Results 41 to 50 of about 4,362,198 (352)
OPPO: An Ontology for Describing Fine-Grained Data Practices in Privacy Policies of Online Social Networks [PDF]
Privacy policies outline the data practices of Online Social Networks (OSN) to comply with privacy regulations such as the EU-GDPR and CCPA. Several ontologies for modeling privacy regulations, policies, and compliance have emerged in recent years.
arxiv
Privacy-Preserving Design of Scalar LQG Control
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B.
Edoardo Ferrari+4 more
doaj +1 more source
Co-constitutive complexityUnpacking Google’s privacy policy and terms of service post-GDPR
Google is the gateway to the Internet for billions of people. However, to use Google’s multiple platforms and services, users must accept Google’s terms.
Valtysson Bjarki+2 more
doaj +1 more source
Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996--2021 [PDF]
It is well-known that most users do not read privacy policies, but almost all users tick the box to agree with them. In this paper, we analyze the 25-year history of privacy policies using methods from transparency research, machine learning, and natural language processing. Specifically, we collect a large-scale longitudinal corpus of privacy policies
arxiv
SeePrivacy: Automated Contextual Privacy Policy Generation for Mobile Applications [PDF]
Privacy policies have become the most critical approach to safeguarding individuals' privacy and digital security. To enhance their presentation and readability, researchers propose the concept of contextual privacy policies (CPPs), aiming to fragment policies into shorter snippets and display them only in corresponding contexts.
arxiv
Automating Privacy Compliance Using Policy Integrated Blockchain
An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling personal data are mandated to track
Karuna Pande Joshi, Agniva Banerjee
doaj +1 more source
The policy-controlled signature (PCS) scheme uses the access policy to control signature verification permission. However public access policy that may contain private information will leak user privacy.
Xurui Zheng+5 more
doaj +1 more source
A user’s devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user’s devices. These IoT devices may or may not seek explicit user consent, thus leaving the users completely
Kai-Chih Chang+3 more
doaj +1 more source
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through interconnected and interoperable deployments, can be assisted by the incorporation of privacy policy
Prokopios Drogkaris+3 more
doaj +1 more source
An Examination of Academic Library Privacy Policy Compliance with Professional Guidelines
Objective – The tension between upholding privacy as a professional value and the ubiquity of collecting patrons’ data to provide online services is now common in libraries.
Greta Valentine, Kate Barron
doaj +1 more source