Privacy
From tech and Internet surveillance to sensors to social networking, privacy rules are being rewritten.
-
Cost of Data Breach Study -Italy 2013
Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...
Sponsored By Symantec
-
Dynamic Password Schemes for Protecting Users From Password Theft for e-Banking
In this paper, the authors discuss how to prevent user's passwords from being stolen by adversaries in online banking and automated teller machines. They propose dynamic password mechanisms in which a user has a mobile, in that mobile the dynamic password scheme is implemented using Android Operating System, so dynamic...
Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)
-
Privacy Against Aggregate Knowledge Attacks
In this paper, the authors focus on protecting the privacy of individuals in publication scenarios where the attacker is expected to have only abstract or aggregate knowledge about each record. Whereas, data privacy research usually focuses on defining stricter privacy guarantees that assume increasingly more sophisticated attack scenarios, it is...
Provided By Institute of Electrical & Electronic Engineers
-
Cloud File Sharing – Is Your Business at Risk?
Many companies find themselves in the midst of a struggle—employees love their consumer file sharing apps and want to bring their convenience to work, but IT and management must question the security of those applications and the wisdom of allowing employees to house company information on their personal devices and...
Provided By ShareFile
-
Differentially Private Histogram Publishing through Lossy Compression
Differential privacy has emerged as one of the most promising privacy models for private data release. It can be used to release different types of data, and, in particular, histograms, which provide useful summaries of a dataset. Several differentially private histogram releasing schemes have been proposed recently. However, most of...
Provided By INRIA
-
Publishing Microdata with a Robust Privacy Guarantee
Organizations, such as government agencies or hospitals, regularly release microdata (e.g., census data or medical records) to serve benign purposes. However, such data can inadvertently reveal sensitive personal information to malicious adversaries. Experience has shown that merely concealing explicit identifying attributes, such as name or phone number, does not suffice...
Provided By VLD Digital
-
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy
Differential privacy guarantees that information released about participants in a data set will be virtually indistinguishable whether or not their personal data is included. There are now many algorithms satisfying differential privacy, however, when adopting differential privacy, users must reason carefully about alternative mechanisms and the formulation of their task....
Provided By VLD Digital
-
Enhanced Sharing and Privacy in Collaborative Virtual Teams
Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. The authors describe a user-defined role-based sharing control model and architecture that uses hybrid...
Provided By Vienna University of Economics and Business
-
Relation Strength-Aware Clustering of Heterogeneous Information Networks With Incomplete Attributes
With the rapid emergence of online social media, online shopping sites and cyber-physical systems, it has become possible to model many forms of interconnected networks as heterogeneous information networks in which objects (i.e., nodes) are of different types, and links among objects correspond to different relations, denoting different interaction semantics....
Provided By VLD Digital
-
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge...
Provided By VLD Digital
-
Publishing Set-Valued Data via Differential Privacy
Set-valued data provides enormous opportunities for various data mining tasks. In this paper, the authors study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partition-based privacy models, for example k-anonymity, which...
Provided By VLD Digital
-
The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback
The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...
Provided By University of Vigo
-
10 arguments for and against WikiLeaks
Is WikiLeaks a whistleblower or a spy? Is transparency more important than privacy? Jaime Henriquez looks at both sides of the issues that have emerged in the wake of WikiLeaks' actions.
This download (and a companion poll) is also available as an entry in our 10 Things blog.Provided By Jaime Henriquez
-
Survey on Location Privacy in Pervasive Computing
The goal of ubiquitous computing research is re ne devices to the point where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices...
Provided By Darmstadt University of Technology
-
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and m-commerce channels. To deal with these anxieties, various security etiquettes related to symmetric and asymmetric key types have been framed. Digital Envelope is one...
Provided By International Journal of Network Security
-
Approximate Privacy: Foundations and Quantification (Extended Abstract)
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life have led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and...
Provided By Association for Computing Machinery
-
Local and Global Recoding Methods for Anonymizing Set-valued Data
In this paper, the authors study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to user's identity,...
Provided By King Abdullah University of Science and Technology
-
Privacy in Online Social Networking at Workplace
Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...
Provided By University of California
-
Privacy Concerns in Upcoming Demand-Response Systems
The collection of power consumption data in current and future demand-response systems creates serious privacy concerns. In a lax regulatory environment, the detailed household consumption data gathered by advanced metering projects is likely to be repurposed by interested parties to reveal personally identifying information, including an individual's activities, preferences, and...
