Identity management and privacy languages technologies: Improving user control of data privacy

Author(s):  
José Enrique López García ◽  
Carlos Alberto Gil García ◽  
Álvaro Armenteros Pacheco ◽  
Pedro Luis Muñoz Organero
Author(s):  
Sue Milton

This chapter assumes data is a key asset that, if lost or damaged, severely disrupts business capability and reputation. The chapter has one core purpose, to provide leaders with sufficient understanding of two data management fundamentals, data privacy and data security. Without that understanding, Information Technology (IT) security will always be seen as a cost on, not an investment towards, quality and performance. The chapter reviews the relationship between data privacy and data security. It argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The topic is then discussed in broader terms, in the context of data and information management, covering various themes such as cyber-crime, governance, and innovations in identity management. The chapter's intended outcome is to clarify the relationship between data privacy and security and how this understanding helps reduce data abuse. The link between privacy and security will also demystify the reason for high costs in implementing and maintaining security policies and explain why leaders need to provide stronger IT strategic leadership to ensure IT investment is defined and implemented wisely.


Author(s):  
Jeeyun Oh ◽  
Mun-Young Chung ◽  
Sangyong Han

Despite of the popularity of interactive movie trailers, rigorous research on one of the most apparent features of these interfaces – the level of user control – has been scarce. This study explored the effects of user control on users’ immersion and enjoyment of the movie trailers, moderated by the content type. We conducted a 2 (high user control versus low user control) × 2 (drama film trailer versus documentary film trailer) mixed-design factorial experiment. The results showed that the level of user control over movie trailer interfaces decreased users’ immersion when the trailer had an element of traditional story structure, such as a drama film trailer. Participants in the high user control condition answered that they were less fascinated with, absorbed in, focused on, mentally involved with, and emotionally affected by the movie trailer than participants in the low user control condition only with the drama movie trailer. The negative effects of user control on the level of immersion for the drama trailer translated into users’ enjoyment. The impact of user control over interfaces on immersion and enjoyment varies depending on the nature of the media content, which suggests a possible trade-off between the level of user control and entertainment outcomes.


2013 ◽  
Author(s):  
Brittan Davis ◽  
Tiffany Williams ◽  
Donna E. Schultheiss

Author(s):  
P. Sudheer ◽  
T. Lakshmi Surekha

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been to secure the cloud storage. Data content privacy. A semi anonymous privilege control scheme AnonyControl to address not only the data privacy. But also the user identity privacy. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semi anonymity. The  Anonymity –F which fully prevent the identity leakage and achieve the full anonymity.


2017 ◽  
Vol 8 (2) ◽  
pp. 563 ◽  
Author(s):  
Usman Ependi

Heuristic evaluation merupakan salah satu bentuk usability testing perangkat lunak yang dinilai oleh pengguna (evaluator). Dalam melakukan heuristic evaluation instrumen penilaian terdiri dari sepuluh (10) pernyataan dengan lima pilihan jawaban dalam skala severity ratings. Dalam penelitian ini heuristic evaluation terhadap aplikasi Depo Auto 2000 Tanjung Api-Api Palembang yang dilakukan oleh 4 evaluator.  Hasil dari heuristic evaluation dikelompokkan kedalam  masing-masing instrumen yaitu visibility of system status dengan nilai 0,75, match between system and the real world dengan nilai 0,25, user control and freedom dengan nilai 0,25, consistency and standards dengan nilai 0,75, error prevention dengan nilai 1, recognition rather than recall dengan nilai 1,25, flexibility and efficiency of use dengan nilai 0,25, Aesthetic and minimalist design dengan nilai 0,25, help users recognize, diagnose, and recover from errors dengan nilai 1 dan Help and documentation dengan nilai 0. Dari hasil heuristic evaluation yang dilakukan menunjukkan bahwa evaluator memberikan nilai 0 dan 1 aplikasi Depo Atuo 2000 Tanjung Api-Api Palembang. Hasil penilaian tersebut menunjukkan bahwa aplikasi yang buat tidak ada masalah usability dan hanya memiliki cosmetic problem sehingga aplikasi Depo Auto 2000 Tanjung Api Api Palembang  dapat dinyatakan layak untuk didistribusikan kepada pengguna akhir (end user). 


Sign in / Sign up

Export Citation Format

Share Document