Filters








21,070 Hits in 4.1 sec

The challenge of data and application security and privacy (DASPY)

Ravi Sandhu
2011 Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11  
of the term data Data Security and Privacy "The general understanding of the term data security and privacy is probably not significantly changed since these early days, course in the details and  ...  management system in particular" Software Architect Project Alice Win7 Alice SecureWin7 Bob Vista Data Security and Privacy "The general understanding of the term data security and privacy is probably  ... 
doi:10.1145/1943513.1943515 dblp:conf/codaspy/Sandhu11 fatcat:bltlpq3ndbcp3hewpch76c7re4

Personal privacy through understanding and action: five pitfalls for designers

Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay
2004 Personal and Ubiquitous Computing  
These pitfalls are based on the literature, on analyses of existing privacy-affecting systems, and on our own experiences designing a user interface for managing privacy in ubiquitous computing.  ...  It is a challenge for designers of interactive systems to empower these human-level processes of understanding and action through the limited technical mechanisms of feedback and control.  ...  There has been a tremendous amount of research into the needs, wants, and realities of personal privacy in the context of technical systems.  ... 
doi:10.1007/s00779-004-0304-9 fatcat:o3iyjylpvffabgtx7urdsp2vpa

The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely

Verena Distler, Gabriele Lenzini, Carine Lallemand, Vincent Koenig
2020 New Security Paradigms Workshop 2020  
CCS CONCEPTS • Security and privacy → Usability in security and privacy; Social aspects of security and privacy.  ...  A growing body of research in the usable privacy and security community addresses the question of how to best influence user behavior to reduce risk-taking.  ...  We also thank the anonymous reviewers and all NSPW participants for their thoughtful and constructive comments.  ... 
doi:10.1145/3442167.3442173 fatcat:kuvankdksfbcvhjvxezagswbvi

Privacy and Identity Management

Marit Hansen, Ari Schwartz, Alissa Cooper
2008 IEEE Security and Privacy  
However, the digitization of information-by facilitating the collection, storage, and sharing of large amounts of data-can exacerbate privacy risks inherent in identity management systems.  ...  As identity management systems-defined here as programs or frameworks that administer the collection, authentication, or use of identity and information linked to identity-are implemented in both the public  ...  These nuances ultimately point to the need to evaluate identity management systems with respect to privacy in context.  ... 
doi:10.1109/msp.2008.41 fatcat:ise5qe7ekbcovloop6cjn3i4mi

Between Scylla and Charybdis: Charting the Wicked Problem of Reusing Health Data for Clinical Research Informatics

Jacqueline Nicholls, Natalie Fitzpatrick, Nathan Lea
2018 IMIA Yearbook of Medical Informatics  
A lack of understanding around the context of data acquisition and sharing undermines the foundations of patient-professional trust.  ...  Efforts to protect privacy, where tailoring to specific contexts is a key driver, should support the development of solutions which more adequately honour privacy needs, justify access, and protect equity  ...  In combination with the scoping query, we developed queries that were related to privacy, consent, data protection, information security, trust and trusting relationships, and ethics.  ... 
doi:10.1055/s-0038-1641219 pmid:30157520 fatcat:bns75b7ex5fojpcjai5frziiv4

Editorial: Special issue on cyber security, privacy and ethics of information systems

Alessandro Acquisti, Tamara Dinev, Mark Keil
2019 Information Systems Frontiers  
This special Issue of Information Systems Frontiers, dedicated to the memory of H.  ...  Their study echoes the concerns of information security mangers in enforcing information security policy (ISP) in relation to both employee negligence and intentional insider breaches.  ...  His studies have spearheaded the investigation of privacy and disclosure behavior in online social networks, and the application of behavioral economics to the study of privacy and information security  ... 
doi:10.1007/s10796-019-09971-5 fatcat:ddi3kihrivefzlumn24n3lbtve

Understanding the Experience-Centeredness of Privacy and Security Technologies

Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, Patrick Olivier
2014 Proceedings of the 2014 workshop on New Security Paradigms Workshop - NSPW '14  
In this paper we add to the growing discussion by introducing the notion of experiencecentered privacy and security.  ...  However, in HCI research more generally there has long been an awareness of the need to understand and design for user experience, in recognition of the complex and multi-faceted role that technology now  ...  Understanding Users in the field of Computer Privacy and Security It is challenging to understand the needs and practices of users in the context of information security and privacy, as these dimensions  ... 
doi:10.1145/2683467.2683475 dblp:conf/nspw/DunphyVCCVWMO14 fatcat:peb2qwe2lrgqvdzie32awosupe

Understanding and Enhancing Consumer Privacy Perceptions in the Cloud [chapter]

