Spelling suggestions: "subject:"[een] DATA PROTECTION"" "subject:"[enn] DATA PROTECTION""
191 |
Designing for Privacy in Interactive SystemsJensen, Carlos 29 November 2005 (has links)
People are increasingly concerned about online privacy and how computers collect, process, share, and store their personal information. Such concerns are understandable given the growing number of privacy invasions and the pervasiveness of information capture and sharing between IT systems. This situation has led to an increasingly regulated environment, limiting what systems may do, and what safeguards they must offer users. Privacy is an especially important concern in the fields of computer supported collaborative work (CSCW), Ubiquitous Computing, and e-commerce, where the nature of the applications often requires some information collection and sharing.
In order to minimize risks to users it is essential to identify privacy problems early in the design process. Several methods and frameworks for accomplishing this have been proposed in the last decades. These frameworks, though based on hard-earned experience and great insight, have not seen widespread adoption despite the high level of interest in this topic. Part of the reason for this is likely the lack of evaluation and study of these frameworks.
In our research we examine the key design and analysis frameworks and their elements, and compare these to the kinds of problems users face and are concerned with in terms of privacy. Based on this analysis of the relative strengths and weaknesses of existing design frameworks we derive a new design framework; STRAP (STRuctured Analysis of Privacy). In STRAP we combine light-weight goal-oriented analysis with heuristics to provide a simple yet effective design framework. We validate our analysis by demonstrating in a series of design experiments that STRAP is more efficient and effective than any one of the existing design frameworks, and provide quantitative and qualitative evidence of the value of using such frameworks as part of the design process.
|
192 |
Timed-Release Proxy Conditional Re-Encryption for Cloud ComputingChen, Jun-Cheng 30 August 2011 (has links)
The mobile technology is being developed very fast and it is a general situation where people can fetch or edit files via the Internet by mobile devices such as notebooks, smart phones, and so on. Due to possible possession of various devices of a user, it may be inconvenient for him to synchronize a file such that he cannot edit the same file via his devices easily. Recently, the cloud technology is becoming more and more popular and there are some new business models launched. One of them is a storage platform Dropbox which can synchronize users' files in their own devices and also allow users to share their files to others. However, Dropbox was indicated that the privacy of the files has not been protected well. Many encryption schemes have been proposed in the literature, but most of them do not support the property of secret file sharing when deploying them in cloud environment. Even though some schemes support the property, they can only provide a file owner to share all of his files with others. In some situations, the file owner may want to ensure that the receiver cannot decrypt the ciphertext until a specified time arrives. The existing encryption schemes cannot achieve these goals simultaneously. Hence, in order to cope with these problems, we propose a timed-release proxy conditional re-encryption scheme for cloud computing. Not only are users¡¦ files stored safely but also each user can freely share a desired file with another user. Furthermore, the receiver cannot obtain any information of the file until the chosen time arrives. Finally, we also demonstrate the security of our proposed scheme via formal proofs.
|
193 |
User¡¦s Risk Management for the Personal Data of the Cloud Computing Service IndustiresHuang, Yen-Lin 06 August 2012 (has links)
With the rapid development of Information Technology, ¡§Cloud Computing¡¨ is becoming increasingly popular in the industry as it is accessible to various data processing services just by connecting to third-party cloud service providers via network. A new global technological trend has thus been ushered as a result of powerful processing, elastic usage and low cost of the cloud computing.
Although ¡§Cloud Computing¡¨ provides a cloud which is more large-scaled, relevant and beneficial, most practical cloud patrons are aware that what matters is its corresponding security. Any who has ever used the Internet, whether an enterprise or an individual, will inevitably run the risks of information recorded, copied, leaked, deleted inappropriately or accidently or even used for inappropriate purposes by third-parties. The private data and business secrets of the stakeholders of an enterprise, including its customers, partners, employees or suppliers, will also suffer from the information vulnerability.
Therefore, as for the cloud computing industry, what matters for the government, enterprise or individual is to provide an information security shelter rather than a network environment in which the personal data is highly exposed. Cavoukin (2010) argues that the issue of information security related to the cloud computing is one of issues in the public domain. The data generated from the digital cloud computing management and the people involved are so large that each citizen is drawn to be concerned with the government policies and laws (Lee, 2010).
