Results 31 to 40 of about 5,046,112 (378)

Statement of Privacy Policy

open access: yes, 2020
Privacy ...
Fatima, Feroza, Kadori, Waad Ibrahim
openaire   +5 more sources

Refinement checking for privacy policies

open access: yesScience of Computer Programming, 2012
AbstractThis paper presents a framework for analysis and comparison of privacy policies expressed in P3P (Platform for Privacy Preferences). In contrast to existing approaches to policy analysis, which focus on demonstrations of equality or equivalence of policies, our approach makes it possible to check for refinement between policies.
Papanikolaou, N, Creese, S, Goldsmith, M
openaire   +2 more sources

Development and Analysis of Deterministic Privacy-Preserving Policies Using Non-Stochastic Information Theory [PDF]

open access: yes, 2019
A deterministic privacy metric using non-stochastic information theory is developed. Particularly, minimax information is used to construct a measure of information leakage, which is inversely proportional to the measure of privacy.
Farokhi, Farhad
core   +2 more sources

Establishing a Strong Baseline for Privacy Policy Classification

open access: yesIFIP International Information Security Conference, 2020
Digital service users are routinely exposed to Privacy Policy consent forms, through which they enter contractual agreements consenting to the specifics of how their personal data is managed and used.
Najmeh Mousavi Nejad   +4 more
semanticscholar   +1 more source

Non-Stochastic Hypothesis Testing with Application to Privacy Against Hypothesis-Testing Adversary [PDF]

open access: yes, 2019
In this paper, we consider privacy against hypothesis testing adversaries within a non-stochastic framework. We develop a theory of non-stochastic hypothesis testing by borrowing the notion of uncertain variables from non-stochastic information theory ...
Farokhi, Farhad
core   +2 more sources

Privacy-Preserving Design of Scalar LQG Control

open access: yesEntropy, 2022
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B.
Edoardo Ferrari   +4 more
doaj   +1 more source

Correction to: Which Privacy Policy Works, Privacy Assurance or Personalization Declaration? An Investigation of Privacy Policies and Privacy Concerns [PDF]

open access: yesJournal of Business Ethics, 2020
This study focuses on two specific privacy policies, namely privacy assurance and personalization declaration. Specifically, we investigate how these distinct privacy policies affect customers’ privacy concerns and subsequent purchase responses. We have developed a conceptual model that addresses the independent effects of privacy assurance and ...
Yiping Amy Song   +5 more
openaire   +2 more sources

Obligations of trust for privacy and confidentiality in distributed transactions [PDF]

open access: yes, 2009
Purpose – This paper aims to describe a bilateral symmetric approach to authorization, privacy protection and obligation enforcement in distributed transactions.
Anne Anderson   +4 more
core   +1 more source

Privacy Policies

open access: yes, 2007
Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes it inside the enterprise and shares it with partner ...
Dekker, M.A.C.   +2 more
openaire   +1 more source

A Framework for Analyzing and Comparing Privacy States [PDF]

open access: yes, 2014
This article develops a framework for analyzing and comparing privacy and privacy protections across (inter alia) time, place, and polity and for examining factors that affect privacy and privacy protection.
Biava, Ryan, Rubel, Alan
core   +1 more source

Home - About - Disclaimer - Privacy