Filters








92,484 Hits in 12.1 sec

Using personal examples to improve risk communication for security & privacy decisions

Marian Harbach, Markus Hettig, Susanne Weber, Matthew Smith
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4obeqfuqs5gzbos5ah64a7m57a" style="color: black;">Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI &#39;14</a> </i> &nbsp;
In this paper, we propose to leverage the rich set of personal data available on smartphones to communicate risks using personalized examples.  ...  Examples of private information that may be at risk can draw the users' attention to relevant information for a decision and also improve their response.  ...  CONCLUSION AND FUTURE WORK In this paper, we have demonstrated the value of leveraging personalized examples to improve risk communication for security and privacy decisions, using the Android app installation  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2556288.2556978">doi:10.1145/2556288.2556978</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/chi/HarbachHWS14.html">dblp:conf/chi/HarbachHWS14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cvr4h6bvgzftdm4vfqdgojwrhq">fatcat:cvr4h6bvgzftdm4vfqdgojwrhq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813082208/https://www.chi.uni-hannover.de/uploads/tx_tkpublikationen/android-permissions-chi.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/56/b15633ac0fc71f85a011e9dab37d6b3dbed87317.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2556288.2556978"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

The Myth of the Average User

Serge Egelman, Eyal Peer
<span title="">2015</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/osnbukkdqjedvkk44xndonptme" style="color: black;">Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW &#39;15</a> </i> &nbsp;
We explore the extensive work on choice architecture and "nudges," and discuss the possible ways it could be leveraged to improve security outcomes by personalizing privacy and security mitigations to  ...  While individual differences in decision-making have been examined within the social sciences for several decades, they have only recently begun to be applied by computer scientists to examine privacy  ...  To give a few examples: • H1: When risks are framed in terms of economic costs, users measuring low on DoSpeRT-Economic (i.e., less likely to engage in economic risks) will improve their security behaviors  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2841113.2841115">doi:10.1145/2841113.2841115</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/nspw/EgelmanP15.html">dblp:conf/nspw/EgelmanP15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yql7xprle5fx7hzdjqbw665pae">fatcat:yql7xprle5fx7hzdjqbw665pae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170706075054/http://www.guanotronic.com/%7Eserge/papers/nspw15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/66/25/6625e1e3db6eb85b0ba6ad2595719063a03b2987.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2841113.2841115"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Protecting Privacy While Releasing Data: Strategies To Maximise Benefits And Mitigate Risks [chapter]

Joel Gurin, Matt Rumsey, Audrey Ariss, Katherine Garcia
<span title="2017-12-12">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
fellows, and interns who have all contributed to this effort throughout 2016.  ...  Parts of this paper have also been published in the 'Open Data and Privacy' Briefing Paper (2016) and the Roundtable Report (2016) published by the Center for Open Data Enterprise.  ...  It can be used to develop effective public policies, improve community relations, and correct unfair practices.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1117782">doi:10.5281/zenodo.1117782</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bqkhj75finc4hnymfqf4vh3yaa">fatcat:bqkhj75finc4hnymfqf4vh3yaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191221131258/https://zenodo.org/record/1117782/files/Chapter%2010%20Social%20Dynamics%20of%20Open%20Data.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/bf/d4bfca5881505a7300a6637055d4450e12f66b6c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1117782"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Adaptive security and privacy in smart grids: A software engineering vision

Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Bashar Nuseibeh
<span title="">2012</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wvv27s77dvd5flktsj246kcxwu" style="color: black;">2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids)</a> </i> &nbsp;
Adaptive security and privacy promise to address these threats by increasing awareness and automating prevention, detection and recovery from security and privacy requirements' failures at runtime by re-configuring  ...  This paper discusses the need for adaptive security and privacy in smart grids by presenting some motivating scenarios.  ...  ACKNOWLEDGMENT This work was supported, in part, by Science Foundation Ireland grant 10/CE/I1855 to Lero -The Irish Software Engineering Research Centre (www.lero.ie).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/se4sg.2012.6225718">doi:10.1109/se4sg.2012.6225718</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icse/SalehiePON12.html">dblp:conf/icse/SalehiePON12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uii52ghpnjgqrnzzvzeylrwhdu">fatcat:uii52ghpnjgqrnzzvzeylrwhdu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808060656/http://oro.open.ac.uk/34945/1/__penelope_MCSUsers_Staff_dl4356_desktop_Bashar%20docs_ORO%20papers_Adaptive%20Security%20and%20Privacy%20in%20Smart%20Grids.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/9c/cc9ce784c50bccf4b7ad1f8f2d14f9a7e9b01e47.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/se4sg.2012.6225718"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk [chapter]

Malcolm W. Harkins
<span title="">2016</span> <i title="Apress"> Managing Risk and Information Security </i> &nbsp;
Sometimes, the technology also includes features or options designed to help reduce risk. By carefully analyzing the risk and security implications, including privacy and  ...  But there's more to consider. Employees' personal information will be transferred to the outsourcer, potentially creating new privacy concerns.  ...  For example, some security groups try to ban the business use of social media due to the risks, but attempting to stop the use of external social media web sites is counterproductive and, in any case,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-1455-8_3">doi:10.1007/978-1-4842-1455-8_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cvxcdfabijcrpohrvudmital2e">fatcat:cvxcdfabijcrpohrvudmital2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180726085239/https://link.springer.com/content/pdf/10.1007%2F978-1-4842-1455-8_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1b/da/1bda7ac04de68e09e0c71fed033c8ac3115ead2a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4842-1455-8_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Investigating the effect of security and privacy on IoT device purchase behaviour

Nick Ho-Sam-Sooi, Wolter Pieters, Maarten Kroesen
<span title="">2020</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/e25s2ofdbnfb3j2rstrnkqsqfi" style="color: black;">Computers &amp; security</a> </i> &nbsp;
with the use of my personal data by external parties" I14: "When using online services, I am concerned with the use of my personal data by external parties" I15: "I undertook action to improve the security  ...  Governmental bodies could play an active role in reaching this goal, for example by designing legislation or standards that describe which security and privacy related information should be communicated  ...  For his thesis, he researched the effect of privacy and security on IoT device purchase intent.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2020.102132">doi:10.1016/j.cose.2020.102132</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y7sw43ev3jfnliuxhsmcttlp6a">fatcat:y7sw43ev3jfnliuxhsmcttlp6a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210428023848/https://repository.tudelft.nl/islandora/object/uuid%3A039400a6-ebb9-46a9-aa60-6717a8376e58/datastream/OBJ/download" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5f/ab/5fabb2454b140f606455cdb8acf010146f1a6a30.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.cose.2020.102132"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess

Jeffrey Wall, Paul Lowry, Jordan Barlow
<span title="">2016</span> <i title="Association for Information Systems"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zi576ij4kzbizn6deimehswscu" style="color: black;">Journal of the AIS</a> </i> &nbsp;
IT use.  ...  This concept can improve privacy and security research by showing that organizational violations of privacy and security rules are dynamic and selective yet influenced by external forces.  ...  to improve compliance with privacy and security rules.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1jais.00420">doi:10.17705/1jais.00420</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6tq7b5fc4jfxxfgzhbouhy7eji">fatcat:6tq7b5fc4jfxxfgzhbouhy7eji</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427225144/https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1733&amp;context=jais" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/fe/17fe1c5ae94d8e1841f931696568bc930eaee8b1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17705/1jais.00420"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Potential downside issues with telemedicine for individuals with chronic respiratory diseases

