Filters








295 Hits in 8.5 sec

Privacy as a Tradeoff: Introducing the Notion of Privacy Calculus for Context-Aware Mobile Applications

Zhan Liu, Jialu Shan, Riccardo Bonazzi, Yves Pigneur
2014 2014 47th Hawaii International Conference on System Sciences  
However, the need to accurately identify users' contexts has important implications for user's privacy and it increases the amount of trust, which users are requested to have in the service providers.  ...  In this paper, we introduce a model that describes the role of personalization and control in users' assessment of cost and benefits associated to the disclosure of private information.  ...  On the other hand, consumers of personalized products or services consider personal data collection as an invasion of their privacy and they often give as little information as possible to the service  ... 
doi:10.1109/hicss.2014.138 dblp:conf/hicss/LiuSBP14 fatcat:mssqohh575brzbz52bdo5mraiu

Towards Privacy Protection in Smart Grid

Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra
2012 Wireless personal communications  
As a result, consumer privacy becomes an important concern when collecting energy usage data with the deployment and adoption of smart grid technologies.  ...  We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity.  ...  Sherali Zeadally was partially supported by a District of Columbia NASA Space Grant and an NSF TIP grant (Award Number 1036293) during the course of this work.  ... 
doi:10.1007/s11277-012-0939-1 fatcat:zmzarxpk6zhtnajle2mg36jsqu

A review paper on preserving privacy in mobile environments

S. Arunkumar, M. Srivatsa, M. Rajarajan
2015 Journal of Network and Computer Applications  
Technology is improving day-by-day and so is the usage of mobile devices.  ...  We sincerely thank Ian Robertson, Senior managing consultant, Security and Privacy, IBM UK Limited, for his valuable comments and his role as industrial research supervisor of the first author.  ...  Acknowledgement We sincerely acknowledge the valuable discussions and input from Dakshi Agrawal, Manager, Network Management Research Group, Hawthorne, USA.  ... 
doi:10.1016/j.jnca.2015.01.008 fatcat:i3qn3ytue5ho5ocwthupb7q6pu

Privacy Assurance and Network Effects in the Adoption of Location-Based Services: an iPhone Experiment

Mark Jeffrey Keith, Jeffrey S. Babb Jr., Christopher P. Furner, Amjad Abdullat
2010 International Conference on Information Systems  
The purpose of this research is to empirically examine the significance of this new and increasingly relevant privacy dimension.  ...  The use of geospatially aware mobile devices and applications is increasing, along with the potential for the unethical use of personal location information.  ...  and 2) How do users make tradeoffs between these risks and rewards in determining their adoption intentions?  ... 
dblp:conf/icis/KeithBFA10 fatcat:r7w3iw2s5vd2vk4iwkxagcke6y

Shredder: Learning Noise Distributions to Protect Inference Privacy [article]

Fatemehsadat Mireshghallah, Mohammadkazem Taram, Prakash Ramrakhyani, Dean Tullsen, Hadi Esmaeilzadeh
2020 arXiv   pre-print
An undisciplined addition of noise can significantly reduce the accuracy of inference, rendering the service unusable.  ...  The loss function also exposes a knob for a disciplined and controlled asymmetric trade-off between privacy and accuracy.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of Arm,  ... 
arXiv:1905.11814v3 fatcat:inv2dc4aavbmdmio6gv7ysoirq

Contextual Permission Models for Better Privacy Protection

Primal Wijesekera
2018 Zenodo  
This dissertation provides an in-depth analysis of how users make privacy decisions in the context of Smartphones and how platforms can accommodate user's privacy requirements systematically.  ...  We performed a 38-person field study to measure the efficiency and usability of the new permission model. Based on exit interviews and 5M data points [...]  ...  We calculated the receiver operating characteristic (ROC) to capture the tradeoff between true-positive and false-positive rate.  ... 
doi:10.5281/zenodo.3264743 fatcat:6oeru7cp6vemhblacvwunqbfde

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services

Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li
2014 2014 23rd International Conference on Computer Communication and Networks (ICCCN)  
Security analysis and empirical evaluation results verify the effectiveness and efficiency of our scheme.  ...  In Location-Based Services (LBSs) mobile users submit location-related queries to the untrusted LBS server to get service.  ...  Second, few existing solutions provide fine-grained control for mobile users to tune the tradeoff between system overhead and privacy based on the restricted resources of their smartphones.  ... 
doi:10.1109/icccn.2014.6911813 dblp:conf/icccn/NiuLZL14 fatcat:dfykkv2rlfgehfpim63f6xrsxu

Consumer Privacy Choices, Informed Consent, and Baseline Protections to Facilitate Market Transactions in the Cloud

Jay P. Kesan, Carol M. Hayes, Masooda Bashir
2012 Social Science Research Network  
As part of this work, we analyzed and categorized the terms of TOS agreements and privacy policies of several major cloud services to aid in our assessment of the state of user privacy in the cloud.  ...  Our empirical analysis showed that providers take similar approaches to user privacy and were consistently more detailed when describing the user's obligations to the provider than when describing the  ...  In Part V, we turn to the results of our empirical analysis of the TOS agreements and privacy policies of a sample of cloud service industry leaders.  ... 
doi:10.2139/ssrn.2042638 fatcat:2i2bqo6r2be63ltmqvkeyp7tyq

