47,872 Hits in 7.0 sec

Take it or Leave it: Running a Survey when Privacy Comes at a Cost [article]

Katrina Ligett, Aaron Roth
2012 arXiv   pre-print
Instead, our mechanism has the ability to randomly approach individuals from a population and offer them a take-it-or-leave-it offer.  ...  Nevertheless, they would be willing to participate in the survey if they were compensated for their privacy cost.  ...  Cost Experienced from a Take-It-Or-Leave-It Mechanism Definition 2.4. A Private Take-It-Or-Leave-It Mechanism is composed of two algorithms, A 1 and A 2 .  ... 
arXiv:1202.4741v2 fatcat:cbuloyzbdbdm5crbopl5wavipa

Take It or Leave It: Running a Survey When Privacy Comes at a Cost [chapter]

Katrina Ligett, Aaron Roth
2012 Lecture Notes in Computer Science  
Instead, our mechanism has the ability to randomly approach individuals from a population and offer them a takeit-or-leave-it offer.  ...  Nevertheless, they would be willing to participate in the survey if they were compensated for their privacy cost.  ...  Work by A. Roth was partially supported by NSF grant CCF-1101389.  ... 
doi:10.1007/978-3-642-35311-6_28 fatcat:g3evjudz3jdfrdvbkd7p7j3dti

Is It Legal?

David R. Stone
2019 Journal of Intellectual Freedom and Privacy  
Libraries, Schools, Colleges and Universities, Prisons, Government Speech, Internet, Free Speech, Privacy, International  ...  Was it a violation of academic freedom when the university closed the exhibit and put the librarian on leave?  ...  tolerated a complaint of a girl coming in six months or a year after an event,' or that 'If a real rape was committed, go friggin' report it to police.'  ... 
doi:10.5860/jifp.v4i2.7193 fatcat:gc5zgzxzlfdvbhepflvn4agyiq

Digital Rights Management its Consumer Concerns

Madhavi Dhingra
2017 International Journal of Engineering Research and  
Further we have attempted to provide a solution which can take care of both sides to great extent.  ...  We also have discussed the need of DRM as well as the extent to which consumer rights are significantly affected by its introduction.  ...  It has taken a whole chain of systematic production and sales in millions to bring the end user cost at that price.  ... 
doi:10.17577/ijertv6is030401 fatcat:arowwtun3jevpasj7ofishnzbu

Is It Legal?

David R. Stone
2019 Journal of Intellectual Freedom and Privacy  
Schools, Colleges and Universities, Freedom of the Press, Privacy, 3-D Printing, International  ...  The concern, however, is that students' protection is coming at the expense of their privacy.  ...  It instead leaves enforcement up to the attorney general, except in the case of a data breach.  ... 
doi:10.5860/jifp.v3i2-3.6919 fatcat:flnktfawkndsfiuoqoavawxzim

Security Problems in Cloud Computing

Rola Motawie, Mahmoud M. El-Khouly, Samir Abou El-Seoud
2016 International Journal of Recent Contributions from Engineering, Science & IT  
Since cloud-computing technology is growing day by day, it comes with many security problems.  ...  Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud.  ...  This means SaaS clients must remember to remove or disable accounts as employees leave the company and create/enable accounts as come onboard.  ... 
doi:10.3991/ijes.v4i4.6538 fatcat:ro2t3eqr7bd6hjnctaoqhbxwua

Developing a Common Language About IT Risk Management

George F. Westerman, Richard Hunter
2009 Social Science Research Network  
Research Article: a completed research article drawing on one or more CISR research projects that presents management frameworks, findings and recommendations.  ...  Then you can build a risk management capability-by improving the IT foundation, installing a risk governance process, and creating a risk aware culture-that increases the returns from your IT risk management  ...  First, when an employee comes to the manager and says, "I have a problem," the manager should say, "Tell me about it."  ... 
doi:10.2139/ssrn.1979796 fatcat:udbek4lbhvbu5lo7oyjlzrcaze

Towards An Understanding of Cloud Computing's Impact on Organizational it Strategy

Ruoning Qian, Prashant Palvia
2013 Journal of IT Cases and Applications  
Although a lot have been discussed, its impacts on organizational IT strategy have not yet been fully addressed.  ...  Cloud computing has become a dominant IT trend during the past two years for its potential to remarkably change the technology and business landscape.  ...  "Maintaining our stuff at a certain level when we are experiencing a rapid expansion is another way of reducing the heads related cost".  ... 
doi:10.1080/15228053.2013.10845727 fatcat:o3vwgf5li5dbjk3sz3hgasudya

Local Differential Privacy and Its Applications: A Comprehensive Survey [article]

Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam
2020 arXiv   pre-print
This survey provides a comprehensive and structured overview of the local differential privacy technology.  ...  We discuss the practical deployment of local differential privacy and explore its application in various domains.  ...  The advantage is that it provides longitudinal privacy, but it is only in cases when the user's value does not change or changes in an uncorrelated fashion.  ... 
arXiv:2008.03686v1 fatcat:l7z3gip2ivdmvin7lraxd4vciy

Self, Privacy, and Power: Is it All Over?