Grace Fox
2020 The Cloud-to-Thing Continuum  
This chapter leverages the broader privacy literature in the Information Systems field to identify potential measures to enhance consumer privacy in the cloud context and highlights a number of paths for  ...  The recent increase in highly publicised cloud breaches, coupled with issues surrounding transparency and control in the cloud, highlights the importance of understanding and addressing privacy in this  ...  Information Security Information security refers to the preservation of the three tenets of security; the confidentiality of information, the integrity information, and the availability of information,  ... 
doi:10.1007/978-3-030-54660-1_4 fatcat:rdmyooz6qfbphj73pgmtf4xo6a

Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration

Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, Lorrie Faith Cranor
2018 Proceedings on Privacy Enhancing Technologies  
Are the many formal definitions and frameworks of privacy consistent with a layperson's understanding of privacy?  ...  The metaphors, themes, and symbols identified by these findings can be used for improving privacy communication, education, and design by inspiring and informing visual and conceptual strategies for reaching  ...  Acknowledgements The initial Privacy Illustrated data collection took place as part of the Deep Lab project at the STUDIO for Creative Inquiry at Carnegie Mellon University, made possible through support  ... 
doi:10.1515/popets-2018-0029 dblp:journals/popets/OatesAMSZBC18 fatcat:427ibmhwhnbdlnak4egaqzja2q

Page 25 of Current Vol. , Issue 530 [page]

2011 Current  
, and the emerging ascendency of actuarial practices*’ and often fail to understand the nuances and subtleties within the data.  ...  In the context of the former, they are used increasingly for crime control and national security, but there is a paucity of systematic empirical analysis of their value and little scrutiny of the evidential  ... 

The Inference Problem and Pervasive Computing

Catherine Ann Dwyer
2009 Social Science Research Network  
The promise of pervasive computing systems, which flood an environment with sensors and smart devices, has been diminished by an inability to adequately address privacy concerns.  ...  Measurements of privacy demonstrate a high level of public concern, yet designers of pervasive computing systems do not find these measurements relevant to the use of their systems.  ...  For both the privacy and security of its users, pervasive computing systems must protect the integrity of personal information.  ... 
doi:10.2139/ssrn.1508513 fatcat:koqg2knlvnhcfkr5bokkx5zkb4

What Was Samsung Thinking?

Susan Landau
2015 IEEE Security and Privacy  
These are the kinds of questions social scientists ask, and they're important in smart TV system design.  ...  I f we hope to provide an IoT world that's useful, rather than one in which people must shut off their devices to achieve a desired level of privacy, we must understand users' expectations of their devices  ... 
doi:10.1109/msp.2015.63 fatcat:ajal5uueo5bdnl7quhornotexm

If This Context Then That Concern: Exploring users' concerns with IFTTT applets [article]

Mahsa Saeidi, McKenzie Calvert, Audrey W. Au, Anita Sarma, Rakesh B. Bobba
2020 arXiv   pre-print
However, there are inherent risks in using such applets -- even non-malicious ones -- as sensitive information may leak through their use in certain contexts (e.g., where the device is located, who can  ...  Qualitative analysis reveals that participants had a nuanced understanding of contextual factors and how these factors could lead to leakage of sensitive data and allow unauthorized access to applets and  ...  Further, in a majority of cases, participants were concerned because of security and privacy risks associated with the context of use of these applets.  ... 
arXiv:2012.12518v1 fatcat:xcrtrp6s7feo5e5n4dorpc6vxa

Empowering Users to Specify and Manage Their Privacy Preferences in e-Government Environments [chapter]

Prokopios Drogkaris, Aristomenis Gritzalis, Costas Lambrinoudakis
2014 Lecture Notes in Computer Science  
Towards this direction, the employment of Privacy Policies and Preferences has been proposed in an attempt to simplify the provision of electronic services while preserving users' personal data and information  ...  The provision of advanced e-Government services has raised users' concerns on personal data disclosure and privacy violation threats as more and more information is released to various governmental service  ...  As acknowledged in [15] , "privacy poses a very difficult HCI problem"; GUI's not only represent an extremely complex decision space, depending on the context and the commitment of the user, in a simplified  ... 
doi:10.1007/978-3-319-10178-1_19 fatcat:4klcgzd655h7jl3tjfl32araba

Situating the concern for information privacy through an empirical study of responses to video recording

David H. Nguyen, Aurora Bedford, Alexander Gerard Bretana, Gillian R. Hayes
2011 Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11  
We describe a commonly used model for understanding information privacy, the Concern for Information Privacy (CFIP) model, and present the ways that this model and its associated questionnaire can shed  ...  of data provenance and leakage, and understanding of and access to the data assemblage being created about individuals.  ...  We thank Amy Voida, Steve Voida, and the members of the STAR Group for their comments and input on earlier versions of this paper.  ... 
doi:10.1145/1978942.1979419 dblp:conf/chi/NguyenBBH11 fatcat:k3e4oectjfasjlmmpxe3qkvrum
« Previous Showing results 1 — 15 out of 21,070 results