Search results for "privacy"

showing 10 items of 402 documents

Dark Design Patterns : An End-User Perspective

2020

The number of websites and mobile applications available is growing continually, as are the persuasive approaches to influence human behavior and decision making. Although designing for persuasion offers several potential benefits, recent developments expose various deceptive designs, that is, dark patterns, that utilize psychological factors to nudge people toward, from someone else’s perspective, desired directions. This paper contributes to an increased awareness of the phenomenon of dark patterns through our exploring how users perceive and experience these patterns. Hence, we chose a qualitative research approach, with focus groups and interviews, for our exploration. Our analysis show…

Systemvetenskap informationssystem och informatik med samhällsvetenskaplig inriktningPersuasionSocial PsychologyEnd userbusiness.industryCommunicationmedia_common.quotation_subjectPerspective (graphical)Internet privacyInformation Systems Social aspectsqualitative studypersuasive designFocus groupevil designHuman-Computer Interactiondeceptive designPhenomenonSoftware design patternPsychologybusinessdark patternsQualitative researchmedia_commonDependency (project management)
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Il consenso nel mercato dei dati personali: considerazioni al tempo dei big data

2022

Sullo sfondo della disciplina europea della tutela dei dati personali, il saggio esamina il rilievo dell’autodeterminazione individuale dell’utente al loro trattamento, al cospetto di fenomeni di rilievo economico, quali la crescente diffusione dei big data analytics e il loro utilizzo per la profilazione degli utenti nella cornice del capitalismo della sorveglianza. La “tenuta” della centralità del consenso, testimoniata dalla individuazione degli attributi del consenso nel GDPR e dall’affermazione pretoria del modello dell’opt-in, non argina la transizione verso un’autodeterminazione sempre più “economica”, che sollecita una regolazione europea più attenta a cogliere le peculiarità della …

Trattamento dei dati personalibig data.consenso del titolare del trattamentoSettore IUS/01 - Diritto Privatodati personaliGDPRprivacy
researchProduct

Improving Participation, Accessibility and Compliance for Campus-Wide Mobile Emergency Alerting Systems

2009

University campus communities face a variety of hazards, from natural and technological disasters to terrorism and violence. In response to recent events, many campuses within the United States have begun to implement emergency notification systems utilizing email, text, and telephone-based messaging. These alerts are designed to reach members of the campus community, including faculty, staff, and students and most rely upon an opt-in model for participation. The present design of both the registration process and the notification messages raise several concerns as to the effectiveness of notification systems. This research presents findings from an examination of emergency notification sys…

University campuseducation.field_of_studyEngineeringbusiness.industryProcess (engineering)PopulationInternet privacyTerrorismeducationbusinessMobile deviceVariety (cybernetics)Compliance (psychology)
researchProduct

Smart Technologies for the Environmental Design of Smaller Urban Centres

2020

The present study focuses on welfare measures and specifically on healthcare. The challenge we would like to accept is to provide efficient healthcare to residents in an isolated area without health services, maintaining the same level of healthcare ensured by hospitals. The innovative design, that we want to experience, is closely linked to the use of ICT, information and communication technologies, because these technologies would be able to perform autonomously multiple functions, using remote control. Telemedicine or “virtual health” is a particular branch of ICT that can improve future quality of living in a marginal urban center as a tool to ensure prompt access to expert advice, as w…

User FriendlyTelemedicinebusiness.industryInternet privacyActive and healthy ageingUsabilityEnvironmental designSmart citieTelemedicineSettore ICAR/12 - Tecnologia Dell'ArchitetturaInformation and Communications TechnologyICTHealth careMobile technologybusinessMobile device
researchProduct

Privacy Violation Classification of Snort Ruleset

2010

Published version of a paper presented at the 2010 18th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher:http://dx.doi.org/10.1109/PDP.2010.87 It is important to analyse the privacy impact of Intrusion Detection System (IDS) rules, in order to understand a…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacyNaive Bayes classifierComputer scienceRelational databasePrivacy softwareData securityConfidentialityNetwork monitoringIntrusion detection systemData miningcomputer.software_genrecomputer
researchProduct

A roadmap towards improving managed security services from a privacy perspective

2014

Published version of an article in the journal: Ethics and Information Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s10676-014-9348-3 This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow fo…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424Information privacymanaged security servicesPrivacy by Designbusiness.industryComputer scienceDigital forensicsBig dataethical awarenesssecurityIntrusion detection systemLibrary and Information SciencesprivacyComputer securitycomputer.software_genreComputer Science ApplicationsOutsourcingInformation sensitivityintrusion detection and prevention systemsoutsourcingbusinesscomputerRegister of data controllersEthics and Information Technology
researchProduct

The value of a network in the digital era: insights about Doctor Chat case study

2017

Networks are ubiquitous in our lives in their social, physical, and digital forms. A growing number of firms today rely entirely on networking and lack a physical location or material infrastructure; they are, so to speak, 'liquid'. Through a theoretical analysis and its application to the case of Doctor Chat mobile app, this paper aims to analyse the fundamental laws of networks and to answer the following questions: 1) are the traditional methods to estimate the network value still valid in the current digital age and in particular for mobile applications?; 2) how do the laws of networks work when networks expand? We conclude with some suggestions for a research agenda in order to inspire…

Value (ethics)Computer scienceInternet privacySarnoff's lawNetwork theorycomputer.software_genreManagement Information Systemsnetwork theoryReed's lawMetcalfe's lawmobile appManagement Information SystemOdlyzko and Tilly's lawBusiness and International Management060201 languages & linguisticsMarketingMultimediabusiness.industryMobile apps06 humanities and the artsManagement information systemsWork (electrical)Order (business)0602 languages and literatureMetcalfe's lawbusinessReed's lawcomputerInternational Journal of Electronic Marketing and Retailing
researchProduct

Analysis of Viral Advertisement Re-Posting Activity in Social Media

2016

More and more businesses use social media to advertise their services. Such businesses typically maintain online social network accounts and regularly update their pages with advertisement messages describing new products and promotions. One recent trend in such businesses’ activity is to offer incentives to individual users for re-posting the advertisement messages to their own profiles, thus making it visible to more and more users. A common type of an incentive puts all the re-posting users into a random draw for a valuable gift. Understanding the dynamics of user engagement into the re-posting activity can shed light on social influence mechanisms and help determine the optimal incentiv…

Value (ethics)IncentiveUser engagementSocial networkbusiness.industryInternet privacySocial mediaAdvertisingBusinessInformation cascadeSocial influence
researchProduct

Co-Creation of Value for IT-Enabled Services : A Case of Geocaching

2013

This study explores how value is co-created in one particular IT-enabled service, geocaching. Consumer Information Systems (CIS) framework is used as a sensitizing framework to study experienced geocachers' (n=14) perceptions of what they value in geocaching. The following core values emerged that motivate people to co-create value in geocaching: challenging oneself and others, joy of success, learning, and social relations. The results reveal that geocaching is distinctively hedonic in nature, as people pursue happiness and utility via geocaching. Even support for the geocaching community was motivated by such values. In addition, the results reveal that the environment of geocaching and s…

Value (ethics)media_common.quotation_subjectInternet privacyContext (language use)information systemskäyttäjälähtöisyysConsumer informationGlobal Positioning SystemCo-creationInformation systemSociologymedia_commontietojärjestelmätService (business)ta113geographic information systemsbusiness.industryyhteisöllisyysgeokätköilyPublic relationsSocial relationvalue co-creationHappinessbusinessIT enabled servicesmotivointi
researchProduct