Lawrence Paelet, Jonathan Raskin, Richard ZuWallack
<span title="2022-02-04">2022</span> <i title="PAGEPress Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/umlza26uyjglxd46oztutv2uia" style="color: black;">Monaldi Archives for Chest Disease</a> </i> &nbsp;
Telemedicine refers to the use of communications technologies to provide or enhance medical care through mitigating the negative effects of patient-caregiver distance on medical evaluation and treatment  ...  risks.  ...  Privacy and security risks The terms, confidentiality, privacy and security as applied to telehealth are sometimes used interchangeably, although they differ in concept.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4081/monaldi.2022.2132">doi:10.4081/monaldi.2022.2132</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/35130678">pmid:35130678</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hmlre4pvlndhnhyhijuik7xi5a">fatcat:hmlre4pvlndhnhyhijuik7xi5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220206111757/https://www.monaldi-archives.org/index.php/macd/article/download/2132/1412" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/78/1e/781e14846918351683cce2ca6bd8ef0a167fd73d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4081/monaldi.2022.2132"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Quality evidence, quality decisions: Ways to improve security and privacy of EHR systems

Hamzah Osop, Tony Sahama
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5fqq26jtjvhqvfjglucmiygvfe" style="color: black;">2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)</a> </i> &nbsp;
It is especially true for the approach of practice-based evidence where the secondary use of EHR data, collected during routine care, has the potential to improve healthcare professionals' decision-making  ...  In order to design a secure and effective EHR system for the adoption of practice-based evidence approaches, recommendations for privacy and security measures can follow the security control protocol of  ...  This need to enforce privacy and security measures arises because privacy and security breaches are major risks when it comes to the use of information systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/healthcom.2016.7749424">doi:10.1109/healthcom.2016.7749424</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/healthcom/OsopS16a.html">dblp:conf/healthcom/OsopS16a</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/csiob72we5cb5azd6dddx2omrm">fatcat:csiob72we5cb5azd6dddx2omrm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181101193840/https://eprints.qut.edu.au/98862/1/PID4427253.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/52/4152888f04e244a363298637251d2b44a66034d9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/healthcom.2016.7749424"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Governance and Internal Partnerships [chapter]

Malcolm Harkins
<span title="">2013</span> <i title="Apress"> Managing Risk and Information Security </i> &nbsp;
to improve the risk picture overall.  ...  Employees' personal information will be transferred to the outsourcer, creating new privacy concerns.  ...  For example, some security groups try to ban the business use of social media due to the risks, but attempting to stop the use of external social media web sites is counterproductive and, in any case,  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4302-5114-9_3">doi:10.1007/978-1-4302-5114-9_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/nujv5idnibbera3sgfdrm2hqem">fatcat:nujv5idnibbera3sgfdrm2hqem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030104139/https://link.springer.com/content/pdf/10.1007%2F978-1-4302-5114-9_3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/8b/728bda879515231964d0d6d9a19a609d69d8d09c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-1-4302-5114-9_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance

Lynne M. Coventry, Debora Jeske, John M. Blythe, James Turland, Pam Briggs
<span title="2016-09-07">2016</span> <i title="Frontiers Media SA"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5r5ojcju2repjbmmjeu5oyawti" style="color: black;">Frontiers in Psychology</a> </i> &nbsp;
We would also like to thank the reviewers for their feedback.  ...  ACKNOWLEDGMENTS The authors would further like to thank colleagues from Computing Science at Newcastle University for their support and the contribution to this research.  ...  In the security and privacy domains, a range of candidate personality traits can be identified that are likely to affect decision-making, including impulsivity, risk-taking/risk propensity (Grossklags  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3389/fpsyg.2016.01341">doi:10.3389/fpsyg.2016.01341</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/27656157">pmid:27656157</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5013072/">pmcid:PMC5013072</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o5ierzeavnbqvpnbmayfla73um">fatcat:o5ierzeavnbqvpnbmayfla73um</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709032630/https://researchportal.northumbria.ac.uk/files/2965420/Coventry%20et%20al%20-%20personality%20and%20social%20framing.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/91/bc9180e1ef70602780b3d453d5dc639eec14bf9b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3389/fpsyg.2016.01341"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> frontiersin.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5013072" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Nudges for Privacy and Security

