Results 41 to 50 of about 4,362,198 (352)

OPPO: An Ontology for Describing Fine-Grained Data Practices in Privacy Policies of Online Social Networks [PDF]

open access: yesarXiv, 2023
Privacy policies outline the data practices of Online Social Networks (OSN) to comply with privacy regulations such as the EU-GDPR and CCPA. Several ontologies for modeling privacy regulations, policies, and compliance have emerged in recent years.
arxiv  

Privacy-Preserving Design of Scalar LQG Control

open access: yesEntropy, 2022
This paper studies the agent identity privacy problem in the scalar linear quadratic Gaussian (LQG) control system. The agent identity is a binary hypothesis: Agent A or Agent B.
Edoardo Ferrari   +4 more
doaj   +1 more source

Co-constitutive complexityUnpacking Google’s privacy policy and terms of service post-GDPR

open access: yesNordicom Review, 2021
Google is the gateway to the Internet for billions of people. However, to use Google’s multiple platforms and services, users must accept Google’s terms.
Valtysson Bjarki   +2 more
doaj   +1 more source

Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996--2021 [PDF]

open access: yesarXiv, 2022
It is well-known that most users do not read privacy policies, but almost all users tick the box to agree with them. In this paper, we analyze the 25-year history of privacy policies using methods from transparency research, machine learning, and natural language processing. Specifically, we collect a large-scale longitudinal corpus of privacy policies
arxiv  

SeePrivacy: Automated Contextual Privacy Policy Generation for Mobile Applications [PDF]

open access: yesarXiv, 2023
Privacy policies have become the most critical approach to safeguarding individuals' privacy and digital security. To enhance their presentation and readability, researchers propose the concept of contextual privacy policies (CPPs), aiming to fragment policies into shorter snippets and display them only in corresponding contexts.
arxiv  

Automating Privacy Compliance Using Policy Integrated Blockchain

open access: yesCryptography, 2019
An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling personal data are mandated to track
Karuna Pande Joshi, Agniva Banerjee
doaj   +1 more source

A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy

open access: yesIEEE Access, 2021
The policy-controlled signature (PCS) scheme uses the access policy to control signature verification permission. However public access policy that may contain private information will leak user privacy.
Xurui Zheng   +5 more
doaj   +1 more source

IoT Privacy Risks Revealed

open access: yesEntropy
A user’s devices such as their phone and computer are constantly bombarded by IoT devices and associated applications seeking connection to the user’s devices. These IoT devices may or may not seek explicit user consent, thus leaving the users completely
Kai-Chih Chang   +3 more
doaj   +1 more source

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments

open access: yesFuture Internet, 2015
The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through interconnected and interoperable deployments, can be assisted by the incorporation of privacy policy
Prokopios Drogkaris   +3 more
doaj   +1 more source

An Examination of Academic Library Privacy Policy Compliance with Professional Guidelines

open access: yesEvidence Based Library and Information Practice, 2022
Objective – The tension between upholding privacy as a professional value and the ubiquity of collecting patrons’ data to provide online services is now common in libraries.
Greta Valentine, Kate Barron
doaj   +1 more source

Home - About - Disclaimer - Privacy