A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
User Intended Privacy Preserving Models in Online Social Networks
2015
International Journal of Computer Applications
The proposed system introduces new social network privacy management models and it measures their human effects. ...
In addition, it will help to find privacy management models which can be further enhanced and also it helps to detect privacy sentiment of user. ...
Privacy sentiments are enhanced for better management of user privacy information access in the privacy models. ...
doi:10.5120/19903-2014
fatcat:c35wlqz7kja5ja7kycrx3oaznq
Clustering Techniques for Grouping Traffic Events
[chapter]
2012
Mechatronics Series I - Intelligent Transportation Vehicles
We enhance existing and introduce new social network privacy management models and that we live their human effects. ...
Second, we tend to introduce a replacement privacy management model that leverages users' memory and opinion of their friends (called example friends) to line policies for different similar friends. ...
CONCLUSION AND FUTURE WORK In this paper, we tend to enhance existing and introduce new privacy management models, additionally to mensuration their human effects. ...
doi:10.2174/978160805081911101010088
fatcat:733vizpe6fdlfaorultz7asx6u
From Data Disclosure to Privacy Nudges: A Privacy-aware and User-centric Personal Data Management Framework
[article]
2019
arXiv
pre-print
Although there are privacy-enhancing tools designed to protect users' online privacy, it is surprising to see a lack of user-centric solutions allowing privacy control based on the joint assessment of ...
Through following a human-in-the-loop approach, it is expected the framework provides a personalized solution via preference learning, continuous privacy assessment, behavior monitoring and nudging. ...
The authors' work was supported by the research project, PRIvacy-aware personal data management and Value Enhancement for Leisure Travellers (PriV-ELT), funded by the EPSRC (Engineering and Physical Sciences ...
arXiv:1909.09942v1
fatcat:pzi4utguqvg6hdhh5xu6uuu6gu
Human Computer Interaction on Enterprise Information Systems
2020
International journal of advanced information and communication technology
The problem necessitates the consideration of ergonomics of efficiency, effectiveness and interactions of obligation realization, user trust and user satisfaction, including human emotions when utilizing ...
This paper also proposes a technique centred on the socio-technical paradigm and systems meant to model the kinds of interplays between usability, security and pliability. ...
The patterns of the design for pliable built-in socio-technical framework have to effectively integrate both security and usability issues to formulate usable and efficient privacy models. ...
doi:10.46532/ijaict-2020034
fatcat:gaof4ozwgnenlcl3zll74his7m
Influence of HRM Practices on Privacy Policy Compliance Intention: A Study among Bank Employees in Korea
2014
International Journal of Security and Its Applications
This research project investigates human resource management practices related to information privacy policy compliance by individuals in banks industry. ...
The results of this survey of 257 bank employees in Korea indicate that certain human resource management practices within organizations (referred to as developmental-oriented appraisal, externally or ...
If then, is the human resource management (HRM) practices capable of supporting, enhancing or perhaps alternatively, diminishing the security policy compliance intention among employee. ...
doi:10.14257/ijsia.2014.8.1.02
fatcat:kl72exkhenfihdj4gxk6hbwxha
Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)
2016
International Journal of Advanced Computer Science and Applications
This paper aims to investigate the effectiveness of the provision of privacy of individuals through privacy enhancing technologies (PETs). ...
Among other contributions, this research paper will devise a conceptual model to improve individual's privacy. ...
The meaning of privacy to individuals extends beyond disclosure by suggesting that privacy is also a fundamental human right (see Article 8 of the 1950 European Convention on Human Rights). ...
doi:10.14569/ijacsa.2016.070303
fatcat:avugxnij4ffzhaeq3ctu3bve6q
Guest Editorial: Special issue on privacy and trust management in cloud and distributed systems
2013
IEEE Transactions on Information Forensics and Security
Effectiveness of their proposed model is evaluated with simulations in terms of privacy-level and information-loss metrics. ...
Trust management is, thus, an enabling technology for security and privacy enhancement. ...
doi:10.1109/tifs.2013.2259431
fatcat:pfkddu75lbh4zautvbs3hydksm
Towards a model of privacy and security for smart homes
2015
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT)
Based on the results of a risk analysis of a smart home automation system developed in collaboration with leading industrial actors, we outline the first steps towards a general model of privacy and security ...
As such, it is envisioned as support for enforcing system security and enhancing user privacy, and it can thus help to further realize the potential in smart home environments. ...
