Search results for "PRIVACY"

showing 10 items of 402 documents

de-Linkability: a Privacy-Preserving Constraint for Safely Outsourcing Multimedia Documents

2013

International audience; Outsourcing social multimedia documents is a growing practice among several companies in a way to shift their business globally. It is a cost-effective process where those companies tend to gain more profits disregarding eventual privacy risks. In fact, several case studies have showed that adversaries are capable of identify-ing individuals, whose identities need to be kept private, using the content of their multimedia documents. In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify the in-dividual. We also provide a sanitizing MD * -algorithm to enforce de-linkability…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB][ INFO ] Computer Science [cs][INFO.INFO-WB] Computer Science [cs]/Web[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM][SCCO.COMP]Cognitive science/Computer scienceMultimedia Documentsde-Linkability[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][SCCO.COMP] Cognitive science/Computer sciencePrivacy[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR][ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]
researchProduct

THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit

2011

International audience; The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users' personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects' heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model's related information and multimedia objects data. To specify s…

[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Multimedia Security[SCCO.COMP] Cognitive science/Computer science[ SCCO.COMP ] Cognitive science/Computer science[SCCO.COMP]Cognitive science/Computer scienceContent ProtectionPrivacy Preserving Security Rules[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Security RulesPrivacy Preserving[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Préface

2016

Ce volume rassemble les Actes du Colloque international "L'intime et l'apprendre (les langues)", tenue à l'université de Bourgogne les 27-28 mars 2014. Il s'ordonne autour de deux grands questionnements, entre littérature, didactique et épistémologie: comment explorer les champs dans lesquels l'intime est à l'oeuvre ? Comment identifier les formes actuelles de son potentiel créatif, expressif et développemental?

[SHS.LITT] Humanities and Social Sciences/LiteratureintimePrivacydidactique des langues-culturesliterature[SHS.EDU] Humanities and Social Sciences/Educationlanguage teachinglittérature
researchProduct

Technostress and Social Networking Services: Uncovering Strains and Their Underlying Stressors

2017

Numerous users of social networking sites and services (SNS) suffer from technostress and its various strains that hinder well-being. Despite a growing research interest on technostress, the extant studies have not explained what kinds of various strains can SNS use create and how can these strains be traced back to different stressors. To address this gap in research, we employed a qualitative approach by narrative interviews. As a contribution, our findings introduce four SNS strains (concentration problems, sleep problems, identity problems, and social relation problems) and explain how they link with different underlying SNS stressors. As practical implications, the findings of this stu…

animal structuresbusiness.industry05 social sciencesInternet privacyStressorIdentity (social science)02 engineering and technologySocial relationExtant taxon020204 information systems0502 economics and businessTechnostress0202 electrical engineering electronic engineering information engineeringNarrativePsychologybusinessPractical implications050203 business & management
researchProduct

Decision-cache based XACML authorisation and anonymisation for XML documents

2012

Author's version of an article in the journal: Computer Standards and Interfaces. Also available from the publisher at: http://dx.doi.org/10.1016/j.csi.2011.10.007 This paper describes a decision cache for the eXtensible Access Control Markup Language (XACML) that supports fine-grained authorisation and anonymisation of XML based messages and documents down to XML attribute and element level. The decision cache is implemented as an XACML obligation service, where a specification of the XML elements to be authorised and anonymised is sent to the Policy Enforcement Point (PEP) during initial authorisation. Further authorisation of individual XML elements according to the authorisation specifi…

authorisationSoftware_OPERATINGSYSTEMSMarkup languageComputer sciencecomputer.internet_protocolXACMLAccess controlIntrusion detection systemcomputer.software_genrecachingXACMLcomputer.programming_languageanonymisationVDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424AuthenticationDatabasebusiness.industryComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSHardware and ArchitectureCacheprivacy policyWeb servicebusinessLawcomputerSoftwareXMLComputer Standards & Interfaces
researchProduct

El derecho al olvido en el Big data: nuevos retos para la protección de la privacidad

