نتایج جستجو برای: personal privacy

تعداد نتایج: 189720  

Journal: :Information Management & Computer Security 2009

2016
Cynthia Cheung Matthew J. Bietz Kevin Patrick Cinnamon S. Bloss

INTRODUCTION Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopt...

2014
Luvai Motiwalla Xiaobai Li Xiaoping Liu

Information privacy paradox is of great interest to IS researchers and firms gathering personal information. This paradox has been found by IS researchers from social, behavioral, and economic aspects independently. However, there is a lack of study that examines the degrees of influence that different factors contribute to the privacy paradox problem. We combine both economic and social perspe...

Journal: :CoRR 2015
Gregg Martin Hritik Gupta Stephen C. Wingreen Annette Mills

Information privacy has gained increased attention in recent years. This paper focuses on a particular aspect of privacy, i.e., personal information privacy. In this paper a conceptual framework is developed based Westin’s theory of Personal Information Privacy (PIP). Concourse theory and Q-methodology was used alongside the literature and the New Zealand Privacy Act 1993 to develop a Q-sort qu...

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

Journal: :Sig. Proc.: Image Comm. 2016
Slobodan Ribaric Aladdin M. Ariyaeeinia Nikola Pavesic

Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio–video surveillance. Each of these can potentially provide the means for privacy in...

2012
Kristian Beckers Maritta Heisel

Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still states a useful functionality. We present privac...

2017
Hui Zhao Haoxin Dong H. Zhao H. X. Dong

The purpose of this essay is to investigate the privacy concerns of Chinese, and to develop relevant protective measures. The groups are divided into two parts by gender and six parts by ages to analyze the different gender and different age groups of privacy concerns. The significance of this study is protecting personal data property. The data of personal information after finishing processin...

Journal: :Healthcare policy = Politiques de sante 2013
Vanessa K Noonan Nancy P Thorogood Phalgun B Joshi Michael G Fehlings B Catharine Craven Gary Linassi Daryl R Fourney Brian K Kwon Christopher S Bailey Eve C Tsai Brian M Drew Henry Ahn Deborah Tsui Marcel F Dvorak

Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry...

2010
Marco Casassa Mont Siani Pearson Sadie Creese Michael Goldsmith Nick Papanikolaou

This paper proposes a conceptual model for privacy policies that takes into account privacy requirements arising from different stakeholders, with legal, business and technical backgrounds. Current approaches to privacy management are either high-level, enforcing privacy of personal data using legal compliance, risk and impact assessments, or low-level, focusing on the technical implementation ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید