A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Do we have privacy in the digital world?
[article]
2016
arXiv
pre-print
Should we accept the digital life with no or less privacy? Or should we keep our privacy by being off the technology? http://www.youtube.com/watch?v=8G28TTRjQV0 ...
Being connected to the Internet and having a smart phone in your pocket is equal to being watched with no privacy regardless of what the privacy statements say. ...
arXiv:1602.00251v1
fatcat:dtlzc37qknbv5ppf6cp6gq4fda
Repacking 'Privacy' for a Networked World
2017
Computer Supported Cooperative Work (CSCW)
In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing. ...
In explicating digital privacy practices in the home we find an abiding methodological concern amongst members to manage the potential 'attack surface' of the digital on everyday life occasioned by interaction ...
But in all cases we had the same end in mind: to elaborate in concrete detail people's mundane digital privacy practices. ...
doi:10.1007/s10606-017-9276-y
pmid:32025101
pmcid:PMC6979540
fatcat:lvx6nw3fg5axth6y3yjrs7idby
Brave new world
2014
Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments - SPME '14
In this paper, we catalog privacy threats introduced by these devices and applications. ...
Even without such disincentives, no providers' policies are transparent, and users literally do not have a provably privacy-preserving choice. ...
doi:10.1145/2646584.2646585
dblp:conf/mobicom/AdityaBDEL14
fatcat:suthlwfot5bifmjnrdnlx3pvfi
Brave New World
2015
ACM SIGMOBILE Mobile Computing and Communications Review
In this paper, we catalog privacy threats introduced by these devices and applications. ...
Even without such disincentives, no providers' policies are transparent, and users literally do not have a provably privacy-preserving choice. ...
doi:10.1145/2721896.2721907
fatcat:u2znzbu3v5bbjbauwuaoj7r7ci
Daemons of the Shadow World
[article]
2020
Zenodo
A bookleteer.com booklet containing a proposal for an artwork that recasts privacy and the role of individual or personal data. ...
Surplus Data in an Age of Repetitive Duplication". Browse the online version: https://bookleteer.com/book.html?id=3473#page/1/mode/2up Download the PDF: https://bookleteer.com/publication.html?id=3473 ...
the data traces of our actions and behaviours in the digital world? ...
doi:10.5281/zenodo.3668597
fatcat:ol6myp2kzrentdlw5k7spzasci
Security Risks of the Metaverse World
2022
International Journal of Interactive Mobile Technologies
However, this may preserve many problems related to the security and privacy of the system user starting from data breaches to identity theft, in this paper an overview of the metaverse world and the architecture ...
that connects the virtual to the real world and discuss the main security and privacy risks within the Metaverse world ...
users that represented digitally in the metaverse world using avatars. ...
doi:10.3991/ijim.v16i13.33187
fatcat:pab2zwdxxzcwplvn2jrryocisa
Do virtual worlds create better real worlds?
2008
Virtual Reality
The effects of the proposed integration of participatory design, VR, architecture and organization were studied in two pharmaceutical case studies. ...
Over the last years, virtual reality (VR) has been said to offer promise for design visualisation and has started to be included in participatory design methodology. ...
Utrecht, NP/CF in Utrecht, and Peutz at Zoetermeer for their work and valuable support in this project. ...
doi:10.1007/s10055-008-0081-2
fatcat:zxafaiurq5e7vksu4ao5bhbvbe
Best of both worlds
2017
Nature Physics
The answer may lie in a clever combination of quantum and classical cryptographic techniques. ...
In an increasingly connected world, the words 'big data' and 'cloud technologies' have left the vocabulary of technology experts to reach mainstream culture and become the very centre of the emerging digital ...
Going hybrid In order to do so, we believe in adopting a vision that combines the advantages of classical and quantum algorithms and technologies. ...
doi:10.1038/nphys3972
fatcat:c5jqsqmgzjbspaulo2ng6nn3na
Data analytics in a privacy-concerned world
2019
Journal of Business Research
A B S T R A C T Data is considered the new oil of the economy, but privacy concerns limit their use, leading to a widespread sense that data analytics and privacy are contradictory. ...
