Filters








23,987 Hits in 6.5 sec

Protecting multi-party privacy in location-aware social point-of-interest recommendation

Weiqi Wang, An Liu, Zhixu Li, Xiangliang Zhang, Qing Li, Xiaofang Zhou
2018 World wide web (Bussum)  
Point-of-interest (POI) recommendation has attracted much interest recently because of its significant business potential.  ...  In this paper, we first propose PLAS, a protocol which enables effective POI recommendation without disclosing the sensitive data of every party getting involved in the recommendation.  ...  Acknowledgements Research reported in this publication was partially supported Natural Science Foundation of China (Grant Nos. 61572336, 61572335, 61402313)  ... 
doi:10.1007/s11280-018-0550-9 fatcat:wcp6zufhtzeypdzp5fkd5yeycm

Privacy in Recommender Systems [chapter]

Arjan J. P. Jeckmans, Michael Beye, Zekeriya Erkin, Pieter Hartel, Reginald L. Lagendijk, Qiang Tang
2012 Computer Communications and Networks  
Many users are not sufficiently aware if and how much of their data is collected, if such data is sold to third parties, or how securely it is stored and for how long.  ...  This chapter aims to provide insight into privacy in recommender systems. First, we discuss different types of existing recommender systems.  ...  Acknowledgements The research for this work was carried out within the Kindred Spirits project, part of the STW Sentinels research program.  ... 
doi:10.1007/978-1-4471-4555-4_12 dblp:series/ccn/JeckmansBEHLT13 fatcat:leia3xo3ovfo3h5ph5tmphr4qi

Privacy Issues in Mobile Social Networks

Racha Ajami, Nabeel Al Qirim, Noha Ramadan
2012 Procedia Computer Science  
The increasing number of users of such applications in general and location-aware applications more specifically, surges the likelihood of security breaches.  ...  In this research, we will address such privacy concerns considering the users' points-of-view and their acceptance of such applications highlighting the most common types.  ...  Location-based application in Smartphones should be enhanced in a way that protects users' privacy.  ... 
doi:10.1016/j.procs.2012.06.086 fatcat:kixrhmu4ubfwvcgcq7aoy34dh4

Privacy in Online Social Networks [chapter]

Michael Beye, Arjan J. P. Jeckmans, Zekeriya Erkin, Pieter Hartel, Reginald L. Lagendijk, Qiang Tang
2012 Computational Social Networks  
The problem is exacerbated by lacking experience and awareness in users, as well as poorly designed tools for privacy-management on the part of the OSN.  ...  The associated privacy risks in relation to both users and Service Providers are identified, and finally relevant research areas for privacy-protecting techniques are discussed.  ...  Acknowledgments The research for this work was carried out within the Kindred Spirits project, part of the STW Sentinels research program.  ... 
doi:10.1007/978-1-4471-4051-1_4 fatcat:nwtbgytkj5duzjcplnqhfcldke

THE PRIVACY OF INFORMATION IN CLOUD COMPUTING

2015 Issues in Information Systems  
comply with privacy of information in the cloud computing environment.  ...  This paper presents a literature review about the privacy of information in the cloud computing systems. A simple click after a cloud computing subscription can risk privacy of information.  ...  The organization needs to be aware of the location of the data center because privacy laws vary among different jurisdictions [25] .  ... 
doi:10.48009/4_iis_2015_77-85 fatcat:nklw26uaurblxjxt7hrroyp2sm

Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process

Yuxuan Liu, Woon Kwan Tse, Pui Yu Kwok, Yu Hin Chiu
2022 Information  
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https:// creativecommons.org/licenses/by/ 4.0/).  ...  Conflicts of Interest: The authors declare no conflict of interest.  ...  (Privacy) Ordinance (PCPD) in the Data Privacy Law of HKSAR through making a declamation at the start of our questionnaire survey, which is 'This survey is an anonymous survey, only for our research study  ... 
doi:10.3390/info13060280 dblp:journals/information/LiuTKC22 fatcat:joshnslxjbevhf4ahnlw3zahky

Building future generation service-oriented information broker networks

Sophie Wrobel, Eleni Kosta, Mohamed Bourimi, Rafael Giménez, Simon Scerri
2013 International Journal of Advanced Computer Science and Applications  
Failure to do so, may result in privacy violations, which may, in turn, affect the success of the network due to increasing awareness with respect to users' privacy and security concerns, and may incur  ...  rights to online privacy.  ...  This functionality of di.me aims at protecting the privacy of users and raise awareness with regard to the sharing of their personal information.  ... 
doi:10.14569/ijacsa.2013.041124 fatcat:udxruffhknb5bnwe7fb77dzzy4

Privacy Beyond the Individual Level [chapter]

Jennifer Jiyoung Suh, Miriam J. Metzger
2022 Modern Socio-Technical Perspectives on Privacy  
Finally, recommendations for tools and other mechanisms to support collaborative privacy management and group privacy protection are provided.  ...  The chapter describes several contemporary practices that influence the privacy of multiple actors and considers the dynamics of multi-stakeholder privacy decision-making.  ...  These strategies also do not apply to groups that are not self-aware. • Tools for multi-party privacy management: While there are many tools available for people to protect personal privacy (e.g., privacy  ... 
doi:10.1007/978-3-030-82786-1_6 fatcat:odjz373mc5fergnbt6lcptmi3m

