A New Privacy Model for Web Surfing

Author(s):  
Yuval Elovici ◽  
Bracha Shapira ◽  
Adlai Maschiach
Keyword(s):  
Author(s):  
Kaladi Govinda Raju ◽  
Palla Nanna Babu ◽  
Addepalli Phani Sridhar ◽  
Thiruveedula Srinivasulu
Keyword(s):  

PEDIATRICS ◽  
1980 ◽  
Vol 65 (1) ◽  
pp. 186-187
Author(s):  
Russell K. Dunning

In Child Abuse Intervention: Conflicts In Current Practice and Legal Theory, the author has included inaccurate references to Lynch et al vs King et al, US District Court for Massachusetts, CA 78-2152-K (filed sub nom Lynch et al vs. Dukakis et al). Because of the potentially serious ramifications of such inaccuracies and of consequent misconceptions of the case, a response is merited. By way of preface, let me disclaim adherence to the construct of a "privacy model" and a "medicolegal model" and to the proposition that the tenants of each are in conflict.


2011 ◽  
Vol 28 (6) ◽  
pp. 164-181 ◽  
Author(s):  
John Cheney-Lippold

Marketing and web analytic companies have implemented sophisticated algorithms to observe, analyze, and identify users through large surveillance networks online. These computer algorithms have the capacity to infer categories of identity upon users based largely on their web-surfing habits. In this article I will first discuss the conceptual and theoretical work around code, outlining its use in an analysis of online categorization practices. The article will then approach the function of code at the level of the category, arguing that an analysis of coded computer algorithms enables a supplement to Foucauldian thinking around biopolitics and biopower, of what I call soft biopower and soft biopolitics. These new conceptual devices allow us to better understand the workings of biopower at the level of the category, of using computer code, statistics and surveillance to construct categories within populations according to users’ surveilled internet history. Finally, the article will think through the nuanced ways that algorithmic inference works as a mode of control, of processes of identification that structure and regulate our lives online within the context of online marketing and algorithmic categorization.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Da-Zhi Sun ◽  
Ji-Dong Zhong

As an open standard for the short-range radio frequency communications, Bluetooth is suitable for Mobile Crowdsensing Systems (MCS). However, the massive deployment of personal Bluetooth-enabled devices also raises privacy concerns on their wielders. Hence, we investigate the privacy of the unilateral authentication protocol according to the recent Bluetooth standard v5.2. The contributions of the paper are twofold. (1) We demonstrate that the unilateral authentication protocol suffers from privacy weakness. That is, the attacker is able to identify the target Bluetooth-enabled device once he observed the device’s previous transmitted messages during the protocol run. More importantly, we analyze the privacy threat of the Bluetooth MCS, when the attacker exploits the proposed privacy weakness under the typical Internet of Things (IoT) scenarios. (2) An improved unilateral authentication protocol is therefore devised to repair the weakness. Under our formal privacy model, the improved protocol provably solves the traceability problem of the original protocol in the Bluetooth standard. Additionally, the improved protocol can be easily adapted to the Bluetooth standards because it merely employs the basic cryptographic components available in the standard specifications. In addition, we also suggest and evaluate two countermeasures, which do not need to modify the original protocol.


Sign in / Sign up

Export Citation Format

Share Document