The authors would also like to thank all the members of the research profile project "Intelligent Support for Privacy Management in Smart Homes". ...
doi:10.1109/wf-iot.2015.7389144
dblp:conf/wf-iot/JacobssonD15
fatcat:rm2yjvmepne6zcgbd7shzoupbm
Information Technology research challenges for healthcare
2011
ACM SIGHIT Record
Such research is particularly timely now, in light of the national priority to improve human health and the recent passage of healthcare legislation. ...
The use of information technology is already contributing in significant ways to enhancing healthcare delivery and to improving the quality of life. ...
How can robotic agents be designed to preserve privacy more effectively than human caregivers? ...
doi:10.1145/1971706.1971708
fatcat:zc63v2ymkzhzpdhnvjqye6yw7m
Software Engineering for Privacy in-the-Large
2015
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering
There will be an estimated 35 zettabytes (35×10 21 ) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale. ...
We will contrast existing approaches to privacy management, reflect on their strengths and limitations in this regard and outline key software engineering research and practice challenges to be addressed ...
There will be an estimated 35 zettabytes (35×10 21 ) of digital records worldwide by the year 2020. This effectively amounts to privacy management on an ultra-large-scale. ...
doi:10.1109/icse.2015.300
dblp:conf/icse/AnthonysamyR15
fatcat:ct3zludpfnemha5iv23kn2afqe
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems
2017
Journal of Computers
However, researchers have not explored the role of privacy concerns in identity management systems (IdMS) adoption. ...
This study identifies multi-dimensional privacy concerns of the IdMS and aims to understand and examine their effect toward users behavioral intentions to adopt IdMS. ...
Conclusion The objective of this paper is to investigate and develop a model of how multi-dimensional privacy concerns effect users' adoption of web-based IdMS. ...
doi:10.17706/jcp.12.2.174-182
fatcat:qmtcqbea7rf45pesiof75fizfi
Role of Trust, Privacy Concerns and Data Governance in Managers' Decision on Adoption of Big Data Systems
2019
Management Studies
Research Model Objective of this paper is to propose a model which aims to explain how trust effects the big data adoption and whether "privacy" has any effect on "trust" with the mediator effect of "data ...
Methodology and Further Study This paper reviewed the literature to propose a model and a scale (see Appendix) to test the effect of trust, privacy concerns, and data governance on the managers' intention ...
Using XXX Big Data Systems enhanced effectiveness of data collection and analysis. Using XXX Big Data Systems gave me more control over the data collection and analysis tasks. ...
doi:10.17265/2328-2185/2019.03.006
fatcat:4x2wix6dlrbe7jtwahriwlkp54
Communication privacy management of students in Latvia
2017
Problems and Perspectives in Management
This article analyzes the privacy management skills of locals and foreigners and reveals how security of information is managed between them stemming from social penetration and communication privacy management ...
Privacy management is significant in facing the dilemma of communication privacy and facilitates solving already existing problems of privacy among students ...
+ 0.14 = 0.14
0.000
Proved
H4
Joy of shopping -Brand loyalty
0.59
0.000
Proved
Problems and Perspectives in Management, Volume 14,Issue 3, 2016 ...
doi:10.21511/ppm.14(2-1).2016.11
fatcat:pxttjh6f6zh3jbvuk6hbvb2ntu
Privacy-Enhanced Android for Smart Cities Applications
[chapter]
2016
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
The current paper describes a plan for developing Privacy-Enhanced Android, an extension of the current Android OS with new privacy features based on homomorphic and functional encryption and Secure Multiparty ...
Many Smart Cities applications will collect data from and otherwise interact with the mobile devices of individual users. ...
The project goal is to develop a privacy-enhanced version of the Android OS, PE Android, emulating the path of Security-Enhanced Linux (SELinux), which is now part of the Android OS [1]. ...
doi:10.1007/978-3-319-33681-7_6
fatcat:nomrehem2reybpzojj244wpft4
Deliverable D4.2 Synthesis Report on Result Webinars and Events
2021
Zenodo
This report presents an overview of the activities that were carried out to promote the results of the third-party research and innovation projects on Internet trust and privacy technologies and solutions ...
a human-centric
Internet by developing a stronger European ecosystem of researchers, innovators
and technology developers in the field of privacy and trust enhancing technologies
while fostering the exchange ...
internet: privacy, digital identity,
internet of things, personal data management, etc. ...
doi:10.5281/zenodo.5798082
fatcat:hwssfbmxtbggbo22hakjmwxkuu
« Previous
Showing results 1 — 15 out of 119,336 results