Spelling suggestions: "subject:"data privacy"" "subject:"mata privacy""
31 |
Data Security and Privacy under the Binary CloakJi, Tianxi 26 August 2022 (has links)
No description available.
|
32 |
Towards a Better Understanding of User`s Information in Electronic-Mentalhealth ServicesAtuhaire, Eutaxy Neri January 2022 (has links)
Information Technology has enabled the increase of virtual business particularly towards mental health. Most health institutions have adopted using the internet to aid users get much needed help from different geographical areas. With the increase in availability of the internet, applications and websites in plenty have sprouted up due to this factor; data usage and that generated has in turn also increased carrying along with its challenges towards the data privacy of consumers’ information in electronic mental health inclusive of third party access to user data. Based on the literature review, evidence of data sharing to third parties and weak privacy policies from the e-mental health applications is illustrated, alongside its challenges and some solutions towards ensuring the privacy of user information. This area has also illustrated the different governing data privacy policies in United Kingdom both before and post-Brexit. The purpose of this thesis is to assess how the present data handling techniques are affecting user data, while citing the positive and negative outcomes of using these platforms inclusive of the relevant future recommendations towards the best practices towards ensuring data privacy of user information in electronic-mental health services.
|
33 |
Studies on Privacy-Aware Data Trading / プライバシーを考慮したデータ取引に関する研究Zheng, Shuyuan 25 September 2023 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第24933号 / 情博第844号 / 新制||情||141(附属図書館) / 京都大学大学院情報学研究科社会情報学専攻 / (主査)教授 伊藤 孝行, 教授 鹿島 久嗣, 教授 岡部 寿男, 阿部 正幸(NTT社会情報研究所) / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DGAM
|
34 |
A Jagged Little Pill: Ethics, Behavior, and the AI-Data NexusKormylo, Cameron Fredric 21 December 2023 (has links)
The proliferation of big data and the algorithms that utilize it have revolutionized the way in which individuals make decisions, interact, and live. This dissertation presents a structured analysis of behavioral ramifications of artificial intelligence (AI) and big data in contemporary society. It offers three distinct but interrelated explorations. The first chapter investigates consumer reactions to digital privacy risks under the General Data Protection Regulation (GDPR), an encompassing regulatory act in the European Union aimed at enhancing consumer privacy controls. This work highlights how consumer behavior varies substantially between high- and low-risk privacy settings. These findings challenge existing notions surrounding privacy control efficacy and suggest a more complex consumer risk assessment process. The second study shifts to an investigation of historical obstacles to consumer adherence to expert advice, specifically betrayal aversion, in financial contexts. Betrayal aversion, a well-studied phenomenon in economics literature, is defined as the strong dislike for the violation of trust norms implicit in a relationship between two parties. Through a complex simulation, it contrasts human and algorithmic financial advisors, revealing a significant decrease in betrayal aversion when human experts are replaced by algorithms. This shift indicates a transformative change in the dynamics of AI-mediated environments. The third chapter addresses nomophobia – the fear of being without one's mobile device – in the workplace, quantifying its stress-related effects and impacts on productivity. This investigation not only provides empirical evidence of nomophobia's real-world implications but also underscores the growing interdependence between technology and mental health. Overall, the dissertation integrates interdisciplinary theoretical frameworks and robust empirical methods to delineate the profound and often nuanced implications of the AI-data nexus on human behavior, underscoring the need for a deeper understanding of our relationship with evolving technological landscapes. / Doctor of Philosophy / The massive amounts of data collected online and the smart technologies that use this data often affect the way we make decisions, interact with others, and go about our daily lives. This dissertation explores that relationship, investigating how artificial intelligence (AI) and big data are changing behavior in today's society. In my first study, I examine how individuals respond to high and low risks of sharing their personal information online, specifically under the General Data Protection Regulation (GDPR), a new regulation meant to protect online privacy in the European Union. Surprisingly, the results show that changes enacted by GDPR, such as default choices that automatically select the more privacy-preserving choice, are more effective in settings in which the risk to one's privacy is low. This implies the process in which people decide when and with whom to share information online is more complex than previously thought. In my second study, I shift focus to examine how people follow advice from experts, especially in financial decision contexts. I look specifically at betrayal aversion, a common trend studied in economics, that highlights individuals' unwillingness to trust someone when they fear they might be betrayed. I examine if betrayal aversion changes when human experts are replaced by algorithms. Interestingly, individuals displayed no betrayal aversion when given a financial investment algorithm, showing that non-human experts may have certain benefits for consumers over their human counterparts. Finally, I study a modern phenomenon called 'nomophobia' – the fear of being without your mobile phone – and how it affects people at work. I find that this fear can significantly increase stress, especially as phone-battery level levels decrease. This leads to a reduction in productivity, highlighting how deeply technology is intertwined with our mental health. Overall, this work utilizes a mix of theories and detailed analyses to show the complex and often subtle ways AI and big data are influencing our actions and thoughts. It emphasizes the importance of understanding our relationship with technology as it continues to evolve rapidly.