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

J. M. de Fuentes, L. González-Manzano, J. Serna-Olvera, F. Veseli
2017 Personal and Ubiquitous Computing  
Preservation of privacy is crucial in these services to foster their acceptance. Previous approaches have mainly focused on PKI-based or ID-based cryptography.  ...  Assessment of attribute-based credentials for privacypreserving road traffic services in smart cities. Abstract Smart cities involve the provision of advanced services for road traffic users.  ...  Acknowledgements This work was supported by the MINECO  ... 
doi:10.1007/s00779-017-1057-6 fatcat:frqppgar3reyxablg3qviwsr4q

Factors Affecting 3G Adoption: An Empirical Study

Naresh Kumar Agarwal, Zhen Wang, Yunjie Xu, Danny C. C. Poo
2007 Pacific Asia Conference on Information Systems  
The study found that 1) price, convenience and service quality are all significant predictors of perceived value 2) the relationship between variety of service and perceived value is mediated by convenience  ...  3G opens up doors for high-speed transfer of both voice and data. However, the actual adoption rate of 3G has remained below expectations.  ...  A number of studies adopted the conceptualization that value is a tradeoff between 'benefit' and 'sacrifice'.  ... 
dblp:conf/pacis/AgarwalWXP07 fatcat:dbkhy5el3ra6va6ypuotvtr4ia

You've Got Photos! The design and evaluation of a location-based media-sharing application

Niko Kotilainen, maria Papadopouli
2008 Proceedings of the 4th International Mobile Multimedia Communications Conference  
The results encourage us to perform additional empirical-based studies under increased traffic load conditions and initiate a user-study in the premises of a museum and a research park.  ...  Its underlying information discovery and sharing mechanism is 7DS that runs in either pure peer-to-peer or centralized server-to-client mode, depending on the availability of a server and/or an infrastructure  ...  The authors would like to thank Manolis Ploumidis and Elias Raftopoulos for their help in reviewing an earlier draft and providing useful feedback on the performance analysis and Alexandros Kapravelos,  ... 
doi:10.4108/icst.mobimedia2008.4034 dblp:conf/mobimedia/KotilainenP08 fatcat:la5yrnuzazdilccwoovtnyfs5a

Consumer adoption of wireless services: Discovering the rules, while playing the game

Mirella Kleijnen, Ko de Ruyter, Martin Wetzels
2004 Journal of Interactive Marketing  
A B S T R A C T This research aims to explain the adoption of mobile gaming based on a refined model of Rogers' adoption theory, including context-specific factors and consumer traits.  ...  Overall, the empirical findings suggest that perceived risk plays a crucial role in the adoption process, followed by complexity and compatibility.  ...  RESEARCH DESIGN This study has two main objectives: (a) to identify an importance hierarchy concerning the critical factors influencing mobile services adoption and (b) to examine the tradeoffs consumers  ... 
doi:10.1002/dir.20002 fatcat:o4jc5cvfbrdc7dvb5t5kpbtcxq

Indoor Positioning with an Enterprise Radio Access Network

Jack Brassil, Chris Pearson, Lee Fuller
2014 Procedia Computer Science  
We describe the architecture and operation of a prototype that we have developed, and present empirical operational results from multiple enterprise settings.  ...  We introduce an indoor positioning technology based on an enterprise 3G UMTS radio access network and unmodified mobile phones.  ...  and privacy, and ease of deployment.  ... 
doi:10.1016/j.procs.2014.07.029 fatcat:iwwwxtucwng5bae7fjgpxqx4rm

Collecting big datasets of human activity one checkin at a time

Theus Hossmann, Christos Efstratiou, Cecilia Mascolo
2012 Proceedings of the 4th ACM international workshop on Hot topics in planet-scale measurement - HotPlanet '12  
A variety of cutting edge applications for mobile phones exploit the availability of phone sensors to accurately infer the user activity and location to offer more effective services.  ...  We argue for leveraging the concept of the checkin -as successfully introduced in online social networks (e.g. Foursquare) -for collecting activity and context related datasets.  ...  In order to publish the dataset for scientific use, we need to further explore the tradeoff between anonymization and usefulness of the data. Incentives & Gamification.  ... 
doi:10.1145/2307836.2307842 dblp:conf/mobisys/HossmannEM12 fatcat:dxvcsxl2y5godl2v544u4zmftq

MCDM Technique to Evaluating Mobile Banking Adoption in the Togolese Banking Industry Based on the Perceived Value : Perceived Benefit and Perceived Sacrifice Factors

Gbongli Komlan, Dumor Koffi, Kissi Mireku Kingsford
2016 International Journal of Data Mining & Knowledge Management Process  
Nevertheless, lots of service innovations have failed to generate revenue due to lagging adoption issues.  ...  ) and resistance factors (perceived sacrifice) that contribute to the customers adoption of m-banking.  ...  the system security is reliable enough to protect personal and privacy information.  ... 
doi:10.5121/ijdkp.2016.6304 fatcat:yoiufytyzbcv7h3fehk4my6p4q
« Previous Showing results 1 — 15 out of 295 results