“Strongly Recommended” Revisiting Decisional Privacy to Judge Hypernudging in Self-Tracking Technologies
نویسندگان
چکیده
منابع مشابه
Privacy Enhancing Technologies for Privacy Enhancing Technologies
This work contributes to the field of unlinkability. Unlinkability describes a situation where attackers are unable to correctly cluster items of interest. The focus of this work is on modelling and measuring unlinkability. Additionally a protocol for provision of unlinkable certificates, tailored to the requirements of vehicular communication is introduced. The vehicular scenario is used throu...
متن کاملPrivacy Enhancing Technologies in Biometrics
In the recent past we have witnessed the rapid spreading of biometric technologies for automatic people authentication, due to the several inherent advantages they offer over classic methods. Biometrics can be defined as the analysis of physiological or behavioral people characteristics for automatic recognition purposes. Biometric authentication relies on who a person is or what a person does,...
متن کاملPrivacy and Location Technologies
Location technologies challenge user’s privacy, wherefore several technical solutions have been proposed to mitigate real and potential problems. To adequately deal with the complexities of privacy, I suggest that a greater analytical understanding and conceptual clarity is needed as well. I discuss briefly how privacy could be conceptualized more productively; how ICT in general influences pri...
متن کاملXIII Privacy - Enhancing Technologies
Privacy-enhancing technologies (PETs), which constitute a wide array of technical means for protecting users’ privacy, have gained considerable momentum in both academia and industry. However, existing surveys of PETs fail to delineate what sorts of privacy the described technologies enhance, which in turn makes it difficult to differentiate between the various PETs. Moreover, those surveys cou...
متن کاملRevisiting "Privacy Preserving Clustering by Data Transformation"
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The challenge is how to protect the underlying data values subjected to clustering without jeopardizing the similarity between objects under analysis. In this short paper, we revisit a family of geometric data transformation methods (GDTMs) that distort numerical attributes by translations, scalings,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Philosophy & Technology
سال: 2018
ISSN: 2210-5433,2210-5441
DOI: 10.1007/s13347-018-0316-4