Search results for "privacy"
showing 10 items of 402 documents
Towards better privacy preservation by detecting personal events in photos shared within online social networks
2015
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…
Privacy preserving data collection for smart grid using self-organizing map
2017
Homomorphic encryption is widely researched in the smart grid area to publish and transfer electricity consumption data between electricity companies. This method makes it feasible to calculate total electricity consumption of neighborhoods without sharing any raw electricity consumption data. In the area of demand response(DR), calculating the total consumption of electricity is important in order to create DR reports which are published by third party to reduce the peak period of electricity usage such as 7 am or 6pm. Nevertheless, the possibility of data exposing or data decryption may lead to individual households private information revealing, for example, the timing of leaving home, t…
Protection of Personal Data and Human Rights between the ECHR and the EU Legal Order
2020
The present paper deals with the relationship between privacy and data protection, having regard to the European Union and the European Convention of Human Rights. Such an analysis moves from the normative context (art. 8 ECHR and art. 7 and 8 of the Charter of Fundamental Rights of the European Union). Moreover, the case law of the Court of Justice of the European Union and of the European Court of Human RIghts is taken into account, in order to enlighten the dfferent scopes of privacy and data protection.
Reverse-Safe Text Indexing
2021
We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z - reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D . The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z , we propose an algorithm that constructs a z -reverse-safe data structure ( z -RSDS) that has size O(n) and answers decision and counting pattern matc…
Fire simulation-based adaptation of SmartRescue App for serious game: Design, setup and user experience
2015
Managing the crisis by embracing game and simulation elements and human participation into an interactive system is a mean to learn about responding to unexpected events. This so-called serious game approach is adopted in a summer school for crisis management attended by doctoral students and practitioners, as a part of its learning curriculum. The participants took part in the Disaster in my Backyard serious game, designed as a realistic crisis environment. A smartphone app encompassing fire simulations of a five-story apartment, showing how the flame, smoke and temperature of the fire developed over time from floor to floor, was tested in this serious game scenario. The color-coding of sm…
The quality of Internet information relating to 2019-nCov transmission control in dental practice
2020
Background: To date, the quality of the Internet information regarding the control and management of 2019-nCov virus transmission in dental clinics has not been evaluated The aim of this study was to evaluate the quality of Internet information about the control of 2019-nCov transmission in dental practice Material and Methods: Internet websites were identified daily using two search engines: Google and Yahoo! during the week from 20-06-2020 to 26-06-2020, applying the search term "2019-nCov transmission control in dental practice " The first 100 consecutive sites identified in each search were visited and classified The quality of information contained in each website was analyzed using th…
Do the mobile-rich get richer? Internet use, travelling and social differentiations in Finland
2014
This article investigates the daily travelling practices that are related to mobile-only, fixed-only and combined mobile/fixed use of the Internet, and the social differentiations that are related to these three ways of accessing the Internet. Survey data ( N = 612) collected from Finland in 2011 are analysed. The article shows that mobile-only Internet use is not associated with particularly diverse or frequent daily travelling practices, whereas combined mobile/fixed use is. Mobile-only Internet users are, in fact, in a relatively disadvantaged position – compared with other users, they are more typically unemployed and their household income is lower. The mobility of Internet access as …
The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Tec…
2014
The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure an…
Consumer Neuroscience-Based Metrics Predict Recall, Liking and Viewing Rates in Online Advertising
2017
[EN] The purpose of the present study is to investigate whether the effectiveness of a new ad on digital channels (YouTube) can be predicted by using neural networks and neuroscience-based metrics (brain response, heart rate variability and eye tracking). Neurophysiological records from 35 participants were exposed to 8 relevant TV Super Bowl commercials. Correlations between neurophysiological-based metrics, ad recall, ad liking, the ACE metrix score and the number of views on YouTube during a year were investigated. Our findings suggest a significant correlation between neuroscience metrics and self-reported of ad effectiveness and the direct number of views on the YouTube channel. In add…
Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology
2020
In this paper, we review three different approaches to disclosure and privacy: a) an individualistic approach, which emphasizes an individual's control over information access and flow, b) a networked approach focused on information flow in horizontal relations between people, and c) an institutional approach concerned with public and societal privacy risks from platforms, providers, and governments. These approaches co-exist largely independently of each other in privacy and disclosure literature. However, with overlapping public and private spheres of communication where a presumption of individual agency over personal information is no longer tenable, we argue for the importance of bridg…