|
35 |
E-Health data risks & protection for public cloud : An elderly healthcare usecase for Swedish municipalityDhyani, Deepak January 2023 (has links)
Organizations are increasingly adopting the cloud to meet their business goals more cost-effectively. Cloud benefits like scalability, broad access, high availability, and cost-effectiveness provide a great incentive for organizations to move their applications to the cloud. However, concerns regarding privacy data protection remain one of the top concerns for applications migrating to the cloud. With various legislations and regulations mandating organizations to protect personal data, it is required that cloud applications and associated infrastructure are designed in a manner that provides adequate data protection. To achieve this there is a need to understand various data protection legislations, regulations, and risks faced by the cloud applications and various security controls that can be put in place to address those. Smart homes equipped with health monitoring systems have the potential to monitor the health of elderly people in their homes. In such homes, sensors are employed to monitor the activity of individuals and leverage that information to detect anomalies and raise alarms to the caretakers. However, hosting such a system in the cloud has potential privacy impacts, since health data is treated as sensitive privacy data in many regulations. This thesis is conducted based on a use case of the deployment of an elderly health care monitoring system for municipalities in Sweden. I analyzed various regulations and privacy risks in migrating such a health monitoring system to the public cloud, the regulations captured are specific to the use case where the e-health data of Swedish citizens is captured in the cloud. The study also highlights various data protection approaches that can be employed to address the identified concerns. In the thesis, I highlighted that data residency, data control, and the possibility of data leakage from the public cloud are among the top concerns for the municipality. I also listed various applicable data protection regulations and legislation, with “Swedish law for public access to information and secrecy” having a crucial influence on privacy data storage. I evaluated various data protection approaches to alleviate the above concerns, which include access control, anonymization, data splitting, cryptographic measures, and leveraging public cloud capabilities.
|
36 |
An analysis of the Privacy Policy of Browser ExtensionsZachariah, Susan Sarah January 2024 (has links)
Technological advancement has transformed our lives by bringing unparalleled convenience and efficiency. Data, particularly consumer data, essential for influencing businesses and developing personalized experiences, is at the heart of this transition. Companies may improve consumer satisfaction and loyalty by using data analysis to customize their products and services. However, the collection and utilization of consumer data raise privacy concerns. Protecting customers’ personal information is essential to maintaining trust, respecting individual autonomy, and preventing unauthorized access or misuse. Along with the protection of data, transparency is also another essential factor. When companies or organizations deal with users’ data, they are liable to inform these users of anything and everything that happens with their data. Our study focuses on the online privacy policies of Google Chrome browser extensions. We have tried to find the extensions that comply with the data protection guidelines and if all Google Chrome browser extensions are transparent enough to mention the details as per guidelines. Utilizing the power of Natural Language Processing (NLP) techniques, we have employed advanced methodologies to extract insights from these policies.
|
37 |
Public knowledge of digital cookies : Exploring the design of cookie consent formsGröndahl, Louise January 2020 (has links)
Forms for consent regarding the use of digital cookies are currently used by websites to convey the information about the use of digital cookies on the visited website. However, the design of these consent forms is not entirely right according to the directives of the General Data Protection Regulation and also not optimal seen from a user's perspective. They often lack options and the informational text is often too brief within the form. As a user, that might make it difficult to understand what it is you accept and what the consequences could be for your personal data. Based on the directives given for the digital cookie consent form, it becomes clear that many do not meet the requirements. The question therefore arise, which factors make a cookie consent form successful, concerning how well a user understands the content and is aware of his/her choice of action? To answer that question, a quantitative- and a qualitative study was conducted. The quantitative study examined people's current understanding and perception about digital cookie forms. The results of that study were then used in the qualitative study to develop prototypes producing new cookie consent forms which were then examined with a usability test. The study presents five factors that contribute to a cookie consent form to be considered successful from the user's perspective in understanding the content and making an active choice. These factors are text, options, full-page consent form, active choice and trustworthiness. These five factors can independently increase the user experience of a form, although, all should be accounted for for better results. The various factors together contribute to a form that complies with different directives and laws, but above all, helps users get a better experience of understanding what they approve of and the feeling of making an active choice. / Formulär för samtycke till användandet av digitala kakor (cookies) används idag av hemsidor för att förmedla informationen om användningen av digitala kakor på den besökta hemsidan. Utformningen av