Results 11 to 20 of about 747,487 (289)
Review on Video Privacy Protection [PDF]
With the rapid development of video processing technology and the continuous reduction of hardware costs,surveillance equipment has become more and more widely used.The leakage of privacy issues brought about by the popularity of video surveillance has ...
JIN Hua, ZHU Jing-yu, WANG Chang-da
doaj +1 more source
Privacy literacy is recognized as a crucial skill for safeguarding personal privacy online. However, self-assessed privacy literacy often diverges from actual literacy, revealing the presence of cognitive biases. The protection motivation theory (PMT) is
Shuai Ma, Chen Chen
doaj +1 more source
Privacy Protection Model and Parameter Optimization Method for Data Dissemination [PDF]
In order to improve the privacy protection for data to be published,this paper proposes a privacy protection model integrating k-anonymity,l-diversity and t-closure methods.The model can assist in the selection of the most suitable privacy protection ...
XU Yabin, GUO Hao
doaj +1 more source
Review of semantic-based privacy-preserving approaches in LBS
The development of location-based services (LBS) caused serious privacy concerns.Semantic-based pri-vacy-preserving approaches is an important part of privacy protection in LBS.The recent work on location privacy protection based on semantics were ...
Ming-jie MA +3 more
doaj +3 more sources
Privacy protection methods of location services in big data
The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure.
Liu Wenfeng, Wu Juanjuan, Xi Zhong
doaj +1 more source
An Examination of Privacy Policies of US Government Senate Websites. [PDF]
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core +2 more sources
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den +4 more
core +1 more source
Technology, privacy and identity: a Hong Kong perspective [PDF]
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial
Wong, R, Yap, JL
core +1 more source
Online taxi users' optimistic bias: China youths' digital travel and information privacy protection
Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection.
Xiaoyang Meng, Bobo Feng
doaj +1 more source

