• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1241
  • 167
  • 137
  • 109
  • 83
  • 70
  • 38
  • 38
  • 36
  • 21
  • 18
  • 12
  • 12
  • 12
  • 12
  • Tagged with
  • 2389
  • 643
  • 558
  • 523
  • 509
  • 352
  • 333
  • 308
  • 299
  • 235
  • 235
  • 218
  • 210
  • 199
  • 183
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
821

Införandet av General Data Protection Regulation och dess påverkan på svenska företag / The introduction of General Data Protection Regulation and its impact on Swedish companies

Landström, Peter, Ulvegärde Rombouts, Julia January 2018 (has links)
I dagsläget har en individ väldigt lite kontroll över den persondata som samlas in och hur den används och vem som hanterar den. Detta vill EU ändra på med den nya dataskyddsförordningen General Data Protection Regulation (GDPR) som träder i kraft nästa år. De nya reglerna innefattar en större kontroll för individen över den data som har samlats av företag. Förordningen tvingar företag att strukturera om sina system så de är förenliga med GDPR. Då höga bötesbelopp kan drabba de företag som inte följer reglerna blir alla de som hanterar personuppgifter tvungna att se över sina processer över hanteringen. Uppsatsen har som syfte att undersöka hur väl förberedda svenska medelstora till stora företag är ett år innan införandet av GDPR och hur de arbetar med förändringarna ur ett tekniskt perspektiv, ett organisatoriskt perspektiv samt ur ett juridiskt perspektiv. Med ett teoretiskt fundament som grund genomfördes intervjuer på tre olika företag som hanterar personuppgifter i sina system, både som personuppgiftsansvariga och som personuppgiftsbiträden. Resultatet av studien användes för att designa en utvärderingsmodell som företag kan använda ett år efter införandet av GDPR. Utvärderingen kommer att skapa en överblick på hur väl övergången har gått och om det finns några områden som behöver ytterligare arbete. De slutsatser som drogs var att det fanns en del frågetecken gällande hur de tekniska lösningarna skulle se ut för att vara i linje med GDPR, de juridiska frågorna hanterades till stor del med hjälp av biträdesavtal mellan personuppgiftsansvariga, personuppgiftsbiträden och tredje part. Ur ett organisatoriskt perspektiv var det utbildning av personal och kunskap om GDPR och de ändringar i arbetssätt som detta medför. / At present an individual has very little control over the personal data collected, how it is used and who manages it. This is something the EU wants to change with the new General Data Protection Regulation (GDPR), which will come into force next year. The new regulation includes greater control for the individual regarding the data collected by companies. The Regulation forces companies to restructure their systems so that they are compliant with GDPR. Since high sanctions may affect those companies that do not comply with the rules, all those who handle personal data will have to review the processes that relate to the handling of personal data. The aim of this thesis is to investigate how well prepared Swedish medium to large sized companies are one year before the introduction of GDPR. The thesis focuses on how companies work with the changes from a technical perspective, an organizational perspective and from a legal perspective. With a theoretical foundation as a basis, interviews were conducted on three different companies that handle personal data, both as data controller and as data processor. The result of the study was used to design an evaluation model that companies can use one year after the introduction of GDPR. The evaluation will provide an overview of how well the transition has been and if there are any areas that need further work. There were some uncertainties regarding how the technical solutions would need to be designed and implemented to help the company being compliant with GDPR. The legal issues were largely handled through processing agreements between data controllers, data processors and third parties. The organizational perspective meant training of staff and questions regarding how to raise awareness about GDPR and the changes in working practices.
822

Self-disclosure on Facebook : Social Network Site privacy and personal information disclosure of Germans and Norwegians - A cross-cultural comparison

Schultheiss, Rakel, Kalmer, Nicolas Philipp January 2018 (has links)
Social Network Site (SNS) users’ disclosed personal information is beneficial for marketers, as targeted advertising can be provided accordingly. This study identifies the three privacy concepts of concerns, attitudes and intentions, along with culture (i.e. Hofstede’s masculinity) to be key drivers of users’ self-disclosure on SNSs. Hence, this study evaluates these antecedents and their potential effect on self-disclosure, considering Facebook as the SNS of choice. To account for potential cross-cultural differences, data has been gathered via two online questionnaires, resulting in one German and one Norwegian sample of respondents. Multiple regression analyses were carried to evaluate the antecedents of self-disclosure and one-way ANOVA to examine potential differences amongst Germans and Norwegians. Results indicate that privacy intention is the strongest predictor of self-disclosure on SNSs; whereas privacy concerns and attitudes only reveal an indirect effect on self-disclosure. In addition, significant differences have been found for all of the constructs, indicating that there exist fundamental differences between Germans and Norwegians with regards to their cognitive processing behind personal information disclosure on SNSs.
823

Privacy agents in the IoT : considerations on how to balance agent autonomy and user control in privacy decisions

Colnago, Jessica Helena 20 June 2016 (has links)
Submitted by Alison Vanceto (alison-vanceto@hotmail.com) on 2017-01-16T11:11:48Z No. of bitstreams: 1 DissJHC.pdf: 5301084 bytes, checksum: 69f3b369ca40bc9639ba8d1f296e4d6e (MD5) / Approved for entry into archive by Marina Freitas (marinapf@ufscar.br) on 2017-01-17T12:10:12Z (GMT) No. of bitstreams: 1 DissJHC.pdf: 5301084 bytes, checksum: 69f3b369ca40bc9639ba8d1f296e4d6e (MD5) / Approved for entry into archive by Marina Freitas (marinapf@ufscar.br) on 2017-01-17T12:10:25Z (GMT) No. of bitstreams: 1 DissJHC.pdf: 5301084 bytes, checksum: 69f3b369ca40bc9639ba8d1f296e4d6e (MD5) / Made available in DSpace on 2017-01-17T12:10:32Z (GMT). No. of bitstreams: 1 DissJHC.pdf: 5301084 bytes, checksum: 69f3b369ca40bc9639ba8d1f296e4d6e (MD5) Previous issue date: 2016-06-20 / Não recebi financiamento / This thesis explored aspects that can help balance the level of user control and system autonomy for intelligent privacy agents in the context of the Internet of Things. This proposed balance could be reached considering aspects related to wanting to be interrupted to have control and being able to be interrupted to exert this control. Through literature review of interruption and privacy literature, variables related to these two perspectives were identified. This led to the variable set "Intelligent Privacy Interruptions”. To verify and validate this set, two research actions were performed. The first one was an online survey that allowed us to perform a sanity check that these variables were acceptable in this work’s context. The second was an experience sampling user study with 21 participants that allowed us to better understand how user behavior is informed by these variables. Based on these two interventions it was possible to note that the selected variables seem to show relevance and that they can be used to inform the development and design of privacy agents. The limitations of the partial results notwithstanding, through a quantitative analysis of data collected form the user study and the qualitative analysis of the exit interviews, it was possible to note a common mental process between the participants of the user study when deciding whether to withhold or delegate decision control to the agent. Future studies should be performed to verify the possibility of expansion and creation of a behavior and preference model that can be integrated to the decisionmaking system of intelligent privacy agents. / Este trabalho investigou aspectos que podem ajudar a balancear o nível de controle de usuários e de autonomia de agentes inteligentes de privacidade no contexto da Internet das Coisas. Entende-se que esse balanceamento proposto poderia ser alcançado considerando aspectos relacionados a “querer” ser interrompido para ter controle e “poder” ser interrompido para exercer o controle. Por meio de revisão da literatura de interrupções e privacidade, variáveis relacionadas a esses dois aspectos foram identificadas, embasando a proposta de um conjunto de variáveis para “Interrupções de Privacidade Inteligentes”. Para verificar e validar esse conjunto de variáveis, duas ações de pesquisa foram feitas. A primeira foi um questionário online que serviu como uma verificação inicial de que as variáveis são adequadas ao novo contexto proposto por esse trabalho. A segunda foi um estudo de amostragem de experiência com 21 usuários para se entender melhor como essas variáveis podem vir a informar o comportamento de usuários. Os resultados obtidos sugerem que as variáveis selecionadas apresentam relevância e que podem ser usadas para informar o desenvolvimento e design de agentes de privacidade. Embora os resultados ainda sejam limitados, principalmente pela duração do estudo e grupo e número de usuários, através da análise quantitativa dos dados coletadas no estudo com usuários e da análise qualitativa das entrevistas realizadas pós-estudo notou-se um processo mental comum entre os usuários participantes do estudo para as tomadas de decisão de reter o controle ou delegá-lo ao agente. Estudos futuros devem ser realizados, procurando verificar a possibilidade de expandir o relacionamento das variáveis para a criação de um modelo de comportamento e preferência dos usuários que seja integrável ao sistema de decisão de agentes inteligentes de privacidade.
824

Direito à privacidade da mulher e os direitos humanos

Souza, Albertina dos Santos 26 August 2015 (has links)
Submitted by Geandra Rodrigues (geandrar@gmail.com) on 2018-08-30T11:20:16Z No. of bitstreams: 1 albertinadossantossouza.pdf: 1199932 bytes, checksum: 2d63da0e9aa5dd16d6fb8eaffad18297 (MD5) / Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2018-08-31T11:35:41Z (GMT) No. of bitstreams: 1 albertinadossantossouza.pdf: 1199932 bytes, checksum: 2d63da0e9aa5dd16d6fb8eaffad18297 (MD5) / Made available in DSpace on 2018-08-31T11:35:41Z (GMT). No. of bitstreams: 1 albertinadossantossouza.pdf: 1199932 bytes, checksum: 2d63da0e9aa5dd16d6fb8eaffad18297 (MD5) Previous issue date: 2015-08-26 / PROQUALI (UFJF) / A dissertação trata do direito à privacidade como um direito humano fundamental, e concentra-se na mulher como titular desse direito, constitucionalmente garantido. Indaga-se se a mulher efetivamente usufrui o direito à privacidade, como forma de desenvolver plenamente vida contemplativa, na concepção que lhe empresta Hannah Arendt. Significa pensar que a mulher destina momentos de sua intimidade para que mergulhe na introspecção e possa enriquecer a capacidade cognitiva, refinar o juízo reflexivo, com vistas a ampliar os horizontes para um melhor desempenho na esfera pública. Trata-se de um processo de crescer mental e intelectualmente. Aborda-se o direito de a mulher escolher livremente sobre os assuntos referentes ao seu corpo e a sua vida, analisado sob uma visão do feminismo, que vem descontruindo a dicotomia público/privado por ser, no pensamento político contemporâneo, incapaz de descortinar a questão de gênero. Objetiva-se analisar o direito à privacidade da mulher superando a distinção clássica entre público e privado, e chamando atenção para o tratamento desigual secularmente recebido pela mulher na esfera doméstica. No que tange aos objetivos específicos, procura-se identificar as dificuldades existentes para a mulher obter na plenitude o direito à privacidade, particularmente para a mulher no Brasil, e verificar se este direito é garantido na mesma proporção para homens e mulheres. Serão apresentados argumentos que possam identificar o direito à privacidade da mulher como um direito humano, no espaço reservado às ações privadas, e na intimidade das relações familiares. A metodologia empregada na pesquisa é conceitual, visando a fornecer um arcabouço teórico consistente para refletir sobre o alcance e os limites do direito à privacidade da mulher. / The dissertation concerns about the right of privacy as a fundamental human right, and it focuses on woman as the holder of this right constitutionally guaranteed. It is inquired if the woman effectively uses the right of privacy as a way of developing a contemplative life, according to n Hannah Arendt´s conception. It questions if the woman reserves moments of her intimacy to develop to develop the introspection, and thus enrich her cognitive ability and reflexive judgment in order to broaden the horizons for a better performance in the public sphere. It concerns a process of mental and intellectual growth. It discusses is the right of the woman to freely choose about the subjects that refer to her body and her life, analyzed it under by a feminist perspective , which has been deconstructing the private/public dichotomy in the contemporary political thought as it is unable to reveal the gender issue. The purpose is to analyze the right of the woman to privacy, overcoming the classic distinction between public and private. Moreover, it intends to draw attention to the secular uneven unequal treatment suffered by women in the domestic sphere. About the specific objectives, this dissertation aims to identify the actual difficulties for a woman to obtain the right of privacy, mainly in Brazil, and verify if this right is guaranteed in the same proportion for men and women. Furthermore, it will be present arguments that could identify the right of privacy as a human right for women, in the space reserved to private actions and family intimate relations. The research methodology is conceptual, aiming to supply a consistent theoretical framework for reflecting the reach and the limits of the women's right to privacy.
825

