نتایج جستجو برای: pipeda privacy laws
تعداد نتایج: 100291 فیلتر نتایج به سال:
So far, privacy models follow two paradigms. The first paradigm, termed inferential privacy in this paper, focuses on the risk due to statistical inference of sensitive information about a target record from other records in the database. The second paradigm, known as differential privacy, focuses on the risk to an individual when included in, versus when not included in, the database. The cont...
BY PAUL M. SCHWARTZ AND DANIEL J. SOLOVE T he applicability and scope of many privacy laws around the world depend upon how the term ‘‘personal data’’ is defined. Personal data is often referred to as ‘‘personally identifiable information’’ (PII), and we use the terms interchangeably here. PII is foundational to any privacy regulatory regime in its role of a jurisdictional trigger. In the U.S.,...
Some organizations use software applications to manage their customers’ personal, medical, or financial information. In the United States, those software applications are obligated to preserve users’ privacy and to comply with the United States federal privacy laws and regulations. To formally guarantee compliance with those regulations, it is essential to extract and model the privacy rules fr...
This work was motivated by a discussion that two of the coauthors (computer science professors) had with the other coauthor (a law professor and a former computer crime Trial Attorney at the U.S. Department of Justice), in which it was pointed out that some of the network measurements that the computer scientists were thinking of making might potentially violate Federal laws. Several Federal la...
More than a decade after passage of the Health Insurance Portability and Accountability Act (HIPAA), concerns about the privacy and security of personal health information remain a major policy issue. Now, the emergence of the Nationwide Health Information Network (NHIN) presents deeper underlying privacy challenges, which will require renewed attention from policymakers as federal and state pr...
User-adaptive (or “personalized”) systems on the web cater their interaction to each individual user and provide considerable benefits to both users and web vendors. These systems pose privacy problems, however, since they must collect large amounts of personal information to be able to adapt to users, and often do this in a rather inconspicuous manner. The interaction with personalized systems...
The fields of law and computer science have generated different notions of privacy risks in the context of the analysis and release of statistical data about individuals. Emerging concepts from the theoretical computer science literature provide formal mathematical models for quantifying and mitigating privacy risks. Such models take into account a notion of privacy risk that is substantially b...
Privacy concern continues to grow as online presences become more prevalent through social network sites (SNSs). Significant research has studied the privacy concern construct as it pertains to privacy for information about self, however little research considers a privacy concern for information about others. We hypothesize relationships between both privacy concern for self and others and thr...
The purpose of this essay is to investigate the privacy concerns of Chinese, and to develop relevant protective measures. The groups are divided into two parts by gender and six parts by ages to analyze the different gender and different age groups of privacy concerns. The significance of this study is protecting personal data property. The data of personal information after finishing processin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید