Filters








121,100 Hits in 6.3 sec

Do we have privacy in the digital world? [article]

Kaveh Bakhtiyari
2016 arXiv   pre-print
Should we accept the digital life with no or less privacy? Or should we keep our privacy by being off the technology? http://www.youtube.com/watch?v=8G28TTRjQV0  ...  Being connected to the Internet and having a smart phone in your pocket is equal to being watched with no privacy regardless of what the privacy statements say.  ... 
arXiv:1602.00251v1 fatcat:dtlzc37qknbv5ppf6cp6gq4fda

Repacking 'Privacy' for a Networked World

Andy Crabtree, Peter Tolmie, Will Knight
2017 Computer Supported Cooperative Work (CSCW)  
In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing.  ...  In explicating digital privacy practices in the home we find an abiding methodological concern amongst members to manage the potential 'attack surface' of the digital on everyday life occasioned by interaction  ...  But in all cases we had the same end in mind: to elaborate in concrete detail people's mundane digital privacy practices.  ... 
doi:10.1007/s10606-017-9276-y pmid:32025101 pmcid:PMC6979540 fatcat:lvx6nw3fg5axth6y3yjrs7idby

Brave new world

Paarijaat Aditya, Bobby Bhattacharjee, Peter Druschel, Viktor Erdélyi, Matthew Lentz
2014 Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments - SPME '14  
In this paper, we catalog privacy threats introduced by these devices and applications.  ...  Even without such disincentives, no providers' policies are transparent, and users literally do not have a provably privacy-preserving choice.  ... 
doi:10.1145/2646584.2646585 dblp:conf/mobicom/AdityaBDEL14 fatcat:suthlwfot5bifmjnrdnlx3pvfi

Brave New World

Paarijaat Aditya, Bobby Bhattacharjee, Peter Druschel, Viktor Erdélyi, Matthew Lentz
2015 ACM SIGMOBILE Mobile Computing and Communications Review  
In this paper, we catalog privacy threats introduced by these devices and applications.  ...  Even without such disincentives, no providers' policies are transparent, and users literally do not have a provably privacy-preserving choice.  ... 
doi:10.1145/2721896.2721907 fatcat:u2znzbu3v5bbjbauwuaoj7r7ci

Daemons of the Shadow World [article]

Giles Lane
2020 Zenodo  
A bookleteer.com booklet containing a proposal for an artwork that recasts privacy and the role of individual or personal data.  ...  Surplus Data in an Age of Repetitive Duplication". Browse the online version: https://bookleteer.com/book.html?id=3473#page/1/mode/2up Download the PDF: https://bookleteer.com/publication.html?id=3473  ...  the data traces of our actions and behaviours in the digital world?  ... 
doi:10.5281/zenodo.3668597 fatcat:ol6myp2kzrentdlw5k7spzasci

Security Risks of the Metaverse World

Tanya Abdulsattar Jaber
2022 International Journal of Interactive Mobile Technologies  
However, this may preserve many problems related to the security and privacy of the system user starting from data breaches to identity theft, in this paper an overview of the metaverse world and the architecture  ...  that connects the virtual to the real world and discuss the main security and privacy risks within the Metaverse world  ...  users that represented digitally in the metaverse world using avatars.  ... 
doi:10.3991/ijim.v16i13.33187 fatcat:pab2zwdxxzcwplvn2jrryocisa

Do virtual worlds create better real worlds?

Mark P. Mobach
2008 Virtual Reality  
The effects of the proposed integration of participatory design, VR, architecture and organization were studied in two pharmaceutical case studies.  ...  Over the last years, virtual reality (VR) has been said to offer promise for design visualisation and has started to be included in participatory design methodology.  ...  Utrecht, NP/CF in Utrecht, and Peutz at Zoetermeer for their work and valuable support in this project.  ... 
doi:10.1007/s10055-008-0081-2 fatcat:zxafaiurq5e7vksu4ao5bhbvbe

Best of both worlds

Eleni Diamanti, Elham Kashefi
2017 Nature Physics  
The answer may lie in a clever combination of quantum and classical cryptographic techniques.  ...  In an increasingly connected world, the words 'big data' and 'cloud technologies' have left the vocabulary of technology experts to reach mainstream culture and become the very centre of the emerging digital  ...  Going hybrid In order to do so, we believe in adopting a vision that combines the advantages of classical and quantum algorithms and technologies.  ... 
doi:10.1038/nphys3972 fatcat:c5jqsqmgzjbspaulo2ng6nn3na