Yet such a view is too narrow, because firms can implement a wide range of methods that satisfy different degrees of privacy and still enable them to leverage varied data analytics methods. ...
Business Centre, in April 2018. ...
doi:10.1016/j.jbusres.2019.05.005
fatcat:6l2lgxaxnrfa7ftwnmohrd6oyq
Caring and compassion in a digital world
2019
Canadian Family Physician
We do have useful frames of reference (4 principles of family medicine, CanMEDS-Family Medicine, Family Medicine Professional Profile, Patient's Medical Home) to guide us. ...
Will we need fewer or more FPs than we have now? What will make us indispensable? ...
Caring and compassion in a digital world Francine Lemire MD CM CCFP FCFP CAE, EXECUTIVE DIRECTOR AND CHIEF EXECUTIVE OFFICER ...
pmid:31300441
pmcid:PMC6738476
fatcat:2mxuyams2vgetjd3nqdai56vs4
Unpacking "privacy" for a networked world
2003
Proceedings of the conference on Human factors in computing systems - CHI '03
We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature. ...
Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process. ...
ACKNOWLEDGMENTS This work was supported in part by a grant from the National Science Foundation (#IIS-9977952). ...
doi:10.1145/642633.642635
fatcat:fh7tbwdlyjhohkbpnpo2alg3g4
Unpacking "privacy" for a networked world
2003
Proceedings of the conference on Human factors in computing systems - CHI '03
We discuss three tensions that govern interpersonal privacy management in everyday life, and use these to explore select technology case studies drawn from the research literature. ...
Building on theory developed by social psychologist Irwin Altman, we outline a model of privacy as a dynamic, dialectic process. ...
ACKNOWLEDGMENTS This work was supported in part by a grant from the National Science Foundation (#IIS-9977952). ...
doi:10.1145/642611.642635
dblp:conf/chi/PalenD03
fatcat:tqh6v6j3lfctbdbt5sn5vroryi
Ethical research standards in a world of big data
2014
F1000Research
Here we propose a number of guidelines for ensuring that the work done by digital researchers is supported by ethical-use principles. ...
In recent years, the methodologies have been extended to include new topics and data sources; Twitter in particular has been used for surveillance of influenza-like-illnesses, political sentiments, and ...
Acknowledgements We thank our external collaborators and members of the Network Dynamics and Simulation Science Laboratory (NDSSL) for their suggestions and comments. ...
doi:10.12688/f1000research.3-38.v2
fatcat:vhm7m3vs7rgrpbd3bvbjo5wc5q
The Privacy Mismatch: Evolved Intuitions in a Digital World
2021
Current Directions in Psychological Science
We suggest that this privacy paradox can be understood in part as the consequence of an evolutionary mismatch: Privacy intuitions evolved in an environment that was radically different from the one found ...
This evolved privacy psychology leaves people disconnected from the consequence of online privacy threats. ...
We hope that the functionalist approach we have outlined here can help close the gap between the paucity of psychological research on privacy and the important, pervasive, and ever-widening public discussion ...
doi:10.1177/0963721421990355
pmid:33994679
pmcid:PMC8079797
fatcat:gthllbhp5ncwbe7uwdv3b55nwy
Regulating Real-World Surveillance
2015
Social Science Research Network
But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. ...
A number of laws govern information gathering, or surveillance, by private parties in the physical world. ...
The problems of information privacy are increasingly appearing in the physical world, returning us to Warren and Brandeis's original fear that we will be recorded when we wish to be let alone. 236 . ...
doi:10.2139/ssrn.2681128
fatcat:hw4ecipnvveldoqiq63l4drsui
« Previous
Showing results 1 — 15 out of 121,100 results