies compliance
The implementation of the EU’s General Data Protection Regulation (GDPR) has resulted in the imposition of over 300 fines since its inception in 2018.These fines include significant penalties for prominent companies like Google, which were penalized for ...
Xin LI, Peng TANG, Xiheng ZHANG, Weidong QIU, Hong HUI
doaj +3 more sources
Asia Pacific Economic Cooperation (APEC) is a grouping of twenty-one member economies in the Asia Pacific Region. It was established in 1989 to facilitate economic growth, cooperation, trade and investment in the region.
Nigel Waters
doaj +1 more source
A randomized block policy gradient algorithm with differential privacy in Content Centric Networks
Policy gradient methods are effective means to solve the problems of mobile multimedia data transmission in Content Centric Networks. Current policy gradient algorithms impose high computational cost in processing high-dimensional data.
Lin Wang +5 more
doaj +1 more source
How to make privacy policies both GDPR-compliant and usable [PDF]
It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline.
Renaud, Karen, Shepherd, Lynsay
core +4 more sources
A Framework for Analyzing and Comparing Privacy States [PDF]
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core +1 more source
The Shorter the Better? Effects of Privacy Policy Length on Online Privacy Decision-Making
Privacy policies provide Internet users with the possibility to inform themselves about websites’ usage of their disclosed personal data. Strikingly, however, most people tend not to read privacy policies because they are long and cumbersome, indicating ...
Yannic Meier +2 more
doaj +1 more source
Consent Verification Under Evolving Privacy Policies [PDF]
Personal data provides important business value, for example, in the personalization of services. In addition, companies are moving toward new business models, in which products and services are offered without charge to users, but in exchange for ...
D. Breaux, Travis +3 more
core +1 more source
Privacy-Preserving Design of Scalar LQG Control
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B.
Edoardo Ferrari +4 more
doaj +1 more source
Refinement checking for privacy policies
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Papanikolaou, N, Creese, S, Goldsmith, M
openaire +1 more source
Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversary [PDF]
In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic framework. We develop a theory of non-stochastic hypothesis testing by borrowing the notion of uncertain variables from non-stochastic information theory ...
Farokhi, Farhad
core +2 more sources

