Filters








17,294 Hits in 4.4 sec

Valuating Privacy with Option Pricing Theory [chapter]

Stefan Berthold, Rainer Böhme
2010 Economics of Information Security and Privacy  
One of the key challenges of the information society is responsible handling of personal data.  ...  An often-cited reason why people fail to make rational decisions regarding their own informational privacy is the high uncertainty about future consequences of information disclosures today.  ...  Conclusions and Outlook In this paper, we have motivated why, and explained how, option pricing theory can be useful for the valuation of informational privacy.  ... 
doi:10.1007/978-1-4419-6967-5_10 fatcat:lg3vdfabaradxkrbcjiyauhtiu

SECURITY SURVEY INFORMATION SHARING: EMOTIONAL INTELLIGENCE AND PRIVACY SENSITIVITY

2013 Issues in Information Systems  
Do emotions and emotional intelligence (EQ) and privacy sensitivity regarding information security have an effect on willingness to share information?  ...  Organizations are becoming more aware of the growing need for continuous feedback, monitoring and change regarding information security systems to combat the constant, new and growing security threats  ...  Organizations are challenged with new and increasingly threatening security concerns [27] .  ... 
doi:10.48009/2_iis_2013_279-288 fatcat:7tdiwc6v3fg3nca3yodq4h52fq

External Contextual Factors in Information Security Behaviour

D. Snyman, H. Kruger
2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy  
Human behaviour is often considered to be irrational, difficult to understand, and challenging to manage.  ...  The specific contextual factors, and how they relate to information security, are discussed.  ...  In an attempt to gain better insight into the reasons for inconsistent and often contradictory behaviour, information security and privacy research is often concerned with the underlying factors that drive  ... 
doi:10.5220/0009142201850194 dblp:conf/icissp/SnymanK20 fatcat:5hj2bt4garaihd2f7v2q3jewoe

The Price of Uncertainty in Security Games [chapter]

Jens Grossklags, Benjamin Johnson, Nicolas Christin
2010 Economics of Information Security and Privacy  
In the realm of information security, lack of information about other users' incentives in a network can lead to inefficient security choices and reductions in individuals' payoffs.  ...  We propose, contrast and compare three metrics for measuring the price of uncertainty due to the departure from the payoff-optimal security outcomes under complete information.  ...  Acknowledgements We thank John Chuang, the anonymous reviewers and the participants of the Workshop on the Economics of Information Security for their helpful comments to an earlier version of this paper  ... 
doi:10.1007/978-1-4419-6967-5_2 fatcat:dqogjs6e7ndjzi5y5so6zinm6i

RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

Parks Rachida, Chu Chao-Hsien, Xu Heng
2010 Journal of Information Privacy and Security  
The conceptual analyses show that current PETs fail to incorporate the FIP principles and thus organizations in the healthcare sector face complex challenges to comply with security and privacy standards  ...  in light of the Fair Information Practice (FIP) principles to ensure patients' privacy.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1080/15536548.2010.10855891 fatcat:nythvxwezbg7zgjq7kvik5zffi

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems [chapter]

Kai Rannenberg, SH von Solms, Leon Strous
2011 IFIP Advances in Information and Communication Technology  
IFIP Technical Committee 11 (TC-11) on Security and Privacy Protection in Information Processing Systems was created in 1983 under the chairship of the late Kristian Beckman of Sweden.  ...  Section 5 then gives an outlook on the future role of TC-11.  ...  This was preferred to simply establishing a new WG on Privacy as the deep and delicate relations between security and privacy were considered where information security sometimes supports privacy and sometimes  ... 
doi:10.1007/978-3-642-21424-0_26 fatcat:hdsfno77k5c65buzx7jubwnq7a

IFIP Technical Committee 11 Security and Privacy Protection in Information Processing Systems [chapter]

Kai Rannenberg, S. H. von Solms, Leon Strous
2010 IFIP Advances in Information and Communication Technology  
IFIP Technical Committee 11 (TC-11) on Security and Privacy Protection in Information Processing Systems was created in 1983 under the chairship of the late Kristian Beckman of Sweden.  ...  Section 5 then gives an outlook on the future role of TC-11.  ...  This was preferred to simply establishing a new WG on Privacy as the deep and delicate relations between security and privacy were considered where information security sometimes supports privacy and sometimes  ... 
doi:10.1007/978-3-642-15257-3_27 fatcat:qkhzmniuhzaifioqvunqxinmyi

Privacy and Security Assessment of Biometric Template Protection

Xuebing Zhou
2012 it - Information Technology  
Both theoretical evaluation with metrics such as entropy, mutual information and practical evaluation based on individual attacks can be used. i The framework for privacy and security assessment is applied  ...  Furthermore, it provides provable evidence on security and privacy performance.  ...  This thesis meets the challenge of quantifying the security and privacy of biometric template protection.  ... 
doi:10.1524/itit.2012.0676 fatcat:2pypoukudnezxpsr6zyulkodh4

