Filters








24,647 Hits in 2.4 sec

A Data Privacy Taxonomy [chapter]

Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, Adepele Williams
2009 Lecture Notes in Computer Science  
The work contributes by briefly providing the larger context for the way privacy is defined legally and legislatively but primarily provides a taxonomy capable of thinking of data privacy technologically  ...  This paper provides an explicit definition of data privacy suitable for ongoing work in data repositories such as a DBMS or for data mining.  ...  Fundamental to realizing this vision is the need to develop a data model that has privacy as first-order feature so we intend to build the aspects of this taxonomy into a new privacy-aware data model.  ... 
doi:10.1007/978-3-642-02843-4_7 fatcat:mxcr3y673becrpx2sm4slreo7e

A Taxonomy of Social Networking Data

Bruce Schneier
2010 IEEE Security and Privacy  
be important to keep this taxonomy in mind.  ...  the data you give to a social networking site in or- der to use it.  ... 
doi:10.1109/msp.2010.118 fatcat:eob4uj72azhhpe2uxoo6pp36ti

User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy [article]

Erfan Aghasian, Saurabh Garg, James Montgomery
2018 arXiv   pre-print
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.  ...  This trend has created major privacy concerns as users are mostly unaware of what data and how much data is being used and how securely it is used.  ...  Taxonomy of Privacy Privacy can be studied from different aspects: privacy concerns, scoring models and privacy-preserving models and approaches (Figure 1.1 ).  ... 
arXiv:1806.07629v1 fatcat:fbo7j4wq2jf6xmlqkxw2777sfe

A Taxonomy for the Representation of Privacy and Data Control Signals [chapter]

Kartik Chawla, Joris Hulstijn
2020 Frontiers in Artificial Intelligence and Applications  
In this paper, we develop a Taxonomy for the Representation of Privacy and Data Control Signals.  ...  We also validate the Taxonomy by applying it to extracts from documentation, and argue that it shows potential for the annotation and evaluation of privacy policies as well.  ...  Results: A Taxonomy for Privacy and Data Control Signals This exercise results in a complex and multi-layered Taxonomy for the Representation of Privacy and Data Control Signals.  ... 
doi:10.3233/faia200846 fatcat:dptmylgbfbemdefbkyuox2a6w4

A Requirements-based Comparison of Privacy Taxonomies

Aaron K. Massey, Annie I. Antón
2008 2008 Requirements Engineering and Law  
In this paper, we compare a requirements engineering taxonomy of privacy protections and vulnerabilities to a legal taxonomy of privacy harms.  ...  Requirements engineers have begun to model privacy requirements based on taxonomic classifications of privacy. Independently, legal research has modeled privacy harms in a taxonomic fashion.  ...  The second is a legal taxonomy of privacy harms, which we will refer to as the Solove Taxonomy.  ... 
doi:10.1109/relaw.2008.1 dblp:conf/re/MasseyA08 fatcat:cfsyr5ctizc23omddzymap322q

Taxonomy for Privacy Policies of Social Networks Sites

Sergio Donizetti Zorzo, Rodrigo Pereira Botelho, Paulo Muniz de Ávila
2013 Social Networking  
In this paper, we present both a mechanism to enhance privacy in SNSs and taxonomy for classifying SNSs privacy policies.  ...  We combine and extend two taxonomies of privacy, unifying them to classify SNSs privacy policies and also the aforementioned mechanism.  ...  This paper presented taxonomy for classifying the privacy policy of social networking sites and a privacy mechanism.  ... 
doi:10.4236/sn.2013.24015 fatcat:uu7vtbbtgbfklkkd3eaanftyiu

Linking Privacy Solutions to Developer Goals

Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen
2009 2009 International Conference on Availability, Reliability and Security  
As a validation for the taxonomy, existing privacy solutions are matched to each strategy.  ...  Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between security and privacy.  ...  Taxonomy Validation To validate the taxonomy, a study is made where existing privacy work fits into the taxonomy.  ... 
doi:10.1109/ares.2009.51 dblp:conf/IEEEares/WuytsSDJ09 fatcat:mttf4cwudbevlj5zeq7apd6jjm

Analysis of social networking privacy policies

Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Barker
2010 Proceedings of the 1st International Workshop on Data Semantics - DataSem '10  
In this paper, we review a privacy taxonomy for data storage polices and models and extend it to support social networking.  ...  We then apply the extended taxonomy to the privacy policies of six commonly used social networks, and present our findings with regards to how the published privacy policies of these social networks protect  ...  taxonomy Figure 2 : The four data layers of Orkut on the privacy taxonomy purpose and granularity of the data, with retention not being a consideration at all.  ... 
doi:10.1145/1754239.1754275 dblp:conf/edbtw/WuMGB10 fatcat:675oql64wfccljeaabtsppouku

