Filters








4,195 Hits in 7.1 sec

Sweet Idleness, but Why? How Cognitive Factors and Personality Traits Affect Privacy-Protective Behavior

Christian Matt, Philipp Peckelsen
2016 2016 49th Hawaii International Conference on System Sciences (HICSS)  
Our results support the suitability of the PMT in the PET context. In particular, perceived response efficacy has a strong effect on individuals' intention to use PETs.  ...  Although privacy-enhancing technologies (PETs) can help secure users' privacy, only very few make use of PETseven if some of these are gratis.  ...  appraisal Perc. susceptibility of privacy threats Perceived severity of privacy threats Coping appraisal Perceived response efficacy of PETs Perceived self-efficacy to use PETs +0.16* +0.08  ... 
doi:10.1109/hicss.2016.599 dblp:conf/hicss/0001P16 fatcat:oktxz5eeznagvhqfe45c6bwtta

The Evolving Path of "the Right to Be Left Alone" - When Privacy Meets Technology [article]

Michela Iezzi
2021 arXiv   pre-print
This paper deals with the hot, evergreen topic of the relationship between privacy and technology.  ...  This paper proposes a novel vision of the privacy ecosystem, introducing privacy dimensions, the related users' expectations, the privacy violations, and the changing factors.  ...  ACKNOWLEDGMENTS The author would like to thank Dr. Marco Benedetti and the Applied Research Team (IT Department, Bank of Italy) for support.  ... 
arXiv:2111.12434v1 fatcat:55edc275zjbojk5akjhbyhl6qe

User Acceptance Factors for Anonymous Credentials: An Empirical Investigation

Zinaida Benenson, Anna Girard, Ioannis Krontiris
2015 Workshop on the Economics of Information Security  
of the most important goals on the way to better privacy management with the help of PETs.  ...  of the PET.  ...  Zinaida Benenson and Anna Girard were supported by the Bavarian State Ministry of Education, Science and the Arts as part of the FORSEC research association.  ... 
dblp:conf/weis/BenensonGK15 fatcat:bhltmx6edfbldpaj4dl3kmxihe

Perceived Control: Scales for Privacy in Ubiquitous Computing

Sarah Spiekermann
2005 Social Science Research Network  
the end state of privacy itself.  ...  Heading for an answer to this question many studies have rushed over past years to present guidelines for privacy-friendly UC design and have tempted even to rewrite the vocabulary of this socio-psychological  ...  Thus, we want to measure how people perceive exercising privacy with the help of a PET.  ... 
doi:10.2139/ssrn.761109 fatcat:lqxfuoqo7rfpvnx2yzl2ctbg3q

Perceived Control [chapter]

Sarah Spiekermann
2007 Digital Privacy  
the end state of privacy itself.  ...  Heading for an answer to this question many studies have rushed over past years to present guidelines for privacy-friendly UC design and have tempted even to rewrite the vocabulary of this socio-psychological  ...  Thus, we want to measure how people perceive exercising privacy with the help of a PET.  ... 
doi:10.1201/9781420052183.ch13 fatcat:45hx5y7idfg2fddt23tgsqtiy4

The Status of Privacy Enhancing Technologies [chapter]

John Borking
2003 IFIP Advances in Information and Communication Technology  
The EU project PISA (privacy incorporated software agent) will be used as an example of future PET.  ...  We look back since the Dutch and Ontario Privacy Commissioners defined PET in 1995 to see what has changed and what has been achieved.  ...  The performance in efficacy and response time was not affected by the application of PETs functionalities.  ... 
doi:10.1007/978-0-387-35696-9_15 fatcat:vus2qtodobeuvemfbenyvkrlam

Technical Privacy Metrics

Isabel Wagner, David Eckhoff
2018 ACM Computing Surveys  
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies.  ...  To this end, we explain and discuss a selection of over eighty privacy metrics and introduce categorizations based on the aspect of privacy they measure, their required inputs, and the type of data that  ...  To judge the efficacy of PETs, privacy metrics are needed that can measure the level of privacy in a system, or the privacy provided by a given PET.  ... 
doi:10.1145/3168389 fatcat:k5wb35eyqzhw3he4e6aa6cviwe

A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers

Heng Xu, Robert E. Crossler, France Bélanger
2012 Decision Support Systems  
PEControl), and privacy-enhancing review for sharing the ratings and reviews of websites' privacy practices (PEReview).  ...  In this paper, we present an exploratory investigation of an end-use PET using a Value Sensitive Design approach.  ...  Acknowledgments The authors are very grateful to the anonymous reviewers for their constructive comments, and to Hao Wang for his input and assistance on technical design issues of PESS.  ... 
doi:10.1016/j.dss.2012.06.003 fatcat:kmjritwfkbdj7g7nwytdd5bj3e

RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

Parks Rachida, Chu Chao-Hsien, Xu Heng
2010 Journal of Information Privacy and Security  
Our conceptual framework uses the FIP principles as a guideline to examine the design of Privacy Enhancing Technologies (PETs) and analyze existing regulations to assess the compliance issues.  ...  The conceptual analyses show that current PETs fail to incorporate the FIP principles and thus organizations in the healthcare sector face complex challenges to comply with security and privacy standards  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1080/15536548.2010.10855891 fatcat:nythvxwezbg7zgjq7kvik5zffi

Beyond privacy regulations: an ethical approach to data usage in transportation [article]

Johannes M. van Hulst, Mattia Zeni, Alexander Kröller, Cassandra Moons, Pierluigi Casale
2020 arXiv   pre-print
With the rise of new privacy regulations such as the General Data Protection Regulation in the European Union and the California Consumer Privacy Act in the United States, companies dealing with personal  ...  We see Federated Learning as a method that enables us to process privacy-sensitive data, while respecting customer's privacy and one that guides us beyond privacy-regulations and into the world of ethical  ...  Ackowledgments Thanks go to various colleagues within TomTom for helpful discussions, in particular Łukasz Kosma and Wim Mooij, together with the NAV Research and Innovation and Datalab teams.  ... 
arXiv:2004.00491v1 fatcat:ml4sxilihbamhijgxxjz3r26ou

Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering

Lothar Fritsch
2007 Journal of Theoretical and Applied Electronic Commerce Research  
Privacy-enhancing technology (PET) has been available for a considerable amount of time. New online applications and infrastructures for mobile and ubiquitous use have been installed.  ...  This article presents an approach for the design of location-based information systems that support privacy functionality.  ...  Acknowledgments Part of this research was funded by the European Union IST projects FIDIS and PRIME; however it reflects the author's opinion only. I thank Prof.  ... 
doi:10.3390/jtaer2030018 fatcat:dncd6zd6gnbjfdayjdltuhfus4

Designing Strong Privacy Metrics Suites Using Evolutionary Optimization

Isabel Wagner, Iryna Yevseyeva
2021 ACM Transactions on Privacy and Security  
The ability to measure privacy accurately and consistently is key in the development of new privacy protections.  ...  We find that the resulting metrics suites have better properties, i.e., higher monotonicity, diversity, evenness, and shared value range, than previously proposed metrics suites.  ...  INTRODUCTION Methods to measure privacy as accurately and consistently as possible are important for the development of new privacy-enhancing technologies (PETs): without a means to measure and compare  ... 
doi:10.1145/3439405 fatcat:vkxmlmcm7fff5ckrw3rbkrfm7u

Privacy–Enhancing Face Biometrics: A Comprehensive Survey

Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc
2021 IEEE Transactions on Information Forensics and Security  
The goal of this overview paper is to provide a comprehensive introduction into privacy-related research in the area of biometrics and review existing work on Biometric Privacy-Enhancing Techniques (B-PETs  ...  However, this widespread deployment has also resulted in privacy concerns and evolving societal expectations about the appropriate use of the technology.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ... 
doi:10.1109/tifs.2021.3096024 fatcat:z5kvij6g7vgx3b24narxdyp2py

Efficacy of positron emission tomography in diagnosis of lateral lymph node metastases in patients with rectal Cancer: a retrospective study

Ryohei Yukimoto, Mamoru Uemura, Takahiro Tsuboyama, Tsuyoshi Hata, Shiki Fujino, Takayuki Ogino, Norikatsu Miyoshi, Hidekazu Takahashi, Taishi Hata, Hirofumi Yamamoto, Tsunekazu Mizushima, Akira Kida (+3 others)
2021 BMC Cancer  
The maximum standardized uptake value (SUVmax) of the primary tumor and LLN were preoperatively calculated using PET/CT.  ...  Conclusions The cutoff value of 1.5 for lymph node SUVmax in PET is a reasonable measure to predict the risk of preoperative LLN metastases in rectal cancer patients.  ...  The SUVmax of the largest short axis of the LLN and the primary tumor were measured (in the axial plane). These measured values were compared and evaluated with the postoperative pathology.  ... 
doi:10.1186/s12885-021-08278-6 pmid:33962569 fatcat:bpnoyjqu6vhaba3b4wn4ysqdfm

Privacy in Internet of Things: from Principles to Technologies

Chao Li, Balaji Palanisamy
2018 IEEE Internet of Things Journal  
In this paper, we review the state-of-the-art principles of privacy laws, the architectures for IoT and the representative privacy enhancing technologies (PETs).  ...  We analyze how legal principles can be supported through a careful implementation of privacy enhancing technologies (PETs) at various layers of a layered IoT architecture model to meet the privacy requirements  ...  Privacy by design The notion of privacy by design (PbD) [5] , [13] , [14] , namely embedding the privacy measures and privacy enhancing technologies (PETs) directly into the design of software or system  ... 
doi:10.1109/jiot.2018.2864168 fatcat:ylasv2g72bghfnzu3do4wiksxq
« Previous Showing results 1 — 15 out of 4,195 results