The Privacy Management Platform - An Enabler for Device Interoperability and Information Security in mHealth Applications

Christoph Stach, Frank Steimle, Bernhard Mitschang
2018 Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies  
However, mHealth apps face two key challenges, namely device interoperability and information security.  ...  In this paper, we describe how the Privacy Management Platform (PMP) and its extendable Resources can contribute to these challenges.  ...  Unfortunately, these mHealth apps face two key challenges, namely information security and device interoperability. Each mHealth app has to reinvent the wheel concerning these two issues.  ... 
doi:10.5220/0006537300270038 dblp:conf/biostec/StachSM18 fatcat:efmwj4kzrfeajgqbmvo3jkvjfy

An agent-based framework for secure and privacy-preserving personalized information services

Richard Cissée, Andreas Rieger, Nicolas Braun, Sahin Albayrak
2006 Revista Colombiana de Computación  
Keywords: personalization, privacy, security, multi-agent systems, contextawareness.  ...  Personalized services, however, bring about additional requirements related to privacy and security, which have to be addressed if the services are to become widely accepted.  ...  We are currently working on the implementation of additional community services for connecting users with similar interests and preferences.  ... 
doaj:da84ca6c0c81446588574ba84c1db474 fatcat:fd2uimubm5brrpxruohdfy3syq

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kubra Kalkan, Jean-Pierre Hubaux, Imad Aad
2014 IEEE Transactions on Information Forensics and Security  
Finally, we assess the utility and expectations, in terms of privacy and usability, of the proposed solutions by means of a targeted survey and user-study of mobile-phone users.  ...  An important, and often overlooked, facet of such planning applications is the privacy of the participating users and their preferences; users want to agree on a meeting location without necessarily revealing  ...  In order to achieve the final result and preserve the privacy of the personal information, we need to rely on computationally secure functions that possess the features that are required for such computations  ... 
doi:10.1109/tifs.2014.2318435 fatcat:el5vs7iz6jcrdaekez3dljfpba

To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool [chapter]

Lukas Demetz, Daniel Bachlechner
2013 The Economics of Information Security and Privacy  
As information security budgets are constrained and the number of assets to be protected is large, information security investments need to be deliberately evaluated.  ...  To defend against information security threats, organizations invest in security countermeasures preventing, or, at least, reducing the probability and the impact of information security breaches.  ...  As a result, assessing the benefits of information security investments is a challenging task [9] .  ... 
doi:10.1007/978-3-642-39498-0_2 fatcat:h7275auwwbaetnlnsgcaqroefa

Industrial Artificial Intelligence in Industry 4.0 -Systematic Review, Challenges and Outlook

Ricardo Silva Peres, Xiaodong Jia, Jay Lee, Keyi Sun, Armando Walter Colombo, Jose Barata
2020 IEEE Access  
to manipulate in a way that is accessible but also reliable, secure and privacy-preserving.  ...  Such a gap might explain the resistance towards a higher industrial uptake of these solutions, as their low interpretability by non-expert personnel and lack of coverage in terms of privacy and security  ...  He is a member of the IEEE technical committees on Industrial Agents (IES), Self-Organisation and Cybernetics for Informatics (SMC), and Education in Engineering and Industrial Technologies (IES).  ... 
doi:10.1109/access.2020.3042874 fatcat:yluqxcbf25dazorbmivlddsjf4

A Threat Analysis Model for Identity and Access Management

Nadia Jemil Abdu, Ulrike Lechner
2016 Proceedings of the 2nd International Conference on Information Systems Security and Privacy  
Identification of security threats is part of securing information systems as it involves identifying threats and challenges which need to be addressed by implementing appropriate countermeasures and realistic  ...  Abstract: Cyber attacks as a threat to business and national security have become concerns to organizations and governments.  ...  Security requirements are driven by security threats and identification of such threats is part of securing information systems as it involves identifying threats and challenges which need to be addressed  ... 
doi:10.5220/0005790304980502 dblp:conf/icissp/AbduL16 fatcat:cma22g5tzjdxrgjgcjwln33qki

Quality of Experience in 6G Networks: Outlook and Challenges

Abd-Elhamid M. Taha
2021 Journal of Sensor and Actuator Networks  
We elaborate on these expected challenges and allude to viable opportunities in emerging technologies.  ...  We first describe cellular networks' evolution through 5G and then discuss the enabling technologies and projected services in 6G networks.  ...  Acknowledgments: The author would like to acknowledge the reviewers' valuable input and its definite impact on improving the work presentation.  ... 
doi:10.3390/jsan10010011 fatcat:qcwfrez7nncepjekkmn4sdnyhm
« Previous Showing results 1 — 15 out of 17,294 results