713,666 Hits in 6.4 sec

Protecting Access to People Location Information [chapter]

Urs Hengartner, Peter Steenkiste
2004 Lecture Notes in Computer Science  
We present several challenges that arise for the specification and implementation of policies controlling access to location information.  ...  We show how our design of an access control mechanism for a system providing people location information addresses the challenges. Our mechanism can be deployed in different environments.  ...  Namely, these certificates could potentially not only protect access to people location information, but also to other kinds of information that is gathered in a similar way as people location information  ... 
doi:10.1007/978-3-540-39881-3_6 fatcat:ste46ttdbre2nkdvdhwbty5kvq

Is My Information Private? Geo-Privacy in the World of Social Media

Bandana Kar, Rina Ghose
2014 International Conference Geographic Information Science  
It can be dated back to "media privacy" of 1361 that was enacted to protect people from peeping toms in England.  ...  These actions led to the enactment of a number of privacy policies, specifically, focusing on data protection -mis-use of data and/or malicious access of data by unauthorized persons.  ...  These actions motivated people to protect their privacy, especially, access to personal information, and led to the enactment of a number of privacy policies focusing on data protection, i.e., mis-use  ... 
dblp:conf/giscience/KarG14 fatcat:zlso6ysnfvdqdbwedpdijwjmda

Inequality in access to cultural ecosystem services from protected areas in the Chilean biodiversity hotspot

Maria Jose Martinez-Harms, Brett A. Bryan, Spencer A. Wood, David M. Fisher, Elizabeth Law, Jonathan R. Rhodes, Cynnamon Dobbs, Duan Biggs, Kerrie A. Wilson
2018 Science of the Total Environment  
Understanding accessibility to protected areas and likely preferences for enjoying the benefits of nature visits are key factors in identifying ways to reduce inequality in access and inform the planning  ...  By providing information on the current spatial flows of people to protected areas, we demonstrate the need to expand the protected area network, especially in lower income areas, to reduce inequality  ...  This information is key to informing the planning and management of future protected areas to improve equitable of access.  ... 
doi:10.1016/j.scitotenv.2018.04.353 pmid:29913575 fatcat:tlden4u54ffzblszt6pqe33tji

Protecting Smartphones Based on Usage Patterns

Weifeng Chen
2017 International Journal of Computer & Software Engineering  
On the other hand, more and more sensitive information is now stored or accessible on smartphones such as Visa Signature or Paypal apps. Smartphones need to be protected more than ever before.  ...  With all these applications, people tend to access their smartphones frequently and instantly, i.e., they want to use the phone right away.  ...  In each phone usage, no matter how long the user uses the phone, information such as the access time, access locations, and access intervals, can be collected.  ... 
doi:10.15344/2456-4451/2017/113 fatcat:a7cggsnf5jgnrel2rwi5olpziq

Privacy protection in location-sharing services

Fei Xu, Jingsha He, Matthew Wright, Jing Xu
2010 2010 International Conference on Computer Application and System Modeling (ICCASM 2010)  
Location privacy is of utmost concern for location-sharing services. There is already a full agreement that users would like to have the complete control over their location information.  ...  Existing privacy protection methods often let users specify their privacy peferences to the service provider and thus not only fail to consider the dynamic nature of privacy preferences but also fail to  ...  The privacy access policies related to these three people that are set by Alice are as follows: SDP1: when the requester is Bob, immediately approve the access request and send Bob my location information  ... 
doi:10.1109/iccasm.2010.5620281 fatcat:7d5ioyctgnanjjnchi7q3laqvi

Preserving Privacy in Context-Aware Systems

Pramod Jagtap, Anupam Joshi, Tim Finin, Laura Zavala
2011 2011 IEEE Fifth International Conference on Semantic Computing  
We present a framework to provide users with appropriate levels of privacy to protect the personal information their mobile devices are collecting, including the inferences that can be drawn from the information  ...  Recent years have seen a confluence of two major trends -the increase of mobile devices such as smart phones as the primary access point to networked information and the rise of social media platforms  ...  A privacy policy such as "Share my location with teachers on weekdays from 9am-5pm" allows a group of people defined by the user as "teachers" to access user's GPS location between the specified hours.  ... 
doi:10.1109/icsc.2011.87 dblp:conf/semco/JagtapJFG11 fatcat:cwx6rwxoorgnbfncrrjp3pcimm

Social Network Privacy Protection Research in Big Data Era

Shuang LIANG
2017 DEStech Transactions on Computer Science and Engineering  
Only the effective privacy protection technologies combined with related policies and regulations, the problem of personal user information security can be solved.  ...  It can provide protection for the healthy development of social networks on big data era.  ...  access policy, so that the information can be more convenient sharing within the group, in order to ensure that the information can only be seen by what people want.  ... 
doi:10.12783/dtcse/aice-ncs2016/5715 fatcat:gx73amzjtzgwppmusz6ndno67y

Survey on Privacy-Preserving by a Trajectory for Participatory Sensing in Wireless Sensor Networks

