Search results for "privacy"
showing 10 items of 402 documents
‘I’m still the master of the machine.’ Internet users’ awareness of algorithmic decision-making and their perception of its effect on their autonomy
2020
Algorithms are an integral part of our everyday lives and shape the selection and presentation of information and communication on the internet. At the same time, media users are faced with a lack of control and transparency when interacting with these systems because algorithms largely remain black boxes to end users. Relying on the notion that algorithms are socio-technical systems that comprise both technical and human components, this paper examines internet users’ awareness of algorithms in different areas of internet use and inquires into users’ perceptions of the impact of algorithms on their autonomy when interacting online. Empirically, we rely on qualitative interviews with 30 Ger…
Leveraging technology for healthcare and retaining access to personal health data to enhance personal health and well-being
2021
Abstract Health data are a sensitive category of personal data. They can result in a high risk to individuals and health information-handling rights and opportunities unless there is a sufficient defense. Reasonable security standards are needed to protect electronic health records (EHRs). All personal data handling needs adequate explanation. Maintaining access to medical data, even in the developing world, would favor health and well-being across the world. Unfortunately, there are still countries that hinder the portability of medical records. Numerous occurrences have shown that it still takes weeks for medical data to be ported from one general physician to another. Cross-border portab…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Using privacy-transformed speech in the automatic speech recognition acoustic model training
2020
Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…
VLPZ: The Vehicular Location Privacy Zone
2016
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…
Designing Transport Supporting Services Together with Users with Intellectual Disabilities
2020
Transportation is an important yet challenging aspect in terms of mobility for persons with intellectual disabilities (ID). Despite positive implications of designing services with users, persons with ID are rarely given the opportunity to be involved in such design processes. In this action design research (ADR) study we involve persons with ID in the design through observations, photovoice interviews and in a staged, yet naturalistic user enactments on a bus. Our research contributes with design insights on transport supporting services and insights on user involvement of persons with ID in ADR. The three ADR cycles showed that people with ID is a heterogenous group of users and as such e…
The impact of user’s availability on On-line Ego Networks: a Facebook analysis
2016
We have defined and implemented a Facebook application to log a Facebook dataset.We have studied and validated the structural properties of the whole dataset and of the Dunbar ego networks.We have analyzed the interactions of the users.The availability of the users in the Dunbar ego networks have been investigated.Our results reveal the presence of the temporal homophily property in the Dunbar ego networks. Online Social Networks (OSNs) are the most popular applications in todays Internet and they have changed the way people interact with each other. Understanding the structural properties of OSNs and, in particular, how users behave when they connect to OSNs is crucial for designing user-c…
Public availability of published research data in substance abuse journals
2014
[EN] Sharing research data is an increasingly necessary requirement for the advancement of science. The aim of this study was to analyse the policies on openness in sharing scientific research data in substance abuse journals. Journals included in the Substance abuse area of the Journal Citation Reports were used for the analysis, with reference to the instructions to authors published on the journals websites. In 67.6% of the journals, it is possible to store materials in thematic or institutional repositories; 47% accept supplemental material; 64.7% allow the reuse of data, and 41.2% admit the publication of their data on a website. Most journals recommend that authors deposit their data …
The Content of the Websites: Emergence of Intimate Cyberplaces
2017
On the basis of an interpretation of the content of the contrade’s websites, this chapter proposes that these communities unlock cyberspace through inhabiting cyberplaces. They local ise cyberspace, making it concrete and create intimacy by highlighting their history, special places, and maps of their district, announcing events and posting pictures of them, presenting and explaining their symbol ism, exhibiting emblems and artefacts, and by listing the names and showing pictures of community members and horses that have taken part in the palio. By constructing websites in such a way, the contrade inhabit cyberplaces that are characterised by intimacy and familiarity , as they present their…
Cyber Situational Awareness in Critical Infrastructure Protection
2020
The European Union promotes collaboration between authorities and the private sector, and the providers of the most critical services to society face security related obligations. In this paper, critical infrastructure is seen as a system of systems that can be subject to cyber-attacks and other disturbances. Situational awareness (SA) enhances preparations for and decision-making during assessed and unforeseen disruptive incidents, and promoting Cyber effective situational awareness (CSA) requires information sharing between the different interest groups. This research is constructive in nature, where innovative constructions developed as solutions for domain-specific real world problem…