Results 261 to 270 of about 2,873,813 (294)
Some of the next articles are maybe not open access.
Privacy-Dangers and Protections
2005It is no wonder that the average citizen is concerned about the difficulty of guarding one’s privacy. Now, your own cell phone can reveal your ever-changing whereabouts by means of “location technology” (Lagesse, 2003). Chips that receive coordinates from global positioning satellites now make it possible to locate persons, cars, merchandise, in short,
openaire +2 more sources
2020
Since 1850 there has been increased attention to data confidentiality in the census. Title 13 of the U.S. Code makes confidentiality mandatory. Census personnel take lifelong oaths to keep the data confidential, and many statistical protections have been developed to mask data about individuals.
Teresa A. Sullivan, Teresa A. Sullivan
openaire +2 more sources
Since 1850 there has been increased attention to data confidentiality in the census. Title 13 of the U.S. Code makes confidentiality mandatory. Census personnel take lifelong oaths to keep the data confidential, and many statistical protections have been developed to mask data about individuals.
Teresa A. Sullivan, Teresa A. Sullivan
openaire +2 more sources
Protecting Privacy and Confidentiality
Journal of Aggression, Maltreatment & Trauma, 2005Summary This article discusses the confidentiality of communications between therapist and patient and the scope of, and exceptions to, the privilege preventing such communications from being disclosed. Ethical principles, statutes, and case law will be explored.
O. Brandt Caudill, Alan I. Kaplan
openaire +2 more sources
IEEE Transactions on Industrial Informatics, 2018
In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data environment, for example, the sensor networks contain sensitive ...
Chunyong Yin+3 more
semanticscholar +1 more source
In the research of location privacy protection, the existing methods are mostly based on the traditional anonymization, fuzzy and cryptography technology, and little success in the big data environment, for example, the sensor networks contain sensitive ...
Chunyong Yin+3 more
semanticscholar +1 more source
Science, 2007
W. W. Lowrance and F. S. Collins raise excellent points in their Policy Forum “Identifiability in genomic research” (3 August, p. [600][1]). Assuring privacy protections in both genomic research and medicine practice is of urgent concern. A recent Scientific American article ([1][2]) describes how even deidentified data can be used to reidentify ...
openaire +2 more sources
W. W. Lowrance and F. S. Collins raise excellent points in their Policy Forum “Identifiability in genomic research” (3 August, p. [600][1]). Assuring privacy protections in both genomic research and medicine practice is of urgent concern. A recent Scientific American article ([1][2]) describes how even deidentified data can be used to reidentify ...
openaire +2 more sources
ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Ricardo Sanchez-Matilla+4 more
openaire +2 more sources
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Ricardo Sanchez-Matilla+4 more
openaire +2 more sources
2009
Personal privacy involves personal information, personal activities and personal areas, among which the privacy of personal information is one of the core contents. It decides the development of the future mobile e-commerce and e-government. In this chapter, anonymity, a key technology to realize the privacy protection, is discussed.
Changguang Wang, Jianfeng Ma, Zhuo Ma
openaire +2 more sources
Personal privacy involves personal information, personal activities and personal areas, among which the privacy of personal information is one of the core contents. It decides the development of the future mobile e-commerce and e-government. In this chapter, anonymity, a key technology to realize the privacy protection, is discussed.
Changguang Wang, Jianfeng Ma, Zhuo Ma
openaire +2 more sources
Privacy Protection and RFID [PDF]
Nobody bothered to tell me that my new identity card contained a wireless identification chip that allowed me to be tracked at a distance. The only thing that I knew was that my employer, the Massachusetts Institute of Technology, had switched to a new ID card.
openaire +1 more source
Data Mining and Privacy Protection
2011Modern data mining tools search databases for hidden patterns, finding predictive information that is otherwise not evident. There exist four models for privacy protection, which depending on their application, can be complementary or contradictory. This chapter deals with the comparison of EU comprehensive laws model and US sectoral laws model that ...
Armand Faganel, Danijel Bratina
openaire +1 more source
Privacy policy Improvements to Protect Children Privacy
2011The achievement of an adequate level of privacy protection is a demanding objective, especially for new technologies. One relatively new but increasing class of users of Internet related services consists of children and young people. However, if Internet services can improve social skills and widen the knowledge minors have, it could open the doors to
openaire +2 more sources