Information Disclosure in Location-based Services: An Extended Privacy Calculus Model

Dana Naous, Vaibhav Kulkarni, Christine Legner, Benoît Garbinato
2019 International Conference on Information Systems  
In this study, we propose an extended privacy calculus model that views location disclosure across three dimensions; (1) extent, (2) location sensitivity and (3) sharing parties.  ...  In line with the general privacy studies, the rationale behind individual's disclosure motivations has been studied in information systems (IS) through the lens of privacy calculus.  ...  ., Google Maps), finding points of interest such as a restaurant (e.g., Yelp), ride-sharing (e.g., Uber), and social networking with context-aware features (e.g., tagging or check-ins on Facebook and Instagram  ... 
dblp:conf/icis/NaousKLG19 fatcat:i27oobwhs5efjiw6teno75u2pa

Data Privacy, What Still Need Consideration in Online Application System?

Dewi Puspa, Adhiawan Soegiharto, Achmad Nizar Hidayanto, Qorib Munajat
2020 Jurnal Sistem Informasi  
Based on this study, we found six things points to consider in data privacy, namely security and data protection, user awareness, risk managment, control setting, ethics, and transparency.  ...  This paper aims to conduct an analysis and exploration of matters that still needs to be considered in relation to data privacy in the online application system.  ...  Next, we will conduct a gap analysis between key points in data privacy and personal data protection regulations in Indonesia.  ... 
doi:10.21609/jsi.v16i1.941 fatcat:sckydixqwrgi5dqxu7gutgsjru

Trusted, Fair Multi-Segment Business Models, Enabled by a User-Centric, Privacy-Aware Platform, for a Data-Driven Era

Iosif Alvertis, Michael Petychakis, Romanos Tsouroplis, Evmorfia Biliri, Fenareti Lampathaki, Dimitrios Askounis
2015 International Conference on Advanced Information Systems Engineering  
Today's mobile applications, spanning from file storage and syncing, place checking in and tagging, multimedia sharing, streaming and recommendation, to social and professional networking, rely a lot on  ...  , respecting the requirements of both parties, i.e. service providers and dataowners.  ...  This work has been created in the context of the EU-funded project OPENi (Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets), Contract No:  ... 
dblp:conf/caise/AlvertisPTBLA15 fatcat:c4wg2uaw2rc2ffucgqzgtcj5ta

Give more data, awareness and control to individual citizens, and they will help COVID-19 containment [article]

Mirco Nanni, Gennady Andrienko, Albert-László Barabási, Chiara Boldrini, Francesco Bonchi, Ciro Cattuto, Francesca Chiaromonte, Giovanni Comandé, Marco Conti, Mark Coté, Frank Dignum, Virginia Dignum (+27 others)
2020 arXiv   pre-print
This approach better protects the personal sphere of citizens and affords multiple benefits: it allows for detailed information gathering for infected people in a privacy-preserving fashion; and, in turn  ...  Our recommendation is two-fold.  ...  We advocate the conceptual advantage of a decentralized approach, where both contact and location data are collected exclusively in individual citizens' "personal data stores", to be shared separately  ... 
arXiv:2004.05222v2 fatcat:cgaajromgjgi5mekg42jokdiwe

Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives

Ke Yan, Wen Shen, Qun Jin, Huijuan Lu
2019 IEEE Access  
While significant efforts have been undertaken to address various privacy issues in recent years, there is a surprising lack of review for privacy concerns in the cyber-enabled sharing world.  ...  Differing from existing similar works on surveying sharing practices in various fields, our work comprehensively covers six branches of sharing services in the cyber-enabled world and selects solutions  ...  His research interests include multi-agent systems, human-machine interaction, and game theory.  ... 
doi:10.1109/access.2019.2894344 fatcat:qapuhjkhs5embm2l6q2cq52ply

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks [article]

Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou
2021 arXiv   pre-print
Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also led to an increased risk of privacy invasion.  ...  However, OSN image privacy itself is quite complicated, and solutions currently in place for privacy management in reality are insufficient to provide personalized, accurate and flexible privacy protection  ...  Intelligent solutions in local management 1) Solutions for unintended capture: The simplest way to protect the privacy of non-interested parties is to delete the entire image at point of capture.  ... 
arXiv:2008.12199v2 fatcat:vxv6rsnyavesjiw2bbnc4jzsiy

ROAuth

Mohamed Shehab, Said Marouf, Christopher Hudel
2011 Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11  
We propose a mechanism that computes permission ratings based on a multi-criteria recommendation model which utilizes previous user decisions, and application requests to enhance the privacy of the overall  ...  Experiments on the collected data indicate that the proposed framework efficiently enhanced the user awareness and privacy related to third party application authorizations.  ...  CONCLUSION AND FUTURE WORK Usable privacy configuration tools are essential in providing user privacy and protecting their data from third party applications in social networks.  ... 
doi:10.1145/2078827.2078842 dblp:conf/soups/ShehabMH11 fatcat:sshycqi7vjgutda25worwj6yi4
« Previous Showing results 1 — 15 out of 23,987 results