Results 11 to 20 of about 747,487 (289)

Review on Video Privacy Protection [PDF]

open access: yesJisuanji kexue, 2022
With the rapid development of video processing technology and the continuous reduction of hardware costs,surveillance equipment has become more and more widely used.The leakage of privacy issues brought about by the popularity of video surveillance has ...
JIN Hua, ZHU Jing-yu, WANG Chang-da
doaj   +1 more source

Are digital natives overconfident in their privacy literacy? Discrepancy between self-assessed and actual privacy literacy, and their impacts on privacy protection behavior

open access: yesFrontiers in Psychology, 2023
Privacy literacy is recognized as a crucial skill for safeguarding personal privacy online. However, self-assessed privacy literacy often diverges from actual literacy, revealing the presence of cognitive biases. The protection motivation theory (PMT) is
Shuai Ma, Chen Chen
doaj   +1 more source

Privacy Protection Model and Parameter Optimization Method for Data Dissemination [PDF]

open access: yesJisuanji gongcheng, 2021
In order to improve the privacy protection for data to be published,this paper proposes a privacy protection model integrating k-anonymity,l-diversity and t-closure methods.The model can assist in the selection of the most suitable privacy protection ...
XU Yabin, GUO Hao
doaj   +1 more source

Review of semantic-based privacy-preserving approaches in LBS

open access: yes网络与信息安全学报, 2016
The development of location-based services (LBS) caused serious privacy concerns.Semantic-based pri-vacy-preserving approaches is an important part of privacy protection in LBS.The recent work on location privacy protection based on semantics were ...
Ming-jie MA   +3 more
doaj   +3 more sources

Privacy protection methods of location services in big data

open access: yesOpen Computer Science, 2022
The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure.
Liu Wenfeng, Wu Juanjuan, Xi Zhong
doaj   +1 more source

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Technology, privacy and identity: a Hong Kong perspective [PDF]

open access: yes, 2008
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial
Wong, R, Yap, JL
core   +1 more source

Protecting Privacy [PDF]

open access: yesEdinburgh Law Review, 2004
Analysis of Wainwright v Home ...
openaire   +4 more sources

Online taxi users' optimistic bias: China youths' digital travel and information privacy protection

open access: yesFrontiers in Psychology, 2022
Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection.
Xiaoyang Meng, Bobo Feng
doaj   +1 more source

Home - About - Disclaimer - Privacy