119,336 Hits in 6.6 sec

User Intended Privacy Preserving Models in Online Social Networks

Amal TwinkleMathew, S.Saravana Kumar, Karthikeyan. M
2015 International Journal of Computer Applications  
The proposed system introduces new social network privacy management models and it measures their human effects.  ...  In addition, it will help to find privacy management models which can be further enhanced and also it helps to detect privacy sentiment of user.  ...  Privacy sentiments are enhanced for better management of user privacy information access in the privacy models.  ... 
doi:10.5120/19903-2014 fatcat:c35wlqz7kja5ja7kycrx3oaznq

Clustering Techniques for Grouping Traffic Events [chapter]

Bentham Science Publisher Bentham Science Publisher
2012 Mechatronics Series I - Intelligent Transportation Vehicles  
We enhance existing and introduce new social network privacy management models and that we live their human effects.  ...  Second, we tend to introduce a replacement privacy management model that leverages users' memory and opinion of their friends (called example friends) to line policies for different similar friends.  ...  CONCLUSION AND FUTURE WORK In this paper, we tend to enhance existing and introduce new privacy management models, additionally to mensuration their human effects.  ... 
doi:10.2174/978160805081911101010088 fatcat:733vizpe6fdlfaorultz7asx6u

From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework [article]

Yang Lu, Shujun Li, Athina Ioannou, Iis Tussyadiah
2019 arXiv   pre-print
Although there are privacy-enhancing tools designed to protect users' online privacy, it is surprising to see a lack of user-centric solutions allowing privacy control based on the joint assessment of  ...  Through following a human-in-the-loop approach, it is expected the framework provides a personalized solution via preference learning, continuous privacy assessment, behavior monitoring and nudging.  ...  The authors' work was supported by the research project, PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriV-ELT), funded by the EPSRC (Engineering and Physical Sciences  ... 
arXiv:1909.09942v1 fatcat:pzi4utguqvg6hdhh5xu6uuu6gu

Human Computer Interaction on Enterprise Information Systems

Christine Sarah, Anne Ashbrook
2020 International journal of advanced information and communication technology  
The problem necessitates the consideration of ergonomics of efficiency, effectiveness and interactions of obligation realization, user trust and user satisfaction, including human emotions when utilizing  ...  This paper also proposes a technique centred on the socio-technical paradigm and systems meant to model the kinds of interplays between usability, security and pliability.  ...  The patterns of the design for pliable built-in socio-technical framework have to effectively integrate both security and usability issues to formulate usable and efficient privacy models.  ... 
doi:10.46532/ijaict-2020034 fatcat:gaof4ozwgnenlcl3zll74his7m

Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea

Youngkeun Choi, Taejong Yoo
2014 International Journal of Security and Its Applications  
This research project investigates human resource management practices related to information privacy policy compliance by individuals in banks industry.  ...  The results of this survey of 257 bank employees in Korea indicate that certain human resource management practices within organizations (referred to as developmental-oriented appraisal, externally or  ...  If then, is the human resource management (HRM) practices capable of supporting, enhancing or perhaps alternatively, diminishing the security policy compliance intention among employee.  ... 
doi:10.14257/ijsia.2014.8.1.02 fatcat:kl72exkhenfihdj4gxk6hbwxha

Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)

Asim Majeed, Rehan Bhana, Anwar Ul, Imani Kyaruzi, Shaheed Pervaz, Mike-Lloyd Williams
2016 International Journal of Advanced Computer Science and Applications  
This paper aims to investigate the effectiveness of the provision of privacy of individuals through privacy enhancing technologies (PETs).  ...  Among other contributions, this research paper will devise a conceptual model to improve individual's privacy.  ...  The meaning of privacy to individuals extends beyond disclosure by suggesting that privacy is also a fundamental human right (see Article 8 of the 1950 European Convention on Human Rights).  ... 
doi:10.14569/ijacsa.2016.070303 fatcat:avugxnij4ffzhaeq3ctu3bve6q

Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems

Sen-Ching Samson Cheung, Yan Sun, Karl Aberer, Jayant Haritsa, Bill Horne, Kai Hwang
2013 IEEE Transactions on Information Forensics and Security  
Effectiveness of their proposed model is evaluated with simulations in terms of privacy-level and information-loss metrics.  ...  Trust management is, thus, an enabling technology for security and privacy enhancement.  ... 
doi:10.1109/tifs.2013.2259431 fatcat:pfkddu75lbh4zautvbs3hydksm

Towards a model of privacy and security for smart homes

Andreas Jacobsson, Paul Davidsson
2015 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)  
Based on the results of a risk analysis of a smart home automation system developed in collaboration with leading industrial actors, we outline the first steps towards a general model of privacy and security  ...  As such, it is envisioned as support for enforcing system security and enhancing user privacy, and it can thus help to further realize the potential in smart home environments.  ...  The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes".  ... 
doi:10.1109/wf-iot.2015.7389144 dblp:conf/wf-iot/JacobssonD15 fatcat:rm2yjvmepne6zcgbd7shzoupbm