In this paper, we make a risk management for the cloud computing and discuss the risk management mechanisms for the cloud computing industry with the Freeman¡¦s stakeholder theory.
|
194 |
The Study of Customer Personal Data ProtectionHuang, Li-Ying 30 August 2005 (has links)
The Study of Customer Personal Data Protection
In this customer-driven era, corporations and government agencies face the challenges from customers. If government and corporations can utilize the power of computers to manage the huge amount of personal data they have collected by storing and editing, data mining and customer relationship management can be put to use on services, customer cares, and marketing. This will increase the efficiency of government agencies and stimulate the development of economy. The government, corporations and the people all will be benefited from this move. However, while the organizations make large investments in the security of their computer systems to avoid the invasion of virus and hackers, the abuse and breach caused by the employees, contractors, and other legal users can compromise all the preventive measures.
This study investigates the performance of customer personal data privacy protection. While discussing the regulations such as computer processing of personal data acts and Telecommunications Acts, the theory on which this study is based is Self-Regulation Mechanism. The Self-Regulation Mechanism can be applied to the self-monitoring, self-esteem, information ethics, and self-efficacy of the users who have access to the customer personal data. It can also be applied to the management of the customer personal data privacy at the organization level. This study gathered 432 valid surveys from the customer personal data users who are the customer service staffs in the telecommunication industry. With path analysis methodology, this study explores the interactions among the management of organization, personal privacy protection self-efficacy, and information ethics. With information ethics and self-efficacy as the intervening variable between the management of organization and protection performance, this study is set to clarify the level of impacts that these three items have over the performance of customer information privacy protection.
Through the model validation, the customer personal data protection self-regulation mechanism proposed in this study demonstrates suitability and the management of organization also shows positive, direct and noticeable impacts. However, the effects of information ethics on privacy protection self-efficacy and those of self-efficacy on the performance of privacy protection are not obvious. Therefore, the organization should strengthen the information ethics of its employees and improve self-efficacy. Also, they should bring up feasible and solid suggestions, hoping to improve the customer personal privacy protection performance of the organization and its members. By doing the customers will have confidence in the organization. Winning the trust and satisfaction from the customers will promote the organization image and even bring in more business opportunities, a good thing for running a long term business.
|
195 |
Data Protection And Intellectual Property In The Eu And TurkeyToguz, Ozlem 01 June 2010 (has links) (PDF)
This research had two main purposes. Firstly it aimed at showing the regulatory framework of both data protection and intellectual property in the European Union and thus making the privacy complications of Digital Rights Managements systems clear in the developed world. This research also aimed at disclosing the complications of employment of DRMs systems in developing countries. To that end Turkey&rsquo / s copyright framework has been reviewed. It was found out that DRMs systems employed in Turkey went beyond the scope of Turkish Copyright Legislation and restricted also legitimate acts which fall within the scope of fair use. DRMs also have hindered development since it restricted availability of educational and cultural works. The review of Turkey&rsquo / s Data Protection regime disclosed that the most important reason behind the non adoption of the draft law was related to the legislators&rsquo / confusion of first pillar and third pillar data protection. It was concluded that Turkey lacked a data protection policy and the lack of such a policy led to the surveillance of the people to such a degree that almost no private space is left for them. The main finding of the research was that Turkey has been one of the best markets for the employment of DRMs with its current copyright regime and lack of data protection rules. The research concluded with proposals of action concerning data protection and DRMs.
|
196 |
Conception et mise en oeuvre de mécanismes sécurisés d'échange de données confidentiellesSeitz, Ludwig Brunie, Lionel. Pierson, Jean-Marc. January 2006 (has links)
Thèse doctorat : Informatique : Villeurbanne, INSA : 2005. / Thèse bilingue français-anglais. Glossaire. Titre provenant de l'écran-titre. Bibliogr. p. 173-183.
|
197 |
Remote data backup system for disaster recovery /Lin, Hua. January 2004 (has links)
Thesis (M.S.)--University of Hawaii at Manoa, 2004. / Includes bibliographical references (leaves 64-66). Also available via World Wide Web.
|
198 |
Technogeopolitics of militarization and security in cyberspaceYannakogeorgos, Panayotis, January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Global Affairs." Includes bibliographical references (p. 225-248).
|
199 |
Distributed learning using generative modelsMerugu, Srujana 28 August 2008 (has links)
Not available / text
|
200 |
An investigation of the information security implementation strategies in further education and training colleges in South AfricaMohlabeng, Moyahabo Rossett January 2014 (has links)
M. Tech. Information Networks / The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in higher education institutions. Research was undertaken to investigate the implementation of information security strategies in higher education institutions in South Africa. This thesis investigates the following: How will the formulation of an information security strategy improve information security in higher education institutions; in what way should higher education institutions employ information security policies in order to improve information security; and how may the adoption of information security framework create information security awareness among employees in higher education institutions?
|
Page generated in 0.0346 seconds