Provided By University of California
-
Modeling PLA Variation of Privacy-Enhancing Personalized Systems
Privacy-Enhancing Personalized (PEP) systems address individual users' privacy preferences as well as privacy laws and regulations. Building such systems entails modeling two different domains: Privacy constraints as mandated by law, voluntary self-regulation, or users' individual privacy preferences, and modeled by legal professionals, and software architectures as dictated by available software...
Provided By University of California
-
Can the Utility of Anonymized Data Be Used for Privacy Breaches?
Group based anonymization is the most widely studied approach for privacy preserving data publishing. This includes k-anonymity, l-diversity, and t-closeness, to name a few. The goal of this paper is to raise a fundamental issue on the privacy exposure of the current group based approach. This has been overlooked in...
Provided By Association for Computing Machinery
-
Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences
To understand how collaborators reconcile the often conflicting needs of awareness and privacy, the authors studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. They present a theoretical framework describing privacy management practices and their determinants that emerged from field...
Provided By University of California
-
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites
Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, the authors proposed a dynamic privacy-enhancing user modeling framework based on a software Product Line Architecture (PLA). The system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well...
Provided By University of California
-
Privacy in Location Based Services: Primitives Toward the Solution
Location Based Services (LBS) are one of the most promising and innovative directions of convergence technologies resulting of emergence of several fields including database systems, mobile communication, Internet technology, and positioning systems. Although being initiated as early as middle of 1990's, it is only recently that the LBS received a...
Provided By Inha University
-
Why Is Evaluating Usability of Privacy Designs so Hard? Lessons Learned From a User Study of PRISM
Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privacy...
Provided By University of California
-
Society's Needs Vs. Protection of Your Privacy and Data
These Information Technology Tracking Systems have shown to provide improved security and safety in a world plagued by terrorism and crime. There are a variety of systems in use that can aid law enforcement, intelligence organizations, and private industry in a variety of activities everything from stopping a crime, hunting...
Provided By Bowie State University
-
Privacy and Information Technology
In both law and ethics, "Privacy" is an umbrella term for a wide variety of interests. Much of the vast literature on privacy has focused on an interest protected in American tort law referred to as the crucial core of privacy, and often described as "Having control over information about...
Provided By Clark University
-
An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies
This paper presents an exploration and analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). Interview participants reported being highly concerned with information privacy. At the same time, however, they also reported being significantly less concerned regarding the use of everyday...
Provided By Association for Computing Machinery
-
Privacy-Preserving Revocation Checking
Digital certificates signed by trusted Certification Authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For...
Provided By University of California
-
Privacy Concerns in Personal Genomics
The sequencing of the entire human genome was a triumphant coda to the innumerable successes and discoveries of twentieth century science. And like many of those publicly funded discoveries, genomics has been hastily transformed into a consumer technology: personal genomics. Personal genomics - in contrast to the relatively established single-gene...
Provided By Stanford University
-
Privacy Protection Against Malicious
The authors address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. They consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. They classify malicious adversaries into two widely existing subclasses,...
Provided By Institute of Electrical and Electronics Engineers
-
Privacy Issues and Human-Computer Interaction
Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Human-Computer Interaction (HCI) is the subfield of Computer Science that studies how people interact with and...
Provided By University of Michigan
-
Technical Solutions for Privacy-Enhanced Personalization
This chapter presents a first-of-its-kind survey that systematically analyzes existing Privacy-Enhanced Personalization (PEP) solutions and their underlying privacy protection techniques. The evaluation is based on an analytical framework of privacy-enhancing technologies, an earlier work of the authors. More specifically, the authors critically examine whether each PEP solution satisfies the privacy...
Provided By University of California
-
An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems
Call it by any epithet, nectar of life or life-giver, the precious mined knowledge nugget from raw data means life to all business applications. As the technology soars to an all time high in this information era, the people are in the grip of insecurity panic originating from diverse loopholes...
Provided By Anna University
-
Cost of Data Breach Study -Italy 2013
Customers often abandon the organization following a data breach. This study examines the costs incurred by 22 Italian companies from 10 different industry sectors following the loss or theft of protected personal data and notification of data breach victims as required by various laws. Read more...
Sponsored By Symantec
-
Privacy in Location Based Services: Primitives Toward the Solution
Location Based Services (LBS) are one of the most promising and innovative directions of convergence technologies resulting of emergence of several fields including database systems, mobile communication, Internet technology, and positioning systems. Although being initiated as early as middle of 1990's, it is only recently that the LBS received a...
Provided By Inha University
-
Cloud File Sharing – Is Your Business at Risk?
Many companies find themselves in the midst of a struggle—employees love their consumer file sharing apps and want to bring their convenience to work, but IT and management must question the security of those applications and the wisdom of allowing employees to house company information on their personal devices and...
Provided By ShareFile
-
Privacy and Information Technology
In both law and ethics, "Privacy" is an umbrella term for a wide variety of interests. Much of the vast literature on privacy has focused on an interest protected in American tort law referred to as the crucial core of privacy, and often described as "Having control over information about...
Provided By Clark University
-
Differentially Private Histogram Publishing through Lossy Compression
Differential privacy has emerged as one of the most promising privacy models for private data release. It can be used to release different types of data, and, in particular, histograms, which provide useful summaries of a dataset. Several differentially private histogram releasing schemes have been proposed recently. However, most of...
Provided By INRIA
-
Technical Solutions for Privacy-Enhanced Personalization
This chapter presents a first-of-its-kind survey that systematically analyzes existing Privacy-Enhanced Personalization (PEP) solutions and their underlying privacy protection techniques. The evaluation is based on an analytical framework of privacy-enhancing technologies, an earlier work of the authors. More specifically, the authors critically examine whether each PEP solution satisfies the privacy...
Provided By University of California
-
Interpersonal Privacy Management in Distributed Collaboration: Situational Characteristics and Interpretive Influences
To understand how collaborators reconcile the often conflicting needs of awareness and privacy, the authors studied a large software development project in a multinational corporation involving individuals at sites in the U.S. and India. They present a theoretical framework describing privacy management practices and their determinants that emerged from field...
Provided By University of California
-
Privacy in Online Social Networking at Workplace
Employees using Social Network Sites (SNS) at workplace is a fact. As companies are further embracing social networks, how if at all does this practice affect the work dynamics? While privacy has been a hot topic in online social network research in general, there is little work investigating the privacy...
Provided By University of California
-
Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites
Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, the authors proposed a dynamic privacy-enhancing user modeling framework based on a software Product Line Architecture (PLA). The system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well...
Provided By University of California
-
Why Is Evaluating Usability of Privacy Designs so Hard? Lessons Learned From a User Study of PRISM
Privacy is a thorny issue that affects all information systems designed for interpersonal interaction and awareness. Theoretical insights regarding privacy and user experience in a variety of systems have produced numerous design principles and guidelines for building systems sensitive to privacy issues. In order to truly improve support for privacy...
Provided By University of California
-
Privacy Concerns in Upcoming Demand-Response Systems
The collection of power consumption data in current and future demand-response systems creates serious privacy concerns. In a lax regulatory environment, the detailed household consumption data gathered by advanced metering projects is likely to be repurposed by interested parties to reveal personally identifying information, including an individual's activities, preferences, and...
Provided By University of California
-
Modeling PLA Variation of Privacy-Enhancing Personalized Systems
Privacy-Enhancing Personalized (PEP) systems address individual users' privacy preferences as well as privacy laws and regulations. Building such systems entails modeling two different domains: Privacy constraints as mandated by law, voluntary self-regulation, or users' individual privacy preferences, and modeled by legal professionals, and software architectures as dictated by available software...
Provided By University of California
-
Privacy-Preserving Revocation Checking
Digital certificates signed by trusted Certification Authorities (CAs) are used for multiple purposes, most commonly for secure binding of public keys to names and other attributes of their owners. Although a certificate usually includes an expiration time, it is not uncommon that a certificate needs to be revoked prematurely. For...
Provided By University of California
-
Privacy Protection Against Malicious
The authors address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. They consider threats from malicious adversaries that can deviate from the designated protocol and change their input databases. They classify malicious adversaries into two widely existing subclasses,...
Provided By Institute of Electrical and Electronics Engineers
-
Privacy Concerns in Personal Genomics
The sequencing of the entire human genome was a triumphant coda to the innumerable successes and discoveries of twentieth century science. And like many of those publicly funded discoveries, genomics has been hastily transformed into a consumer technology: personal genomics. Personal genomics - in contrast to the relatively established single-gene...
Provided By Stanford University
-
An Agent Based Burgeoning Framework for Privacy Preserving Information Harvesting Systems
Call it by any epithet, nectar of life or life-giver, the precious mined knowledge nugget from raw data means life to all business applications. As the technology soars to an all time high in this information era, the people are in the grip of insecurity panic originating from diverse loopholes...
Provided By Anna University
-
Can the Utility of Anonymized Data Be Used for Privacy Breaches?
Group based anonymization is the most widely studied approach for privacy preserving data publishing. This includes k-anonymity, l-diversity, and t-closeness, to name a few. The goal of this paper is to raise a fundamental issue on the privacy exposure of the current group based approach. This has been overlooked in...
