Search results for "privacy"

showing 10 items of 402 documents

Crisis of Privacy and Sacrifice of Personal Data in the Name of National Security: The CJEU Rulings Strengthening EU Data Protection Standards

2017

Snowden’s surveillance revelations in 2013 raised the issue of privacy and security in the public spotlight. These revelations underlined the need for strong data protection framework. At the same time, the pressing demand to address security concerns and the threat of terrorist attacks might weaken privacy and data protection standards. Two landmark judgments of the Court of Justice of the European Union (the CJEU), namely, the Digital rights Ireland judgment which invalidates Data Retention Directive, and the Schrems judgment which invalidates Safe Harbour Decision forming a legal basis for transatlantic data transfers are of great significance in strengthening the rights to privacy and d…

Information privacyPrivacy by Designbusiness.industryGeneral Data Protection RegulationPolitical scienceInternet privacyData Protection Act 1998Information privacy lawPrivacy lawNational data protection authoritybusinessData Protection DirectiveSSRN Electronic Journal
researchProduct

A model of Cyber Threat Information Sharing with the Novel Network Topology

2021

The digitized environments are particularly vulnerable to various attacks. In such a situation of a security attack, detecting and responding to attacks require effective actions. One of the most significant ways to improve resilience to security attacks is to obtain accurate and timely situational aspect of the security awareness. The efficient production and utilization of situation information is achieved by sharing information with other actors in the information sharing network quickly and reliably without compromising the confidential information of one's own organization. At the same time, it should also be possible to avoid a flood of irrelevant information in the sharing network, w…

Information privacySituation awarenessComputer scienceInformation sharingInformation systemConfidentialityResilience (network)Security awarenessNetwork topologyComputer securitycomputer.software_genrecomputerThe 12th International Conference on Advances in Information Technology
researchProduct

To Share or Not to Share: Supporting the User Decision in Mobile Social Software Applications

2007

User's privacy concerns represent one of the most serious obstacles to the wide adoption of mobile social software applications. In this paper, we introduce a conceptual model which tackles the problem from the perspective of trade-off between privacy and trust, where the user takes the decision with minimal privacy loss. To support the user decision, we introduce the Mobile Access Control List (Macl), a privacy management mechanism which takes into account the user attitude towards mobile sharing, his communication history and social network relationships.

Information privacySocial networkPrivacy by Designbusiness.industryPrivacy softwareComputer scienceInternet privacySocial softwareMobile computingConceptual model (computer science)computer.software_genreWorld Wide WebbusinesscomputerAccess control list
researchProduct

DICOM E-mail: Germany's minimum standard for teleradiology

2005

Abstract Due to the lack of a standard for teleradiology, the IT Working Group (Arbeitsgemeinschaft fur Informationstechnik, @GIT) of the German Radiological Society (Deutsche Rontgengesellschaft, DRG) has set up an initiative for standardizing telemedicine. E-mail has been selected as the ideal basis for ad hoc connections in teleradiology since it is both easy to implement and use. The DICOM standard offers the option of appending DICOM data types as MIME attachments to any e-mail, thus enabling the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g., data privacy) that must be obeyed and implemented. The first recommendation was introduced at th…

Information privacyTelemedicinebusiness.industryComputer scienceGeneral MedicineTeleradiologylanguage.human_languageGermanWorld Wide WebDICOMlanguageThe InternetbusinessImplementationDicom StandardInternational Congress Series
researchProduct

Internet of things and privacy preserving technologies

2009

In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.

Information privacyUbiquitous computingPrivacy by Designbusiness.industryComputer sciencePrivacy softwareInternet privacyData securityCryptographyComputer securitycomputer.software_genreWeb of ThingsThe Internetbusinesscomputer2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Privacy in Social Network Sites

2011

Are we running out of privacy? Nowadays, for example, we are concerned about whether the maintenance of a private sphere in online environments has become a luxury commodity (Papacharissi 2009). Questions of this kind are justified as online communication plays an increasingly important role in people’s everyday life (cf., e.g., Lundby 2009). While it seems exaggerated to stigmatize today’s youth as “communication junkies” (Patalong 2010), online conversations are increasingly becoming a functional equivalent to face to face communication (Beer 2008). However, some significant differences between online and “offline” communication remain. Face to face communication may remain largely intima…

Information privacyUser profileSocial networkbusiness.industryInternet privacySocial WelfarePrivate spherebusinessEveryday lifeSocial webFace-to-face interaction
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Trust-enhanced intelligent security model

2012

In this paper we propose a trust-enhancement of access control to protect both integrity and confidentiality based on trustworthiness of users performing operations and documents' content analysis. We propose to utilize trustworthiness opinions from subjective logic and express levels of integrity as levels of trustworthiness. We assign confidentiality levels based on contents of documents and use opinions to express trustworthiness of such assignments.

Information privacybusiness.industryComputer scienceInternet privacyAccess controlComputer security modelComputer securitycomputer.software_genreContent analysisSoftware agentData_GENERALData integrityConfidentialitybusinessSubjective logiccomputer2012 6th IEEE INTERNATIONAL CONFERENCE INTELLIGENT SYSTEMS
researchProduct

Protection of privacy in the EU, individual rights and legal instruments

2014

Information privacybusiness.industryReservation of rightsPolitical sciencePrivacy policyInternet privacyFundamental rightsInformation privacy lawNational data protection authorityPrivacy lawPublic relationsbusinessData Protection Directive
researchProduct

ECCOLA : a method for implementing ethically aligned AI systems

2021

Artificial Intelligence (AI) systems are becoming increasingly widespread and exert a growing influence on society at large. The growing impact of these systems has also highlighted potential issues that may arise from their utilization, such as data privacy issues, resulting in calls for ethical AI systems. Yet, how to develop ethical AI systems remains an important question in the area. How should the principles and values be converted into requirements for these systems, and what should developers and the organizations developing these systems do? To further bridge this gap in the area, in this paper, we present a method for implementing AI ethics: ECCOLA. Following a cyclical action res…

Information privacyjärjestelmäsuunnitteluimplementingComputer scienceAi ethicstekoälyartificial intelligenceeettisyysBridge (interpersonal)ethicsmenetelmätAI ethicsHardware and ArchitecturemethodEngineering ethicsAction researchetiikkaSoftwareInformation SystemsAi systems
researchProduct