Filters








2,130 Hits in 6.8 sec

Privacy through Solidarity

Asia J. Biega, Rishiraj Saha Roy, Gerhard Weikum
2017 Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval - SIGIR '17  
In this work, we propose a framework which leverages solidarity in a large community to scramble user interaction histories.  ...  To reconcile privacy and user utility and control their trade-o , we develop quantitative models for these dimensions and e ective strategies for assigning user interactions to Mediator Accounts.  ...  We would like to thank Subhabrata Mukherjee from MPII for useful discussions at various stages of this work.  ... 
doi:10.1145/3077136.3080830 dblp:conf/sigir/BiegaRW17 fatcat:g6iboznryzh33nofwux55zgwv4

"Right to Privacy and Counter-terrorism in the Digital Age: A Critical Appraisal for Bangladesh"

Md. Abu Bakar Siddique
2016 IOSR Journal of Humanities and Social Science  
It calls for enacting an explicit and detailed laws premised on "legality and proportionality" principle on right to privacy to strike a proper balance.  ...  Hence counter-terrorism ventures by the states have jeopardized many human rights inter alia "right to privacy" of the people irrespective of terror affiliations.  ...  RIGHT TO PRIVACY VERSUS COUNTER-TERRORISM THROUGH DIGITAL SURVEILLANCE States with high levels of internet penetration can potentially cut through the edge of the privacy by digital surveillance whenever  ... 
doi:10.9790/0837-2107086472 fatcat:wgvrf3jezzcdbojdlwifvrshq4

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols [article]

Divya Siddarth, Sergey Ivliev, Santiago Siri, Paula Berman
2020 arXiv   pre-print
, to arrive at a decentralized and sybil-resistant consensus for identity.  ...  This failure to provide an input for subjectivity accounts for a central challenge: the inability to address the question of "Who verifies the verifier?".  ...  Acknowledgments We would like to express our sincere gratitude to Adam Stallard, Clément Lesaege, Peter Porobov, Rich McAteer and Vinay Taylor for sharing their work with us and contributing with invaluable  ... 
arXiv:2008.05300v5 fatcat:kngadgz7ijhzhph55pgbc2joqq

Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

N. Senthil Kumar, Anthoniraj Amalanathan
2015 International Journal of Information Technology and Computer Science  
Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner.  ...  Hierarchical Resource Profile The hierarchical resource profile is used to organize the resources in a tree based manner.  ...  It has given the enterprise a solidarity on policy making and solving the impeding process for long run.  ... 
doi:10.5815/ijitcs.2015.12.10 fatcat:tc6eelctarg23iniyq6z3kemkq

Facebook and the Surveillance Assemblage: Policing Black Lives Matter Activists & Suppressing Dissent

Chloé Lynn Nurik
2022 Surveillance & Society  
The article's empirical data contribute to the existing literature by stressing the role of third parties and providing insights into the nontransparent system of surveillance on social media.  ...  Acknowledgments I would like to thank Dr. Jessa Lingel for her feedback, support, and guidance. Thank you also to Professor Matt Duncan for assistance with the legal analysis.  ...  Lastly, thank you to the interviewees who generously shared their time and knowledge.  ... 
doi:10.24908/ss.v20i1.13398 fatcat:nclweutofnevrpwk6cgfbxnvqm

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols

Divya Siddarth, Sergey Ivliev, Santiago Siri, Paula Berman
2020 Frontiers in Blockchain  
to arrive at a decentralized and Sybil-resistant consensus for identity.  ...  to the abuse of a digital network by creating many illegitimate virtual personas.  ...  with invaluable feedback to this review.  ... 
doi:10.3389/fbloc.2020.590171 fatcat:e72zwsczqjbdfldfqgh7odlwfm

Lists of Ethical, Legal, Societal and Economic Issues of Big Data Technologies

Bart Custers, Karolina La Fors, Magdalena Jozwiak, Keymolen Esther, Daniel Bachlechner, Michael Friedewald, Stefania Aguzzi
2017 Social Science Research Network  
to validate privacy-preserving technologies.  ...  The main objective of the CSA e-SIDES is to complement the research on privacy-preserving big data technologies, by analyzing, mapping and clearly identifying the main societal and ethical challenges emerging  ...  key precondition to preserve privacy and to address undesired implications of big data.  ... 
doi:10.2139/ssrn.3091018 fatcat:jzxrxnlgkfbj7lopywiyfi2iwy

Limits of Individual Consent and Models of Distributed Consent in Online Social Networks

Juniper L. Lovato, Antoine Allard, Randall Harp, Jeremiah Onaolapo, Laurent Hébert-Dufresne
2022 2022 ACM Conference on Fairness, Accountability, and Transparency  
Nodes at a distance L > 1 can also be observed if the third party leverages some statistical procedure, inferring data up to a distance of two from directly observed nodes. (c.)  ...  Blue nodes have the lowest security settings and are susceptible to surveillance from third-party applications or websites.  ...  ACKNOWLEDGMENTS The authors would like to thank James Bagrow for his early discussions and feedback on this project.  ... 
doi:10.1145/3531146.3534640 fatcat:gtnxazga5jbcpj4qdzo2hltoju