dessa samtyckesformulär är däremot inte alltid helt korrekta enligt direktiven från the General Data Protection Regulation och inte heller optimala sett utifrån en användares perspektiv. De saknas ofta valmöjligheter och information är ofta kortfattad inom formuläret. Som användare, kan det därför vara svårt att förstå vad det är man godkänner och vilka konsekvenser det innebär för ens personliga data. Utifrån de direktiv som ges för utformningen av formulären för samtycke till användandet av digitala kakor blir det tydligt att många inte uppnår kraven. Frågan blir därför vilka faktorer som gör att ett formulär blir framgångsrikt i den aspekt att användaren förstår innehållet och är medveten om sitt val? För att svara på denna fråga gjordes en kvantitativ studie och en kvalitativ studie. Den kvantitativa studien undersökte människors nuvarande förståelse och känsla om formulär för digitala kakor. Resultatet användes denna studie använde sedan i den kvalitativa studien i form av prototyper föreställande nya formulär som sedan undersöktes i ett användartest. Studien resulterade i att fem faktorer visade sig vara avgörande för att ett samtyckesformulär för digitala kakor ska anses framgångsrikt utifrån användarens perspektiv med att förstå innehållet och göra ett aktivt val. Dessa faktorer är, text, alternativ, heltäckande sida av formulär, aktivt val och pålitlighet. Dessa fem faktorer kan enskilt förhöja användarupplevelsen av ett formulär, dock bör man ta hänsyn till alla för ett bästa resultat. De olika faktorerna bidrar tillsammans till ett formulär som följer olika direktiv och lagar men framförallt bidrar till att användarna får en bättre upplevelse med att förstå vad de godkänner och känslan av att göra ett medvetet val.
|
38 |
Private and Secure Data Communication: Information Theoretic ApproachBasciftci, Yuksel O., Basciftci January 2016 (has links)
No description available.
|
39 |
Search over Encrypted Data in Cloud ComputingWang, Bing 25 June 2016 (has links)
Cloud computing which provides computation and storage resources in a pay-per-usage manner has emerged as the most popular computation model nowadays. Under the new paradigm, users are able to request computation resources dynamically in real-time to accommodate their workload requirements. The flexible resource allocation feature endows cloud computing services with the capability to offer affordable and efficient computation services. However, moving data and applications into the cloud exposes a privacy leakage risk of the user data. As the growing awareness of data privacy, more and more users begin to choose proactive protection for their data in the cloud through data encryption. One major problem of data encryption is that it hinders many necessary data utilization functions since most of the functions cannot be directly applied to the encrypted data. The problem could potentially jeopardize the popularity of the cloud computing, therefore, achieving efficient data utilization over encrypted data while preserving user data privacy is an important research problem in cloud computing.
The focus of this dissertation is to design secure and efficient schemes to address essential data utilization functions over encrypted data in cloud computing. To this end, we studied three problems in this research area. The first problem that is studied in this dissertation is fuzzy multi-keyword search over encrypted data. As fuzzy search is one of the most useful and essential data utilization functions in our daily life, we propose a novel design that incorporates Bloom filter and Locality-Sensitive Hashing to fulfill the security and function requirements of the problem. Secondly, we propose a secure index which is based on the most popular index structure, i.e., the inverted index. Our innovative design provides privacy protection over the secure index, the user query as well as the search pattern and the search result. Also, users can verify the correctness of the search results to ensure the proper computation is performed by the cloud. Finally, we focus ourselves on the privacy-sensitive data application in cloud computing, i.e., genetic testings over DNA sequences. To provide secure and efficient genetic testings in the cloud, we utilize Predicate Encryption and design a bilinear pairing based secure sequence matching scheme to achieve strong privacy guarantee while fulfilling the functionality requirement efficiently. In all of the three research thrusts, we present thorough theoretical security analysis and extensive simulation studies to evaluate the performance of the proposed schemes. The results demonstrate that the proposed schemes can effectively and efficiently address the challenging problems in practice. / Ph. D.
|
40 |
Consumer Motivation and the Privacy ParadoxMerians Penaloza, Diane, 0000-0002-1362-4192 05 1900 (has links)
There is a gap between intention and action that people experience when faced with protecting their digital data privacy. Known as the privacy paradox, it is the idea that what a person says they believe (protecting their data privacy is paramount) is not reflective of how they act (relinquishing their data privacy). In other words, what people express about their data privacy is often in opposition to the frequency with which they relinquish their data privacy. The research intends to examine the privacy paradox and consists of two studies, one qualitative and one quantitative. First, focus groups were held, the outcome of which was an attempt at the creation of a typology of words and phrases that consumers use relative to their data privacy. Second, an experiment using Likert scales and Pareto-optimal choice-based conjoint analysis was created based on the typology created in study one, giving insight into what consumers feel are motivators towards protecting or relinquishing their data privacy. The contribution is filling a gap in the existing literature related to the privacy paradox through an analysis of behavior. / Business Administration/Marketing
|
Page generated in 0.0407 seconds