Spelling suggestions: "subject:"privacy"" "subject:"eprivacy""
261 |
Protect Data Privacy in E-Healthcare in SwedenAn, Nan January 2007 (has links)
<p>Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. This thesis gives a brief description of the background of healthcare in Sweden and ICT adoption in healthcare, introduces an Information system security model, describes the technology and law about data privacy and carries out a case through questionnaire and interview.</p>
|
262 |
PRIVACY AND IDENTITY MANAGERMENT ON SOCIAL NETWORKING SITES WITH REFRENCE TO FACEBOOKAgadagba, Kelvin Yoreme January 2011 (has links)
According to Nicole B. Ellison and Danah M. Boyd in their article on “Social network sites: Definition, History, and Scholarship”, they defined Social Networking Sites as “Web-based services that allow individuals to (1) Construct a public or semi-public profile within a bounded system, (2) Articulate a list of other users with whom they share a connection, and (3) View and traverse their list of connections and those made by others within the system”( 2007). In other words, Social Networking Sites (SNSs) are websites that are designed to simplify communication between users who share similar activities, attitudes and interests. Today the growth and role of social networking sites has become an issue not only for the users themselves but also for scholars and industrial researchers. My aim in this research will be to explore Social Networking Sites in general. The concept of Social Networking Sites is very broad; therefore my main study will be dealing primarily with how privacy and restrictions plays a role in identity management with reference to Facebook.
|
263 |
CUDIA : a probabilistic cross-level imputation framework using individual auxiliary information / Probabilistic cross-level imputation framework using individual auxiliary informationPark, Yubin 17 February 2012 (has links)
In healthcare-related studies, individual patient or hospital data are not often publicly available due to privacy restrictions, legal issues or reporting norms. However, such measures may be provided at a higher or more aggregated level, such as state-level, county-level summaries or averages over health zones such as Hospital Referral Regions (HRR) or Hospital Service Areas (HSA). Such levels constitute partitions over the underlying individual level data, which may not match the groupings that would have been obtained if one clustered the data based on individual-level attributes. Moreover, treating aggregated values as representatives for the individuals can result in the ecological fallacy. How can one run data mining procedures on such data where different variables are available at different levels of aggregation or granularity? In this thesis, we seek a better utilization of variably aggregated datasets, which are possibly assembled from different sources. We propose a novel "cross-level" imputation technique that models the generative process of such datasets using a Bayesian directed graphical model. The imputation is based on the underlying data distribution and is shown to be unbiased. This imputation can be further utilized in a subsequent predictive modeling, yielding improved accuracies. The experimental results using a simulated dataset and the Behavioral Risk Factor Surveillance System (BRFSS) dataset are provided to illustrate the generality and capabilities of the proposed framework. / text
|
264 |
Facebook forever : privacy, preservation and social networking recordsBlaha, Craig Erben 23 September 2013 (has links)
For the first time in history one billion subscribers are creating records using a single software platform: Facebook. Subscribers create historically significant Facebook records every day, yet there is no concerted effort to preserve these records. Archivists do not agree on whether or how these records will continue to exist, nor do they agree on the best way to preserve these records. At the same time, privacy advocates are concerned that social networking records will continue to exist "forever" and therefore have serious privacy implications. In this study I examine the seemingly opposing viewpoints of privacy scholars and archivists. I find that privacy scholars are concerned that the lack of subscriber control over social networking records threatens privacy over time. Archivists address this lack of control through the concepts of donor agreements and the trusted digital repository, but the application of these concepts to the long-term preservation of Facebook records depends on who will preserve these records. I explore four different ways Facebook records may be preserved. I examine whether the U.S. federal government can and should play a role in encouraging Facebook to preserve records. I find that the U.S. federal government is unlikely to take action. I take a first step in empirically examining the likelihood that individual Facebook subscribers will preserve their own records using both an online