The Implications of Social Media Use on Development in Africa: A Development Theory Perspective

Gloria Thabang Mohale
2020 Global Journal of Management and Business Research  
Overtime, they are able to form a coalition directed towards an ideology for the purpose of development.  ...  Development theory serves as an ideological function and therefore, social media users are able to articulate and share ideas on this platform.  ...  Literature Review a) Social Media Social media networks are applications that allow users to connect through creating personal information profiles, inviting friends and colleagues to have access to those  ... 
doi:10.34257/gjmbrgvol20is1pg63 fatcat:pasnuzo3aneh7ncnbwkbtlbtvm

Using Research Methods in Human Computer Interaction to Design Technology for Resilience

Arminda Guerra Lopes
2016 Journal of Information Systems and Technology Management  
As a consequence, the contributions made in HCI research tend to be aware to either engineering or the social sciences.  ...  Conversely, we intended to design for information systems and technological applications, to promote resilience in organisations (a set of routines that allow to recover from obstacles) and user's experiences  ...  Acknowledgments This work has been supported by FCT -Fundação para a Ciência e Tecnologia within the Project Scope UID/CEC/00319/2013.  ... 
doi:10.4301/s1807-17752016000300001 fatcat:ubwvwrlqbnhbzaknkai3ci3o5e

Is there a duty to participate in digital epidemiology?

Brent Mittelstadt, Justus Benzler, Lukas Engelmann, Barbara Prainsack, Effy Vayena
2018 Life Sciences, Society and Policy  
We conclude with a list of questions to be considered in public negotiations of digital epidemiology, including the application of a duty to participate to third-party data controllers, and the important  ...  This paper poses the question of whether people have a duty to participate in digital epidemiology.  ...  Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.  ... 
doi:10.1186/s40504-018-0074-1 pmid:29744694 pmcid:PMC5943201 fatcat:qmhqbsmtpndzbgocckm673zkvy

Thinking Outside the Black-Box: The Case for "Algorithmic Sovereignty" in Social Media

Urbano Reviglio, Claudio Agosti
2020 Social Media + Society  
Together this novel theoretical framework and empirical applications suggest that, to preserve trust, social media should open their personalization algorithms to a social negotiation as the first step  ...  The third section empirically analyzes users' expectations and behaviors regarding such data-driven personalization to frame a conceptualization of users' agency.  ...  Content and algorithmic neutrality might be also achieved with a "right to profile transparency," through an infrastructure that supports what the philosopher Mireille Hildebrandt (2015) defines as "counter-profiling  ... 
doi:10.1177/2056305120915613 fatcat:5hgrxn7kn5dcrevqlniildbk4q

Policy Brief: Strategies for Policy Coherence and Sustainability Part 2: Sustainability guidance for prosumers and policymakers

K. Petrick, J. Fosse, S. Klarwein, M. Reus
2019 Zenodo  
It contains a Policy Brief followed by a report which provides supporting background information.  ...  The overall objective of this policy brief and report on background information is to provide guidance in terms of how to make prosumer projects truly sustainable across all three sustainability dimensions  ...  This poses a considerable challenge in terms of privacy because detailed profiles of customers can be made out based on their consumption patterns, their use of specific appliances and the times at which  ... 
doi:10.5281/zenodo.3584809 fatcat:3thny32zwzcp5poqfr2opyw5uy

Open Source, Social Activism and "Necessary Trade-offs" in the Digital Enclosure: A Case Study of Platform Co-operative, Loomio.org

Sam K Jackson, Kathleen M Kuehn
2016 tripleC: Communication, Capitalism & Critique  
We argue that if platform co-operatives like Loomio are to fully realize their goals, a digital commons unencumbered by capitalism requires access to reliable, affordable and accessible alternatives to  ...  This article explores the tensions and tradeoffs facing the open source platform co-operative Loomio.org, an online tool that aims to decentralize power through deliberative decision-making.  ...  a conversation with our users about privacy.  ... 
doi:10.31269/triplec.v14i2.764 fatcat:sdd3tu77c5erxitoum2aavdtze

Informed Consent in Biomedical Research

Fida K. Dankar, Marton Gergely, Samar Dankar
2019 Computational and Structural Biotechnology Journal  
It is becoming more and more vital to address this chasm, and begin building new frameworks to link this disconnect. Thus, we address three goals in this paper.  ...  Second, we evaluate the current research on the topic, classify them into themes, and attend to the problems therein.  ...  We would like to thank the anonymous reviewers for their helpful comments/suggestions on earlier drafts of the manuscript.  ... 
doi:10.1016/j.csbj.2019.03.010 pmid:31007872 pmcid:PMC6458444 fatcat:xbrh3m2jcnainfkfbumj4tozge
« Previous Showing results 1 — 15 out of 2,130 results