Data analytics in a privacy-concerned world

Jaap Wieringa, P.K. Kannan, Xiao Ma, Thomas Reutterer, Hans Risselada, Bernd Skiera
2019 Journal of Business Research  
A B S T R A C T Data is considered the new oil of the economy, but privacy concerns limit their use, leading to a widespread sense that data analytics and privacy are contradictory.  ...  Yet such a view is too narrow, because firms can implement a wide range of methods that satisfy different degrees of privacy and still enable them to leverage varied data analytics methods.  ...  Business Centre, in April 2018.  ... 
doi:10.1016/j.jbusres.2019.05.005 fatcat:6l2lgxaxnrfa7ftwnmohrd6oyq

Caring and compassion in a digital world

Francine Lemire
2019 Canadian Family Physician  
We do have useful frames of reference (4 principles of family medicine, CanMEDS-Family Medicine, Family Medicine Professional Profile, Patient's Medical Home) to guide us.  ...  Will we need fewer or more FPs than we have now? What will make us indispensable?  ...  Caring and compassion in a digital world Francine Lemire MD CM CCFP FCFP CAE, EXECUTIVE DIRECTOR AND CHIEF EXECUTIVE OFFICER  ... 
pmid:31300441 pmcid:PMC6738476 fatcat:2mxuyams2vgetjd3nqdai56vs4

Unpacking "privacy" for a networked world

Leysia Palen, Paul Dourish
2003 Proceedings of the conference on Human factors in computing systems - CHI '03  
We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature.  ...  Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process.  ...  ACKNOWLEDGMENTS This work was supported in part by a grant from the National Science Foundation (#IIS-9977952).  ... 
doi:10.1145/642633.642635 fatcat:fh7tbwdlyjhohkbpnpo2alg3g4

Unpacking "privacy" for a networked world

Leysia Palen, Paul Dourish
2003 Proceedings of the conference on Human factors in computing systems - CHI '03  
We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature.  ...  Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process.  ...  ACKNOWLEDGMENTS This work was supported in part by a grant from the National Science Foundation (#IIS-9977952).  ... 
doi:10.1145/642611.642635 dblp:conf/chi/PalenD03 fatcat:tqh6v6j3lfctbdbt5sn5vroryi

Ethical research standards in a world of big data

Caitlin M. Rivers, Bryan L. Lewis
2014 F1000Research  
Here we propose a number of guidelines for ensuring that the work done by digital researchers is supported by ethical-use principles.  ...  In recent years, the methodologies have been extended to include new topics and data sources; Twitter in particular has been used for surveillance of influenza-like-illnesses, political sentiments, and  ...  Acknowledgements We thank our external collaborators and members of the Network Dynamics and Simulation Science Laboratory (NDSSL) for their suggestions and comments.  ... 
doi:10.12688/f1000research.3-38.v2 fatcat:vhm7m3vs7rgrpbd3bvbjo5wc5q

The Privacy Mismatch: Evolved Intuitions in a Digital World

Azim Shariff, Joe Green, William Jettinghoff
2021 Current Directions in Psychological Science  
We suggest that this privacy paradox can be understood in part as the consequence of an evolutionary mismatch: Privacy intuitions evolved in an environment that was radically different from the one found  ...  This evolved privacy psychology leaves people disconnected from the consequence of online privacy threats.  ...  We hope that the functionalist approach we have outlined here can help close the gap between the paucity of psychological research on privacy and the important, pervasive, and ever-widening public discussion  ... 
doi:10.1177/0963721421990355 pmid:33994679 pmcid:PMC8079797 fatcat:gthllbhp5ncwbe7uwdv3b55nwy

Regulating Real-World Surveillance

Margot E. Kaminski
2015 Social Science Research Network  
But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal.  ...  A number of laws govern information gathering, or surveillance, by private parties in the physical world.  ...  The problems of information privacy are increasingly appearing in the physical world, returning us to Warren and Brandeis's original fear that we will be recorded when we wish to be let alone. 236 .  ... 
doi:10.2139/ssrn.2681128 fatcat:hw4ecipnvveldoqiq63l4drsui
« Previous Showing results 1 — 15 out of 121,100 results