Information Technology research challenges for healthcare

Susan Graham, Deborah Estrin, Eric Horvitz, Isaac Kohane, Elizabeth Mynatt, Ida Sim
2011 ACM SIGHIT Record  
Such research is particularly timely now, in light of the national priority to improve human health and the recent passage of healthcare legislation.  ...  The use of information technology is already contributing in significant ways to enhancing healthcare delivery and to improving the quality of life.  ...  How can robotic agents be designed to preserve privacy more effectively than human caregivers?  ... 
doi:10.1145/1971706.1971708 fatcat:zc63v2ymkzhzpdhnvjqye6yw7m

Software Engineering for Privacy in-the-Large

Pauline Anthonysamy, Awais Rashid
2015 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering  
There will be an estimated 35 zettabytes (35×10 21 ) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale.  ...  We will contrast existing approaches to privacy management, reflect on their strengths and limitations in this regard and outline key software engineering research and practice challenges to be addressed  ...  There will be an estimated 35 zettabytes (35×10 21 ) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale.  ... 
doi:10.1109/icse.2015.300 dblp:conf/icse/AnthonysamyR15 fatcat:ct3zludpfnemha5iv23kn2afqe

Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems

Ali Alkhalifah
2017 Journal of Computers  
However, researchers have not explored the role of privacy concerns in identity management systems (IdMS) adoption.  ...  This study identifies multi-dimensional privacy concerns of the IdMS and aims to understand and examine their effect toward users behavioral intentions to adopt IdMS.  ...  Conclusion The objective of this paper is to investigate and develop a model of how multi-dimensional privacy concerns effect users' adoption of web-based IdMS.  ... 
doi:10.17706/jcp.12.2.174-182 fatcat:qmtcqbea7rf45pesiof75fizfi

Role of Trust, Privacy Concerns and Data Governance in Managers' Decision on Adoption of Big Data Systems

Selen Balkaya
2019 Management Studies  
Research Model Objective of this paper is to propose a model which aims to explain how trust effects the big data adoption and whether "privacy" has any effect on "trust" with the mediator effect of "data  ...  Methodology and Further Study This paper reviewed the literature to propose a model and a scale (see Appendix) to test the effect of trust, privacy concerns, and data governance on the managers' intention  ...  Using XXX Big Data Systems enhanced effectiveness of data collection and analysis. Using XXX Big Data Systems gave me more control over the data collection and analysis tasks.  ... 
doi:10.17265/2328-2185/2019.03.006 fatcat:4x2wix6dlrbe7jtwahriwlkp54

Communication privacy management of students in Latvia

Andris Petersons, Ilkhom Khalimzoda
2017 Problems and Perspectives in Management  
This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management  ...  Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students  ...  + 0.14 = 0.14 0.000 Proved H4 Joy of shopping -Brand loyalty 0.59 0.000 Proved Problems and Perspectives in Management, Volume 14,Issue 3, 2016  ... 
doi:10.21511/ppm.14(2-1).2016.11 fatcat:pxttjh6f6zh3jbvuk6hbvb2ntu

Privacy-Enhanced Android for Smart Cities Applications [chapter]

Matthew Lepinski, David Levin, Daniel McCarthy, Ronald Watro, Michael Lack, Daniel Hallenbeck, David Slater
2016 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The current paper describes a plan for developing Privacy-Enhanced Android, an extension of the current Android OS with new privacy features based on homomorphic and functional encryption and Secure Multiparty  ...  Many Smart Cities applications will collect data from and otherwise interact with the mobile devices of individual users.  ...  The project goal is to develop a privacy-enhanced version of the Android OS, PE Android, emulating the path of Security-Enhanced Linux (SELinux), which is now part of the Android OS [1].  ... 
doi:10.1007/978-3-319-33681-7_6 fatcat:nomrehem2reybpzojj244wpft4

Deliverable D4.2 Synthesis Report on Result Webinars and Events

Raffaele Buompane
2021 Zenodo  
This report presents an overview of the activities that were carried out to promote the results of the third-party research and innovation projects on Internet trust and privacy technologies and solutions  ...  a human-centric Internet by developing a stronger European ecosystem of researchers, innovators and technology developers in the field of privacy and trust enhancing technologies while fostering the exchange  ...  internet: privacy, digital identity, internet of things, personal data management, etc.  ... 
doi:10.5281/zenodo.5798082 fatcat:hwssfbmxtbggbo22hakjmwxkuu
« Previous Showing results 1 — 15 out of 119,336 results