Showing 1 - 10 of 10
Many cities are seeking ways to facilitate the deployment of a wireless metropolitan-area network (WiMAN) based on wifi technology. City leaders must often balance competing goals, including the desire to maximize the area in which wireless services will be available, to maximize competition...
Persistent link: https://www.econbiz.de/10009440975
We used an iterative design process to develop a privacy label that presents to consumers the ways organizations collect, use, and share personal information. Many surveys have shown that consumers are concerned about online privacy, yet current mechanisms to present website privacy policies...
Persistent link: https://www.econbiz.de/10009441119
Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden phrases. Privacy researchers and industry groups have devised several standardized privacy policy formats to address these...
Persistent link: https://www.econbiz.de/10009441120
Due to the ability of cell phone providers to use cell phone towers to pinpoint users’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been developed...
Persistent link: https://www.econbiz.de/10009441121
Earlier work has shown that consumers cannot effectively find information in privacy policies and that they do not enjoy using them. In our previous research on nutrition labeling and other similar consumer information design processes we developed a standardized table format for privacy...
Persistent link: https://www.econbiz.de/10009441143
Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county property assessment database using property owners' names....
Persistent link: https://www.econbiz.de/10009441165
We performed a series of in-depth qualitative interviews with 14 subjects who answered advertisements to participate in a university study about Internet advertising. Subjects were not informed this study had to do with behavioral advertising privacy, but raised privacy concerns on their own...
Persistent link: https://www.econbiz.de/10009441168
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately...
Persistent link: https://www.econbiz.de/10009441201
A proper security architecture is an essential part of implementing robust and reliable networked applications. Security patterns have shown how reoccurring problems can be best solved with proven solutions. However, while they are critical for ensuring the confidentiality, integrity and...
Persistent link: https://www.econbiz.de/10009441305
In many Internet commerce applications buyers can easily achieve anonymity, limiting what a seller can learn about any buyer individually. However, because sellers need to keep a fixed web address, buyers can probe them repeatedly or pool their information about sellers with the information...
Persistent link: https://www.econbiz.de/10009476734