Showing 101 - 110 of 1,455
used to modify the content or presentation of the web page. Users have demonstrated that they often claim to be privacy …, Gunther, & Spiekermann, 2005). In order to better align the privacy preferences of users to actual practice, a multi … feature in news site choice. With respect to privacy, users do not get substantial information from the privacy policies of …
Persistent link: https://www.econbiz.de/10009439442
information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of … biometric authentication to protect business and individual assets. The focus is on protecting the privacy of those who legally … security and individual privacy. …
Persistent link: https://www.econbiz.de/10009440774
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop … techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users …, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what …
Persistent link: https://www.econbiz.de/10009440793
information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of … biometric authentication to protect business and individual assets. The focus is on protecting the privacy of those who legally … security and individual privacy. …
Persistent link: https://www.econbiz.de/10009440795
awareness of the implications of these systems for privacy of the individual. The systems are used for identification and … privacy as their implementation has been driven by security issues. The systems that gather this information include video … information that needs to be correctly secured to protect the privacy of the individual. Separately each type of information has …
Persistent link: https://www.econbiz.de/10009440796
Often organizations release and receive medical data with all explicit identifiers, such as name, address, phone number, and Social Security number, removed in the incorrect belief that patient confidentiality is maintained because the resulting data look anonymous; however, we show that in most...
Persistent link: https://www.econbiz.de/10009440982
online rosters provide more privacy than they do. This paper presents RosterFinder, a set of simple algorithms for locating … known names. Privacy implications are discussed using the example of FERPA and online student rosters. …
Persistent link: https://www.econbiz.de/10009440983
Today most organizations release and receive medical data with all explicit identifiers, such as name, address, and phone number, removed in the incorrect belief that patient confidentiality is maintained because the resulting data look anonymous. We examine three computer programs that do...
Persistent link: https://www.econbiz.de/10009440986
Sharing medical data with researchers, economists, policy makers, administrators and other secondary viewers, immediately summons for consideration the dichotomy between the recipient’s needs and disclosure risk. Finding the optimal balance between the suppression of details within the...
Persistent link: https://www.econbiz.de/10009440987
People value their privacy; however, they typically do not make the protection of their privacy a priority. Privacy is … oftentimes not tangible, complicating the efforts of technology users to express and act according to their privacy needs … transactions, or create profiles on online social networks. Companies post privacy policies inform people about their informational …
Persistent link: https://www.econbiz.de/10009441042