Results 21 to 30 of about 883,754 (339)
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner ...
Dekker, M.A.C. +2 more
openaire +1 more source
Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core +2 more sources
On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea +3 more
core +1 more source
Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva +2 more
doaj +1 more source
Privacy Policies across the Ages: Content of Privacy Policies 1996–2021
It is well known that most users do not read privacy policies but almost always tick the box to agree with them. While the length and readability of privacy policies have been well studied and many approaches for policy analysis based on natural language processing have been proposed, existing studies are limited in their depth and scope, often ...
openaire +3 more sources
Obligations of trust for privacy and confidentiality in distributed transactions [PDF]
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson +4 more
core +1 more source
Identifying Privacy Policy in Service Terms Using Natural Language Processing [PDF]
Ever since technology (tech) companies realized that people\u27s usage data from their activities on mobile applications to the internet could be sold to advertisers for a profit, it began the Big Data era where tech companies collect as much data as ...
Ishimwe, Ange-Thierry
core +2 more sources
Review: Privacy-Preservation in the Context of Natural Language Processing
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran +2 more
doaj +1 more source
A Logical Method for Policy Enforcement over Evolving Audit Logs [PDF]
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement -
Datta, Anupam, Garg, Deepak, Jia, Limin
core +2 more sources