Richard Warner, Robert H. Sloan
2014 Social Science Research Network  
Maccioni, who's been running Midtown's storied Le Cirque restaurant since 1974." 79As one restaurateur put it, "There's a fine line, but as long as you don't cross it, people just think you're good at  ...  : they know it when they see it.  ... 
doi:10.2139/ssrn.2401165 fatcat:bs5ojk7sjjhn3lkvlva24t4uli

Faking It: Criminal Sanctions and the Cost of Computer Intrusions

Jennifer S. Granick
2005 Workshop on the Economics of Information Security  
Still, courts must look closely at labor costs, and not take victim assessments at face value.  ...  Courts that defer to victim loss assessments will have trouble factoring out harm to reputation when it takes this form.  ... 
dblp:conf/weis/Granick05 fatcat:oi5vupayonfb5izlaoblxcdeki

Mobile Security and its Application

Jun Hou Chan, Jer Lang Hong
2016 International Journal of Security and Its Applications  
it was clear and visible, but nowadays when you combine all of those devices into a complex entity, we tend to leave a hole in the cloth somewhere that we did not or rather can't see due to the overwhelming  ...  It is becoming more and more of a common sight nowadays and this is because they are being offered at a price where more people are able to afford, hence they are reaching the hands of ceiling of the lower  ...  Acknowledgements This paper is a revised and expanded version of a paper entitled "A survey on Mobile Security" presented at The 5th International Conference on Next Generation Computer and Information  ... 
doi:10.14257/ijsia.2016.10.10.10 fatcat:ydbv2wzhhra3bhxl4jrtvqpe3m

Differential privacy in the 2020 US census: what will it do? Quantifying the accuracy/privacy tradeoff

Samantha Petti, Abraham Flaxman
2019 Gates Open Research  
When run with a privacy budget of 4.0, it was similar in error and privacy loss of a 90% sample.  ...  When run on the 1940 census data, TopDown with a privacy budget of 1.0 was similar in error and privacy loss to that of a simple random sample of 50% of the US population.  ...  The special structure of count queries affords a way to avoid re-running the algorithm repeatedly, which is essential for TopDown, since it takes several hours to complete a single run of the algorithm  ... 
doi:10.12688/gatesopenres.13089.1 pmid:32478311 pmcid:PMC7216402 fatcat:x7qf4ibggvbrbkxz5trcacds54

IT Auditing to Assure a Secure Cloud Computing

Zhixiong Chen, John Yoon
2010 2010 6th World Congress on Services  
Our holistic approach has strategic value to those who are using or consider using cloud computing because it addresses concerns such as security, privacy and regulations and compliance.  ...  In this paper we discuss the evolvement of cloud computing paradigm and present a framework for secure cloud computing through IT auditing.  ...  When it comes to move data out of the cloud or destroy data, cloud users should know if they data are destroyed completely and how.  ... 
doi:10.1109/services.2010.118 dblp:conf/services/ChenY10 fatcat:gfq3am4kevbm3a2pf3xlyxdoim

Low-burden Mobile Monitoring, Intervention and Real-time Analysis using the Wear-IT framework: Example and Usability Study (Preprint)

Timothy R. Brick, James Mundie, Jonathan Weaver, Robert Fraleigh, Zita Oravecz
2019 JMIR Formative Research  
The Wear-IT framework uses a combination of passive monitoring, real-time processing, and adaptive assessment and intervention to provide a balance between high-quality data collection and low participant  ...  Wear-IT integrates a variety of consumer-grade sensors and provides adaptive, personalized, and low-burden monitoring and intervention.  ...  Self-report surveys provide rich and valuable data, but they come at a nontrivial cost in terms of participant burden and dropout.  ... 
doi:10.2196/16072 pmid:32554373 pmcid:PMC7330734 fatcat:awqlhrgw7jd6xauj5xqt6env4a
« Previous Showing results 1 — 15 out of 47,872 results