Showing 1 - 10 of 15
Persistent link: https://www.econbiz.de/10011301864
proposals for privacy protection, we focus on the question of controlled access to RFID tags. We conclude with a proposal for an …
Persistent link: https://www.econbiz.de/10009467176
Persistent link: https://www.econbiz.de/10011301872
Persistent link: https://www.econbiz.de/10001630096
Persistent link: https://www.econbiz.de/10001679229
Persistent link: https://www.econbiz.de/10001615182
Electronic Commerce environments increasingly witness a conflict on the subject of e-privacy: While marketers want to …
Persistent link: https://www.econbiz.de/10009615417
is user generated. Unless use policies are privacy-friendly, this leaves users vulnerable to privacy risks such as … privacy policies, many users of online services unwillingly agree to privacy-intruding practices. To give users more control … over their privacy, scholars and regulators have pushed for short, simple, and prominent privacy policies. The premise has …
Persistent link: https://www.econbiz.de/10012833692
, the maintenance of privacy (the “right to be let alone”) becomes a subject of increasing concern. The possibility of a … afraid that their privacy may be compromised when surfing the Internet. 60% had avoided a website it in order to protect … their privacy, and 47% sometimes provided false data. Similar results have been obtained in other countries [8]: 30-40% of …
Persistent link: https://www.econbiz.de/10012834097
for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns. One is to kill RFID … (user scheme). The third is to let the network access users' RFID tags while adhering to a privacy protocol (agent scheme …). The perception and reactions of future users to these three privacy enhancing technologies (PETs) are compared in the …
Persistent link: https://www.econbiz.de/10012834113