survey (n = 144) and focus group to ask Facebook subscribers what they expect to happen to their Facebook records. I find that Facebook subscribers do not trust Facebook, do not think about preservation when they use Facebook, and do not expect their Facebook records to exist forever. This research makes four contributions to existing literature: a discussion of the value of social networking records and whether they should be preserved, a close examination of the differing opinions of archivists and privacy scholars about these records, a discussion of the role public policy might play in the preservation of Facebook records and privacy in the United States, and an empirical exploration of the attitudes and behaviors of a small group of Facebook subscribers related to preservation and privacy. / text
|
265 |
Collaborative mobile servicesDong, Wei, active 2013 26 September 2013 (has links)
Mobile devices like smartphones and tablets are being adopted with unprecedented speed. The growth in demand and system complexity increasingly requires collaboration of multiple parties in order to achieve better functionality, efficiency, performance, etc. This poses unique challenges such as information sharing among different parties, utility sharing among different parties, and dishonest and collusive behaviors. Different mobile services may require different types of collaboration and involve different entities in the system. In this work we take a bottom-up approach by first looking at collaboration at the end user level, then the cross level collaboration and finally at the service provider level. Specifically, we first consider a completely distributed service: friend discovery in mobile social networks, where users of a mobile social network work together with each other to discover potential new friends nearby by computing their social proximity. We develop mathematically sound yet highly efficient approaches that simultaneously achieve privacy and verifiability. We then focus on cellular offloading where a cellular service provider seeks third party resource to offload cellular demand, as an example of cross level collaboration. We propose a reverse auction framework: iDEAL, which efficiently allocates cellular resource and third party resource in a joint optimization, effectively incentivize third party resource owners and mitigates dishonest and collusive behaviors. We validate our findings and approaches with real trace driven analysis and simulation, as well as real implementation. Finally we focus on collaboration at the service provider level and propose a double auction framework - DA². DA² allows cellular service providers to reallocate spectrum resource in a dynamic fashsion. It preserves all the desired economic properties. Compared with existing spectrum double auctions, DA² achieves higher efficiency, revenue, and spectrum resource utilization, due to its ability to more accurately capture the competition among buyers, which is characterized by a complex conflict graph. We evaluate DA² and demonstrate its superior performance via simulations on conflict graphs generated with real cell tower locations. / text
|
266 |
Ηλεκτρονικό εμπόριο και διασφάλιση της ιδιωτικότηταςΒαβάτσικος, Βασίλειος 21 July 2015 (has links)
Η παρακάτω εργασία έχει τίτλο “Ηλεκτρονικό εμπόριο και διασφάλιση της ιδιωτκότητας”. Συγκεκριμένα, αποτελείται από τέσσερα κεφάλαια. Το πρώτο κεφάλαιο αποτελεί μια εισαγωγή στο ηλεκτρονικό εμπόριο. Στο δεύτερο κεφάλαιο, γίνεται αναφορά στις ηλεκτρονικές συναλλαγές καθώς και στους τρόπους με τους οποίους διασφαλίζονται. Στο τρίτο κεφάλαιο γίνεται μια ανάλυση της έννοιας ιδιωτικότητα καθώς και μια συσχέτιση με το ηλεκτρονικό εμπόριο. Τέλος, στο τελευταίο κεφάλαιο της εργασίας αυτής περιγράφεται μια εκτενή ανάλυση των ηλεκτρονικών πληρωμών. / The following work is titled "Electronic commerce and ensure privacy". In particular, consists of four chapters. First chapter is an introduction to electronic commerce. Second chapter refers to electronic transactions and to the ways in which are secured. In the third chapter is made an analysis of the concept of privacy as well as a correlation with e-commerce. Finally, in the last chapter of this work is an extensive analysis of electronic payments.
|
267 |
Computers, data banks and the preservation of privacyBergman, Kenneth Leland, 1949- January 1975 (has links)
No description available.
|
268 |
Privacy and Security Attitudes, Beliefs and Behaviours: Informing Future Tool DesignWeber, Janna-Lynn 24 August 2010 (has links)
Usable privacy and security has become a significant area of interest for many people in both industry and academia. A better understanding of the knowledge and motivation is an important factor in the design of privacy and security tools. However, users of these tools are a heterogeneous group, and many past studies of user characteristics in the security and privacy domain have looked only at a small subset of factors to define differences between groups of users.