Alessandro Acquisti, Manya Sleeper, Yang Wang, Shomir Wilson, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub
<span title="2017-08-08">2017</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eiea26iqqjcatatlgxdpzt637y" style="color: black;">ACM Computing Surveys</a> </i> &nbsp;
This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making.  ...  A growing body of research has investigated individuals' choices in the presence of privacy and information security trade-offs, the decision making hurdles affecting those choices, and ways to mitigate  ...  Relatedly, personalized examples can improve the effectiveness of risk communication for security and privacy decisions [Harbach et al. 2014] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3054926">doi:10.1145/3054926</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sbo3puzlefbx3pftck56s3xvay">fatcat:sbo3puzlefbx3pftck56s3xvay</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200309205737/https://repository.arizona.edu/bitstream/handle/10150/627937/Final_nudges-privacy-security.pdf;jsessionid=6F0F5D27CAF77F3B4D45739FF162AEFE?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e8/b5/e8b586dd989ab608ff1b8519845ac3b357ce56de.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3054926"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Towards a Privacy Research Roadmap for the Computing Community [article]

Lorrie Cranor, Tal Rabin, Vitaly Shmatikov, Salil Vadhan, Daniel Weitzner
<span title="2016-04-11">2016</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This report, sponsored by the Computing Community Consortium (CCC), suggests a roadmap for privacy research over the next decade, aimed at enabling society to appropriately control threats to privacy while  ...  Many of these benefits, however, involve the use of sensitive personal data, and thereby raise concerns about privacy.  ...  For example, we need tools that allow for data analysis while minimizing exposure or inappropriate use of personal data, that log use of personal data and assess those uses against formally specified rules  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1604.03160v1">arXiv:1604.03160v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lidx4qqa45gfrgosotplm3h3ki">fatcat:lidx4qqa45gfrgosotplm3h3ki</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200929164339/https://arxiv.org/ftp/arxiv/papers/1604/1604.03160.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/eb/95eb22597670f6d5f312d6b78faea6b1301c42a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1604.03160v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

IoT Health Data in Electronic Health Records (EHR): Security and Privacy Issues in Era of 6G

Ana Koren, Ramjee Prasad
<span title="2022-02-14">2022</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ygvakwwlpvfrpb4j6w2wmjbwtm" style="color: black;">Journal of ICT Standardization</a> </i> &nbsp;
This paper focuses on the security and privacy issues for such a process.  ...  Potential integration of such collected data into central medical system would lead to more personalized healthcare and an improved patient-physician experience.  ...  Finally, Table 3 shows possible both security and privacy risks and solutions for how to mitigate them.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.1014">doi:10.13052/jicts2245-800x.1014</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7ygfxewuwjavjetar4df4fozze">fatcat:7ygfxewuwjavjetar4df4fozze</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220422032155/https://journals.riverpublishers.com/index.php/JICTS/article/download/11351/10683" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/7f/387f14dceb091dc6b86b86a30e9130a0e26fbc7c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jicts2245-800x.1014"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Extension of a didactic media competence model by privacy risk

Alexander Hug, Rüdiger Grimm
<span title="">2016</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/swcvexem7vdgtkwhc2g7uyuop4" style="color: black;">Proceedings of the 11th Workshop in Primary and Secondary Computing Education on ZZZ - WiPSCE &#39;16</a> </i> &nbsp;
Data protection measures available to the user are, for example, use of alternative software, alternative search engines, the use of data protection software tools and the personal decision about the disclosure  ...  Complete control exists if a user makes a conscious decision for or against passing on personal data in a social network or to a provider (when shopping online, for example).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2978249.2978268">doi:10.1145/2978249.2978268</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wipsce/HugG16.html">dblp:conf/wipsce/HugG16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x753evqoy5ef5hlow5xfkqo77q">fatcat:x753evqoy5ef5hlow5xfkqo77q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200320203925/https://kola.opus.hbz-nrw.de/opus45-kola/frontdoor/deliver/index/docId/1355/file/2016_05_arbeitsberichte.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/bb/d4bb0f8e1da9a6f4b5c9cdac9b764ef408b1326b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2978249.2978268"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 92,484 results