Designing for user awareness and usability : An evaluation of authorization dialogs on a mobile device

Lindegren, Daniel January 2017 (has links)
Personal data is often disclosed with every registration, sharing, or request of an online service. With the increased usage of things connected to the Internet, users' information being collected and stored, the risks related to unknowingly sharing personal data increases. Sharing of personal information is a sensitive subject and can hurt people’s assets, dignity, personal integrity and other social aspects. In general, users’ concerns have grown regarding protecting their personal information which has led to the development of multiple privacy-oriented systems. In scenarios where users are logging onto a website or system, they rarely notice, understand or have desire to read the conditions to which they are implicitly agreeing. These systems are often referred to as identity management systems or single sign-on systems. Recent studies have shown that users are not aware of what data transactions take place by using various authentication solutions. It is critical for these types of system dealing with privacy that researchers examine users' understanding of the concepts through interface design. The purpose of this study is to investigate the usability and user awareness of data transactions for identity management systems on mobile devices by constructing and evaluating different design concepts. Therefore, four different mobile prototypes were designed (called CREDENTIAL Wallet) and explored to measure the usability and also the user awareness of users’ disclosures. 20 usability tests were conducted per prototype. Multiple conclusions can be drawn from this study. The findings showed that the drag-and-drop prototype scored a high user awareness score in terms of participants remembering their shared data and having a good idea of them not sharing more data than they had actually shared. Consequently, the drag-and-drop prototype achieved the highest usability result. A prototype that utilized swiping was created to fit the mobile medium. The prototype showed the highest user awareness score in the context of participants stating what data they had shared. However, people using the swiping prototype thought they were sharing more data than they actually were. Data show that users have an incorrect mental model of the sharing of their fingerprint pattern. Finally, the writing concerns recommendations and challenges of identity management systems – e.g. the importance of tutorial screens. Future studies within the CREDENTIAL project are already underway concerning users' incorrect mental model of sharing fingerprint to the service provider side. / CREDENTIAL
826

Privacy-aware and scalable recommender systems uing sketching techniques / Respect de la vie privée des systèmes de recommandation grâce à l’emploi d’algorithmes à base de sketchs