Mrs. Shreetha, Mr. S. Girish
2015 International Journal of Engineering Research and  
The adversary is used to collect and analyses participators location and trajectory data, from which privacy of the system is harmed.  ...  Based on this a theoretical mix zone model with time as a factor from the graph theory is proposed, from which loss of information is less and hence it is cost effective, privacy is protected.  ...  Privacy of location information here is actually controlled access to information [2] . The methods proposed here is anonymity set and mix networks.  ... 
doi:10.17577/ijertv4is030271 fatcat:a3z4d4gd2ffslarqwpjs2wnfe4

Looting hoards of gold and poaching spotted owls: Data confidentiality among archaeologists & zoologists

Rebecca D. Frank, Adam Kriesberg, Elizabeth Yakel, Ixchel M. Faniel
2015 Proceedings of the Association for Information Science and Technology  
We find that while both archaeologists and zoologists view location information as highly important and valuable in facilitating use and reuse of data, they also acknowledge that location should at times  ...  While researchers in both disciplines understand the potential dangers of allowing disclosure of this information, they disagree about who should take responsibility for access decisions and conditions  ...  ACKNOWLEDGMENTS The DIPIR Project was made possible by a National Leadership Grant from the Institute for Museum and Library Services, LG-06-10-0140-10, "Dissemination Information Packages for Information  ... 
doi:10.1002/pra2.2015.145052010037 dblp:conf/asist/FrankKYF15 fatcat:ku22sxi3gbhxng2pnwjjywcs3a

Personal Privacy Protection in Big Data Environment Under the New Coronavirus Situation

Xing Chen
2020 2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)  
Governments quickly moved to detect and track and isolate patients and doctors and nurses to effectively prevent the spread of virus and protect the safety of healthy people.  ...  Therefore, we must pay close attention to the protection of personal privacy.  ...  In South Korea, government departments are also using the location data of infected people to track their whereabouts.  ... 
doi:10.1109/iciscae51034.2020.9236848 fatcat:75h4rarjkzbm3djqraxtahfbwy

Research On Privacy Protection Strategies Of Mobile Social Network Users

Pshwang Wang, Zecheng Wang
2020 International journal of advanced networking and applications  
In order to protect mobile social network users' privacy information, and promote the healthy development of the mobile social industry, This paper studies the types and ways of user privacy disclosure  ...  It also briefly introduces the development trend and future research of access control policies in mobile social network.  ...  Minimize location information when sharing links or personal status; Try to use false names to protect personal information when registering websites that do not require real user information, and do not  ... 
doi:10.35444/ijana.2020.12103 fatcat:4bhf2mgnc5hanaiiectqek44my

Privacy and Pandemics

Clarisa Long
2020 Journal of Constitutional Law  
Georgia is one of the countries, that also uses technology for the purpose of locating the possible contacts of the virus infected people, thus making the comparative analysis extremely relevant locally  ...  Several countries have applied one or both practices and it is relevant to look into them with legal perspective.  ...  In the information privacy community the relevant unit of data is "personally identifiable information," or PII. 2 In the health context, the relevant unit of data is called "protected health information  ... 
doaj:5e1c473d46ab4907a0fd95d38bb0e753 fatcat:xbabcjfu7fhxtcra7kvr73d5iu

SnapMe if you can

Benjamin Henne, Christian Szongott, Matthew Smith
2013 Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13  
Finally, we present a novel concept on how location information can actually help users to control the flood of potentially infringing or interesting media.  ...  An increasing number of modern devices are capable of embedding location information and other metadata into created content.  ...  Image access is defined on a per-album base: It can be public, restricted to people who know the secret URL, or to the owner. Geo-location data can be protected separately.  ... 
doi:10.1145/2462096.2462113 dblp:conf/wisec/HenneSS13 fatcat:n3vmlew6ezbtbhlh46y2hajlcu

Community perceptions towards nature conservation in the Eastern Cape Province, South Africa

Daniel Angwenyi, Martin Potgieter, James Gambiza
2021 Nature Conservation  
Most (75%) respondents indicated that closely located reserves gave them opportunities to learn about nature conservation and to subsidize their incomes through tourism ventures.  ...  In addition to households' knowledge about the role of reserves, the paper also provides an assessment of people's attitudes towards their location and management, as well as views on the best way to manage  ...  We also extent our gratitude to CSS Geographic Information Specialists for creating the map of the study sites.  ... 
doi:10.3897/natureconservation.43.57935 fatcat:mktannjtnvgwrif5jricynqg2a

Situational Awareness and Public Wi-Fi Users' Self-Protective Behaviors

David Maimon, C. Jordan Howell, Scott Jacques, Robert Perkins
2021 open qualitative criminology  
People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as persons looking over their shoulder, literally  ...  to prevent others from viewing personal information.  ...  Discussion The Internet facilitates ways for criminals to easily access valuable information.  ... 
doi:10.21428/51bae76e.fa46bf1c fatcat:uuigvehskbbenb7mnrprw7pj2a
« Previous Showing results 1 — 15 out of 713,666 results