2018

Esta tesis doctoral es un estudio sobre el desarrollo del derecho al olvido digital como un derecho fundamental. Con este fin, se ha presentado un enfoque doctrinal y jurisprudencial de este derecho de nueva generación, con el objetivo de desarrollar una caracterización, tanto en términos formales como materiales, que permita describir el derecho al olvido digital como un derecho fundamental. La realización de este estudio surge de dos premisas: en primer lugar, la importancia de Big Data como un proceso integrador de la revolución digital, un fenómeno de cambio transversal que ha venido a redefinir los códigos, usos y formas de interacción social típicos de la posmodernidad. En segundo lug…

big datareino unido:CIENCIAS JURÍDICAS Y DERECHO [UNESCO]internetUNESCO::CIENCIAS JURÍDICAS Y DERECHOprivacyderecho al olvido
researchProduct

Knowledge Brokering in an Era of Communication Visibility

2020

This study presents an analysis of the extent to which enterprise social media (ESM) use enhances visibility of content (message transparency) and connections (network translucence) in organizations, and how this affects knowledge brokering. The findings support the theory of communication visibility by demonstrating that ESM use is associated with perceptions of message transparency and network translucence. Furthermore, the findings suggest that employees, regardless of their position within a network, are provided with a vision advantage and thus have the ability to engage in knowledge brokering. Future work needs to examine the impact of network characteristics on these effects. This a…

business.industry05 social sciencesEconomics Econometrics and Finance (miscellaneous)Visibility (geometry)Internet privacy050801 communication & media studiesTransparency (behavior)Knowledge sharing0508 media and communications0502 economics and businessBusiness Management and Accounting (miscellaneous)Social mediabusiness050203 business & managementInternational Journal of Business Communication
researchProduct

Social media overload, exhaustion, and use discontinuance : Examining the effects of information overload, system feature overload, and social overlo…

2020

While users’ discontinuance of use has posed a challenge for social media in recent years, there is a paucity of knowledge on the relationships between different dimensions of overload and how overload adversely affects users’ social media discontinuance behaviors. To address this knowledge gap, this study employed the stressor–strain–outcome (SSO) framework to explain social media discontinuance behaviors from an overload perspective. It also conceptualized social media overload as a multidimensional construct consisting of system feature overload, information overload, and social overload. The proposed research model was empirically validated via 412 valid questionnaire responses collecte…

business.industry05 social sciencesPerspective (graphical)Internet privacy02 engineering and technology222 Other engineering and technologiesLibrary and Information SciencesManagement Science and Operations Research113 Computer and information sciencesInformation overloadComputer Science ApplicationsResearch model020204 information systems0502 economics and businessTechnostress0202 electrical engineering electronic engineering information engineeringMedia TechnologyFeature (machine learning)050211 marketingSocial mediaConstruct (philosophy)PsychologybusinessInformation Systems
researchProduct

The Big Meaning of Small Messages

2019

Here, instant messaging as a mode of everyday communication in digital families is taken up for examination. We look, in particular, into the qualities that make WhatsApp an attractive communication tool for extended families: it allows both one-to-one and one-to-many interactions and provides multiple modalities for intergenerational family communication (voice, text, photos and videos). Empirical evidence and qualitative data collected in Finland and Italy in 2014–2015 are drawn upon and analysed in advancing the argument that the success story of WhatsApp in the family context is related to way it enables reaching the whole family at once and promotes ‘phatic communion’ via small message…

business.industryArgumentInternet privacyExtended familyQualitative propertyContext (language use)SociologyMultiple modalitiesInstant messagingEmpirical evidencebusinessMeaning (linguistics)
researchProduct

2020

While previous communication and media research has largely focused on either studying privacy as personal boundary management or made efforts to investigate the structural (legal or economic) condition of privacy, we observe an emergent body of research on the political underpinnings of privacy linking both aspects. A pronounced understanding of the politics of privacy is however lacking. In this contribution, we set out to push this forward by mapping four communication and media perspectives on the political implications of privacy. In order to do so, we recur on Barry’s (2002) distinction of the political and the politics and outline linkages between individual and structural dimensions…

business.industryCommunication05 social sciencesPerspective (graphical)Internet privacy050801 communication & media studiesContext (language use)Boundary management0506 political sciencePolitics0508 media and communicationsOrder (exchange)050602 political science & public administrationSociologybusinessSet (psychology)Media and Communication
researchProduct