Balu, Raghavendran 09 November 2016 (has links)
Cette thèse étudie les aspects passage à l’échelle et respect de la vie privée des systèmes de recommandation grâce à l’emploi d’algorithmes à base de sketchs. Les contributions techniques liées à cette étude nous permettent de proposer un système de recommandations personnalisées capable de passer à l’échelle tant en nombre d’utilisateurs qu’en nombre de produits à recommander, tout en offrant une bonne protection de la confidentialité de ces recommandations. La thèse se situe ainsi à la croisée de trois domaines qui sont les systèmes de recommandation, la confidentialité différentielle et les techniques à base de sketchs. Concernant la confidentialité, nous nous sommes intéressés à définir de nouveaux mécanisme garantissant une bonne confidentialité mais aussi à les évaluer. Nous avons pu observer que c’est qui est le paramètre essentiel contrôlant le respect plus ou moins garanti de la confidentialité différentielle. Par ailleurs, le besoin de fonctionner à grande échelle demande de relever les défis liés à la modélisation de très nombreux utilisateurs et à la prise en compte de très nombreux produits à recommander. Ces défis sont particulièrement difficiles à relever dans un contexte où les préférences des utilisateurs et le catalogue de produits évoluent dynamiquement. Cette évolution complexifie les techniques de stockage des profils des utilisateurs, leur mise à jour et leur interrogation. Nos contributions sur cet aspect intéressent non seulement le domaine de la recommandation, mais ont une portée plus générale. Globalement, nous avons mené de nombreuses campagnes d’évaluation de nos propositions, sur des jeux de données réels de très grande taille, démontrant ainsi la capacité de nos contributions à passer à l’échelle tout en offrant de la dynamicité et des garanties sur la confidentialité. / In this thesis, we aim to study and evaluate the privacy and scalability properties of recommender systems using sketching techniques and propose scalable privacy preserving personalization mechanisms. Hence, the thesis is at the intersection of three different topics: recommender systems, differential privacy and sketching techniques. On the privacy aspects, we are interested in both new privacy preserving mechanisms and the evaluation of such mechanisms. We observe that the primary parameter in differential privacy is a control parameter and motivated to find techniques that can assess the privacy guarantees. We are also interested in proposing new mechanisms that are privacy preserving and get along well with the evaluation metrics. On the scalability aspects, we aim to solve the challenges arising in user modeling and item retrieval. User modeling with evolving data poses difficulties, to be addressed, in storage and adapting to new data. Also, addressing the retrieval aspects finds applications in various domains other than recommender systems. We evaluate the impact of our contributions through extensive experiments conducted on benchmark real datasets and through the results, we surmise that our contributions very well address the privacy and scalability challenges.
827

Grounds-Based and Grounds-Free Voluntarily Child Free Couples: Privacy Management and Reactions of Social Network Members

Regehr, Kelly A. 05 1900 (has links)
Voluntarily child free (VCF) individuals face stigmatization in a pronatalist society that labels those who do not want children as deviant. Because of this stigmatization, VCF couples face privacy issues as they choose to reveal or conceal their family planning decision and face a variety of reactions from social network members. Therefore, communication privacy management and communication accommodation theory was use to examine this phenomenon. Prior research found two different types of VCF couples: grounds-based and grounds-free. Grounds-based individuals cite medical or biological reasons for not having children, while grounds-free individuals cite social reasons for not having children. The purpose of this study is to examine how grounds-based and grounds-free VCF couples manage their disclosure of private information and how social network members react to their family planning decision. Findings revealed that grounds-free individuals are more likely to engage in the self-defense hypothesis and grounds-based individuals are more likely to engage in the expressive need hypothesis. Grounds-based individuals were asked about their decision in dyadic situations, whereas grounds-free individuals were asked at group gatherings. Additionally, social network members used under-accommodation strategies the most frequently and grounds-free individuals experienced more name calling than grounds-based. Finally, while grounds-free individuals experienced non-accommodation and over-accommodation strategies, grounds-based did not. Findings suggest that grounds-free individuals are more stigmatized by social network members. Implications for merging CPM and CAT are discussed.
828

Spårningsskydd i webbläsaren : En undersökning av användares inställning till spårningsskydd och faktiska beteende