Provided By Association for Computing Machinery
-
An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies
This paper presents an exploration and analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). Interview participants reported being highly concerned with information privacy. At the same time, however, they also reported being significantly less concerned regarding the use of everyday...
Provided By Association for Computing Machinery
-
Approximate Privacy: Foundations and Quantification (Extended Abstract)
Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life have led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and...
Provided By Association for Computing Machinery
-
Survey on Location Privacy in Pervasive Computing
The goal of ubiquitous computing research is re ne devices to the point where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices...
Provided By Darmstadt University of Technology
-
Society's Needs Vs. Protection of Your Privacy and Data
These Information Technology Tracking Systems have shown to provide improved security and safety in a world plagued by terrorism and crime. There are a variety of systems in use that can aid law enforcement, intelligence organizations, and private industry in a variety of activities everything from stopping a crime, hunting...
Provided By Bowie State University
-
The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback
The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...
Provided By University of Vigo
-
Publishing Microdata with a Robust Privacy Guarantee
Organizations, such as government agencies or hospitals, regularly release microdata (e.g., census data or medical records) to serve benign purposes. However, such data can inadvertently reveal sensitive personal information to malicious adversaries. Experience has shown that merely concealing explicit identifying attributes, such as name or phone number, does not suffice...
Provided By VLD Digital
-
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy
Differential privacy guarantees that information released about participants in a data set will be virtually indistinguishable whether or not their personal data is included. There are now many algorithms satisfying differential privacy, however, when adopting differential privacy, users must reason carefully about alternative mechanisms and the formulation of their task....
Provided By VLD Digital
-
Local and Global Recoding Methods for Anonymizing Set-valued Data
In this paper, the authors study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to user's identity,...
Provided By King Abdullah University of Science and Technology
-
Enhanced Sharing and Privacy in Collaborative Virtual Teams
Privacy concerns keep users from sharing required information in a collaborative environment. There is a need of privacy preserving methods that can enhance flow of information among collaborating users in dynamic teams without compromising their privacy. The authors describe a user-defined role-based sharing control model and architecture that uses hybrid...
Provided By Vienna University of Economics and Business
-
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and m-commerce channels. To deal with these anxieties, various security etiquettes related to symmetric and asymmetric key types have been framed. Digital Envelope is one...
Provided By International Journal of Network Security
-
Dynamic Password Schemes for Protecting Users From Password Theft for e-Banking
In this paper, the authors discuss how to prevent user's passwords from being stolen by adversaries in online banking and automated teller machines. They propose dynamic password mechanisms in which a user has a mobile, in that mobile the dynamic password scheme is implemented using Android Operating System, so dynamic...
Provided By International Journal of Innovative Technology and Exploring Engineering (IJITEE)
-
Privacy Against Aggregate Knowledge Attacks
In this paper, the authors focus on protecting the privacy of individuals in publication scenarios where the attacker is expected to have only abstract or aggregate knowledge about each record. Whereas, data privacy research usually focuses on defining stricter privacy guarantees that assume increasingly more sophisticated attack scenarios, it is...
Provided By Institute of Electrical & Electronic Engineers
-
10 arguments for and against WikiLeaks
Is WikiLeaks a whistleblower or a spy? Is transparency more important than privacy? Jaime Henriquez looks at both sides of the issues that have emerged in the wake of WikiLeaks' actions.
This download (and a companion poll) is also available as an entry in our 10 Things blog.Provided By Jaime Henriquez
-
Privacy Issues and Human-Computer Interaction
Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanisms. Human-Computer Interaction (HCI) is the subfield of Computer Science that studies how people interact with and...
Provided By University of Michigan
-
Personalized Privacy Protection in Social Networks
Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge...
Provided By VLD Digital
-
Relation Strength-Aware Clustering of Heterogeneous Information Networks With Incomplete Attributes
With the rapid emergence of online social media, online shopping sites and cyber-physical systems, it has become possible to model many forms of interconnected networks as heterogeneous information networks in which objects (i.e., nodes) are of different types, and links among objects correspond to different relations, denoting different interaction semantics....
Provided By VLD Digital
-
Publishing Set-Valued Data via Differential Privacy
Set-valued data provides enormous opportunities for various data mining tasks. In this paper, the authors study the problem of publishing set-valued data for data mining tasks under the rigorous differential privacy model. All existing data publishing methods for set-valued data are based on partition-based privacy models, for example k-anonymity, which...
Provided By VLD Digital