Results 251 to 260 of about 105,458 (285)
Some of the next articles are maybe not open access.
Privacy, Patience, and Protection
SSRN Electronic Journal, 2019We analyze repeated games in which players have private information about their levels of patience and in which they would like to maintain the privacy of this information vis-a-vis third parties. We show that privacy protection in the form of shielding players’ actions from outside observers is harmful, as it limits and sometimes eliminates the ...
Ronen Gradwohl, Rann Smorodinsky
openaire +3 more sources
2013
The main motivation behind indirect questioning is to increase participation, reduce nonresponse and reduce untruthful responses in surveys dealing with stigmatizing characteristics. Indirect questioning techniques are often advertised as methods protecting the privacy of the participants in surveys dealing with stigmatizing or sensitive issues.
Tasos C. Christofides, Arijit Chaudhuri
openaire +2 more sources
The main motivation behind indirect questioning is to increase participation, reduce nonresponse and reduce untruthful responses in surveys dealing with stigmatizing characteristics. Indirect questioning techniques are often advertised as methods protecting the privacy of the participants in surveys dealing with stigmatizing or sensitive issues.
Tasos C. Christofides, Arijit Chaudhuri
openaire +2 more sources
Navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management, 2009Navigational path query, one of the most popular location-based services (LBSs), determines a route from a source to a destination on a road network. However, issuing path queries to some non-trustworthy service providers may pose privacy threats to the users.
LEE, Ken C. K.+3 more
openaire +3 more sources
The value and protection of privacy
Computer Networks and ISDN Systems, 1995Abstract Privacy is an essential part of a social structure, but its value is instrumental, rather than intrinsic. Both technology and law can play important roles in the protection of privacy, but neither can offer a guarantee. Nor can privacy be claimed as a right. The protection of privacy must ultimately rest on trust, respect and agreement.
openaire +2 more sources
An experiment in privacy protection
Medical Journal of Australia, 1984During investigation of toxic shock syndrome in New South Wales, record keepers were requested not to disclose the identities of subjects. Nevertheless, many record keepers disclosed these identities to the investigator. Covering letters giving extra stress to privacy protection had no special effect. The extent of disclosure appeared to be greater for
openaire +3 more sources
Protection of Privacy on the Web
2010Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server.
Thomas M. Chen, Zhi (Judy) Fu
openaire +1 more source
Protecting Privacy and Confidentiality
Journal of Aggression, Maltreatment & Trauma, 2005Summary This article discusses the confidentiality of communications between therapist and patient and the scope of, and exceptions to, the privilege preventing such communications from being disclosed. Ethical principles, statutes, and case law will be explored.
O. Brandt Caudill, Alan I. Kaplan
openaire +2 more sources
Dealing with Privacy for Protecting Information
2021Privacy is being a trending topic in cybersecurity context not only because it is related to current regulations such as GDPR, but also because it has an impact on every citizen within this digitalized world. In fact, there is a huge number of software systems managing or processing information related to individuals in somehow, and therefore software ...
Larrucea, Xabier, Santamaria, Izaskun
openaire +2 more sources
ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Ricardo Sanchez-Matilla+4 more
openaire +2 more sources
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Ricardo Sanchez-Matilla+4 more
openaire +2 more sources
2020
Since 1850 there has been increased attention to data confidentiality in the census. Title 13 of the U.S. Code makes confidentiality mandatory. Census personnel take lifelong oaths to keep the data confidential, and many statistical protections have been developed to mask data about individuals.
Teresa A. Sullivan, Teresa A. Sullivan
openaire +2 more sources
Since 1850 there has been increased attention to data confidentiality in the census. Title 13 of the U.S. Code makes confidentiality mandatory. Census personnel take lifelong oaths to keep the data confidential, and many statistical protections have been developed to mask data about individuals.
Teresa A. Sullivan, Teresa A. Sullivan
openaire +2 more sources