Showing 1 - 10 of 79
about a re-positioning of the mobile phone's role as a communications channel.Design/methodology/approach – The paper draws …
Persistent link: https://www.econbiz.de/10009455020
The concept of privacy has proven difficult to analyze because of its subjective nature and susceptibility to … psychological and contextual influences. This study challenges the concept of privacy as a valid construct for addressing … offer a more reliable and temporally stable measure of privacy-oriented behavior than do snapshots of environmentally …
Persistent link: https://www.econbiz.de/10009475081
still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy …, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy … database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed …
Persistent link: https://www.econbiz.de/10009430800
Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare …. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a … framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous …
Persistent link: https://www.econbiz.de/10009434795
information system privacy issues. The proposed methodology involves identifying the privacy and security issues in each phase …Many new Privacy Laws and Regulations have placed an increased importance on the correct design and implementation of … information systems. This is an attempt to preserve and protect user and information privacy. Incorporating privacy regulations …
Persistent link: https://www.econbiz.de/10009434972
This paper investigates how internet users' perception of control overtheir personal information affects how likely they are to click ononline advertising. The paper uses data from a randomized fieldexperiment that examined the relative effectiveness of personalizing adcopy to mesh with existing...
Persistent link: https://www.econbiz.de/10009435174
. Most systems began with few or no privacy controls and have gradually been adding and enhancing them to meet the demands of … their users. Until recently, for example, Facebook had only a binary notion of privacy - a friend could see everything. This … detriment. There is a need of strong privacy control mechanisms that factor in the dynamic changes in the user context relative …
Persistent link: https://www.econbiz.de/10009439437
used to modify the content or presentation of the web page. Users have demonstrated that they often claim to be privacy …, Gunther, & Spiekermann, 2005). In order to better align the privacy preferences of users to actual practice, a multi … feature in news site choice. With respect to privacy, users do not get substantial information from the privacy policies of …
Persistent link: https://www.econbiz.de/10009439442
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop … techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users …, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what …
Persistent link: https://www.econbiz.de/10009440793
People value their privacy; however, they typically do not make the protection of their privacy a priority. Privacy is … oftentimes not tangible, complicating the efforts of technology users to express and act according to their privacy needs … transactions, or create profiles on online social networks. Companies post privacy policies inform people about their informational …
Persistent link: https://www.econbiz.de/10009441042