The goal of this research is to critically look at the difference between people, their opinions and habits when it comes to issues of privacy and security. To address this goal, 32 in-depth qualitative interviews were conducted and analyzed to look at the heterogenous nature of this community.
The participant’s attitudes and actions around the dimensions of knowledge about tools and of motivation for self-protection were used to cluster participants. The traits of these participant clusters are used to create a set of privacy and security personas, or prototypical privacy and security tool users. These personas are a tool for incorporating a broader understanding of the diversity of users into the design of privacy and security tools.
|
269 |
The costs of bonding: negotiating personal information disclosure among Millennials and Boomers on FacebookCallegher, Jonathan January 2013 (has links)
Since early 2010, Facebook.com, the world’s most popular social network site (SNS), has come under a storm of media criticism over the commercial use of its users’ personal information. Yet even as more became known about the fact that Facebook sells publicly shared information to companies for advertising purposes, two years later the SNS amassed one billion members in October 2012.
Based on in-depth interviews 30 Millennials (18 to 32-year olds) and 10 Boomers (48 to 58-year olds) that are daily users of Facebook, this dissertation provides a qualitative analysis of attitudes toward privacy and personal information disclosure on Facebook. What steps—if any—are being taken by users to regulate their personal information disclosure? How do users feel about the website selling their personal information to advertisers? What are the benefits of using Facebook and do they outweigh the risks of having one’s information used for commercial purposes? Or is it even seen as a risk at all? What are the sociological implications of users’ answers to these questions?
I challenge prevailing conclusions that the intensity of Facebook use is associated with higher levels of social capital and that Facebook is especially useful for maintaining and building bridging ties to one’s acquaintances. On the contrary, among Millennials in my study, the website is used for maintaining bonding ties between close friends and family members, not bridging ties between acquaintances; that the maintaining of bridging social capital is by comparison merely a passive benefit. As well, while the Boomers in my study use Facebook to maintain bridging ties, maintaining social capital is not a consideration. In arriving at this conclusion, I thematically broke out the benefits of using Facebook as Facebook is my life online, Facebook is my primary connection to others, and Facebook is a convenient communication and information tool. As well, the perceived risks of using Facebook involve a lack of privacy and, to a lesser extent, issues of control. For the Millennials and Boomers in my study, the practical benefits of using Facebook outweigh the perceived risks, and the perception of control on the user’s part is a key factor in rationalizing their ongoing use of the website.
As a practical application of my findings, I propose how the marketing research industry might apply these findings toward learning more about consumers.
|
270 |
Electronic surveillance and the prospects for privacy in Canada's private sector by the year 2000Yamashita, Miyo. January 1998 (has links)
This dissertation is concerned with surveillance, which refers to the monitoring and supervision of populations for specific purposes. Of special interest we the ways in which new technologies are augmenting the power of surveillance in the late twentieth century, and therefore influencing the privacy debate. Three things are noted about this. First, large-scale surveillance by bureaucratic organizations is a product of modernity, not of new technologies. This is evident from Part I of the dissertation, which argues that increased surveillance capacity comes as a result of specific economic and political circumstances that favour the use of technological systems of particular kinds, which invariably feature enhanced capacities. Second, surveillance has two faces; advantages appear alongside serious disadvantages. This is also evident in Part I of the dissertation which suggests that much surveillance theory is dystopian and therefore, an incomplete paradigm. Finally, new technologies facilitate some major magnification of surveillance power; some even argue that they change its character qualitatively. As such, privacy features prominently alongside discussions of electronic surveillance. This is evident in the final two parts of the dissertation which evaluate privacy as a strategy for limiting electronic surveillance. In this regard, Part II examines technical challenges to electronic surveillance, expressed through privacy law in particular, and Part III analyses mobilization challenges, which have to do with the role played by social movements in attempting to bring about broader-based change than mere legislation. Throughout the dissertation, the argument is made that surveillance has become a central feature of contemporary advanced societies and as such, it should be a major concern of both social analysis and political action. This is why the dissertation is divided into distinct, but overlapping, parts, with the first part focusing on social and critical
|
Page generated in 0.0432 seconds