Results 121 to 130 of about 667,722 (335)
Study on utility optimization for randomized response mechanism
For the study of privacy-utility trade-off in local differential privacy,the utility optimization models of binary generalized random response mechanism for the case of differential privacy and approximate differential privacy were established.By graphic
Yihui ZHOU, Laifeng LU, Zhenqiang WU
doaj +2 more sources
Privacy Design Strategies [PDF]
In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: minimise, hide ...
arxiv
The privacy box: A software proposal
The contradiction of social networks is that revealing of personal, private information can have harmful consequences, yet users continue to disclose such information at an alarming rate. Ironically, the advent of social network sites opens the possibility of a relatively safe place to disclose private information. This article proposes a “privacy box”
openaire +2 more sources
Objective This study aimed to identify the top 10 international research priorities for musculoskeletal health of people with generalized joint hypermobility. Methods A three‐round Delphi method using an online survey was implemented. Three participant stakeholder groups were eligible for inclusion: (1) people with lived experience of joint ...
Sara Habibian+4 more
wiley +1 more source
Developers' Privacy Education: A game framework to stimulate secure coding behaviour
Software privacy provides the ability to limit data access to unauthorized parties. Privacy is achieved through different means, such as implementing GDPR into software applications.
Alhazmi, Abdulrahman Hassan+2 more
core
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke+4 more
doaj +1 more source
Measuring privacy leakage in term of Shannon entropy
Differential privacy is a privacy scheme in which a database is modified such that each users personal data are protected without affecting significantly the characteristics of the whole data.
Ricky Aditya, Boris Skoric
doaj +1 more source
Ontologies for Privacy Requirements Engineering: A Systematic Literature Review [PDF]
Privacy has been frequently identified as a main concern for system developers while dealing with/managing personal information. Despite this, most existing work on privacy requirements deals with them as a special case of security requirements. Therefore, key aspects of privacy are, usually, overlooked. In this context, wrong design decisions might be
arxiv
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson+11 more
wiley +1 more source
Privacy self-regulation and the changing role of the state: from public law to social and technical mechanisms of governance [PDF]
This paper provides a structured overview of different self-governance mechanisms for privacy and data protection in the corporate world, with a special focus on Internet privacy.
Bendrath, Ralf
core