Nellfors, Alexander, Bergström, Martin January 2021 (has links)
The essay examines whether there is a difference in concern and actual behavior of peopledepending on whether they use tracking protection or not when browsing the web. The thesisis based on previous research on the privacy paradox, information privacy concern andprotection motivation theory. The approach is quantitative with an accompanyingquestionnaire. The answers were collected via a self-developed test environment which at thesame time collected information about any measures the respondents had taken to protectthemselves against tracking. The analysis was made through a correlation analysis betweenthe survey questions to find the survey questions convergent validity. Furthermore, adescriptive analysis was made of the responses from the respondents in each group and aMann-Whitney U test was conducted to see if there were any statistically significantdifferences between the groups. The thesis found that the correlation between the questionswere overall strong, which shows a well-designed research model. The thesis has also foundsigns that privacy paradox is present in certain parameters such as information privacyconcern and percieved vulnerability, while it is not in other parameters such as percievedseverity and response efficacy. The conclusion drawn is that the respondents are aware andconcerned that they could be tracked when they browse the web, but not as many believe thatthe severity is high if one were to be tracked. / Uppsatsen undersöker om det finns skillnad i oro och uppskattning av att hantera denna orohos personer beroende på om de använder spårningsskydd eller ej när de surfar på nätet.Uppsatsen utgår ifrån tidigare forskning kring privacy paradox, information privacy concernoch protection motivation theory. Tillvägagångssättet är kvantitativt med tillhörande enkät.Svaren samlades in via en egenutvecklad testmiljö som samtidigt samlade in information omeventuella åtgärder respondenterna tagit för att skydda sig mot spårning. Analysen gjordesgenom en korrelationsanalys mellan enkätfrågorna för att undersöka frågornas konvergentavaliditet. Samtidigt gjordes en deskriptiv analys av svaren från respondenterna i varje gruppsamt ett Mann-Whitney U test för att se om det uppstod signifikanta skillnader i hurgrupperna svarade på enkäten. Uppsatsen har funnit att korrelationen mellan frågorna överlagär stark, vilket visar på en bra utformad forskningsmodell. Uppsatsen har även funnit att detfinns tecken på att privacy paradox är närvarande vid vissa parametrar, såsom informationprivacy concern och percieved vulnerability medans den inte är det hos andra parametrar sompercieved severity och response efficacy. Slutsatsen som dras är att respondenterna kännermedvetenhet och oro för att spåras när de surfar på nätet men inte lika många anser attallvarlighetsgraden är hög om man skulle bli spårad.
829

Informační chování žáků 8. a 9. tříd ve vztahu k ochraně vlastního soukromí na sociálních sítích / Information behavior of 8th and 9th grade pupils in relation to the protection of their own privacy on social networks

Filipová, Helena January 2021 (has links)
i Abstract This diploma thesis deals with the information behavior of the pupils in the 8th and 9th grades of primary schools in relation to the protection of their own privacy on the social networks Facebook and Instagram. The aim of the work is to find out: - how pupils are interested in the issue of protecting their privacy on these networks and where they get this information from (parents, school), - if they are aware of the associated risks and how they take them into account in their behavior, - whether they know the tools available to them on these networks, - how the above affects their manners on selected social networks in terms of content and form of shared information. The theoretical part of the thesis deals mainly with the characteristics of selected social networks Facebook and Instagram in terms of privacy protection against possible threats. The practical part presents the results of quantitative research, which was carried out in the form of a questionnaire among 8th and 9th grade elementary school students.
830

Extended Abstracts of the Fourth Privacy Enhancing Technologies Convention (PET-CON 2009.1)

Köpsell, Stefan, Loesing, Karsten 21 February 2012 (has links)
PET-CON, the Privacy Enhancing Technologies Convention, is a forum for researchers, students, developers, and other interested people to discuss novel research, current development and techniques in the area of Privacy Enhancing Technologies. PET-CON was first conceived in June 2007 at the 7th International PET Symposium in Ottawa, Canada. The idea was to set up a bi-annual convention in or nearby Germany to be able to meet more often than only once a year at some major conference.

Page generated in 0.1268 seconds