Differentially private genome data dissemination through top-down specialization

Shuang Wang, Noman Mohammed, Rui Chen
2014 BMC Medical Informatics and Decision Making  
However, privacy concerns have impeded efficient genome data sharing. In this paper, we present a novel approach for disseminating genomic data while satisfying differential privacy.  ...  The experimental results suggest that the proposed algorithm can retain certain data utility in terms of a high sensitivity.  ...  This article has been published as part of BMC Medical Informatics and Decision Making Volume 14 Supplement 1, 2014: Critical Assessment of Data Privacy and Protection (CADPP).  ... 
doi:10.1186/1472-6947-14-s1-s2 pmid:25521306 pmcid:PMC4290801 fatcat:qvcr3zhn4zcfbddntmmuk2qyv4

Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data [chapter]

Günter Karjoth, Matthias Schunter, Michael Waidner
2003 Lecture Notes in Computer Science  
The purpose of this paper is to provide a taxonomy of Information Privacy in Collaborative Environments.  ...  Findings: A taxonomy was successfully developed with the identification of three high level dimensions of information privacy.  ...  There are a number of formal definitions for data privacy that are useful in our taxonomy representation.  ... 
doi:10.1007/3-540-36467-6_6 fatcat:cagtwosxhrcolbvzcgouy6trwy

An information privacy taxonomy for collaborative environments

Geoff Skinner, Song Han, Elizabeth Chang
2006 Information Management & Computer Security  
This paper provides a Information Privacy taxonomy for Collaborative Environments.  ...  The knowledge provided from a information privacy taxonomy can be used to formulate better information privacy policies, practices, and privacy enhancing technologies (PET's).  ...  There are a number of formal definitions for data privacy that are useful in our taxonomy representation.  ... 
doi:10.1108/09685220610690835 fatcat:x7yys7u4vbe3rc2osrvuxwpvsu

A Taxonomy of Requirements for the Privacy Goal Transparency [chapter]

Rene Meis, Roman Wirtz, Maritta Heisel
2015 Lecture Notes in Computer Science  
Privacy is a growing concern during software development.  ...  Transparency-in the sense of increasing user's privacy-awareness-is a privacy goal that is not as deeply studied in the literature as the properties anonymity and unlinkability.  ...  Figure 2 shows our taxonomy in the form of a metamodel using a UML class diagram.  ... 
doi:10.1007/978-3-319-22906-5_15 fatcat:un5fls5mr5euhbxoqojpgwzhpe

Taxonomy of social network data types

Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger, Günther Pernul
2014 EURASIP Journal on Information Security  
The terminology is organized hierarchically resulting in a taxonomy of data types. The paper furthermore discusses and develops a metric to assess the privacy relevance of different data types.  ...  The lack of a terminology impedes comparability of related work and discussions among researchers, especially in the case of privacy implications of different data types.  ...  Based on the data types identified in the taxonomy, a privacy relevance metric is developed in Section 5.  ... 
doi:10.1186/s13635-014-0011-7 fatcat:zd77bhgfefhm7mjkqpbt5bhawi

Taxonomy of social network data types

Christian Richthammer, Michael Netter, Moritz Riesner, Johannes Sänger, Günther Pernul
2014 EURASIP Journal on Information Security  
The terminology is organized hierarchically resulting in a taxonomy of data types. The paper furthermore discusses and develops a metric to assess the privacy relevance of different data types.  ...  The lack of a terminology impedes comparability of related work and discussions among researchers, especially in the case of privacy implications of different data types.  ...  Based on the data types identified in the taxonomy, a privacy relevance metric is developed in Section 5.  ... 
doi:10.1186/preaccept-9586330381233118 fatcat:atqibot7lzcjpptekwkffhfyma

A requirements taxonomy for reducing Web site privacy vulnerabilities

AnnieI. Ant�n, JuliaB. Earp
2003 Requirements Engineering  
This paper presents a taxonomy of privacy requirements for Web sites.  ...  This taxonomy was then validated during a second goal extraction exercise, involving privacy policies from a range of health care related Web sites.  ...  Additionally, we thank Thomas Alspaugh, Colin Potts, Richard Smith and Gene Spafford for discussions leading to our classification of privacy protection goals and vulnerabilities.  ... 
doi:10.1007/s00766-003-0183-z fatcat:jkiyewtlczblrnh74soitsyugu
« Previous Showing results 1 — 15 out of 24,647 results