PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy

2022 ◽  
Vol 22 (1) ◽  
pp. 1-32
Author(s):  
Onuralp Ulusoy ◽  
Pinar Yolum

Privacy is the right of individuals to keep personal information to themselves. When individuals use online systems, they should be given the right to decide what information they would like to share and what to keep private. When a piece of information pertains only to a single individual, preserving privacy is possible by providing the right access options to the user. However, when a piece of information pertains to multiple individuals, such as a picture of a group of friends or a collaboratively edited document, deciding how to share this information and with whom is challenging. The problem becomes more difficult when the individuals who are affected by the information have different, possibly conflicting privacy constraints. Resolving this problem requires a mechanism that takes into account the relevant individuals’ concerns to decide on the privacy configuration of information. Because these decisions need to be made frequently (i.e., per each piece of shared content), the mechanism should be automated. This article presents a personal assistant to help end-users with managing the privacy of their content. When some content that belongs to multiple users is about to be shared, the personal assistants of the users employ an auction-based privacy mechanism to regulate the privacy of the content. To do so, each personal assistant learns the preferences of its user over time and produces bids accordingly. Our proposed personal assistant is capable of assisting users with different personas and thus ensures that people benefit from it as they need it. Our evaluations over multiagent simulations with online social network content show that our proposed personal assistant enables privacy-respecting content sharing.

2017 ◽  
Vol 2 (3) ◽  
Author(s):  
S. Saranya ◽  
M. Ranjith Kumar ◽  
K. Madheswaran

User Image sharing social site maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. The solution relies on an image classification framework for image categories which may be associated with similar policies and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to user’s social features. Image Sharing takes place both among previously established groups of known people or social circles and also increasingly with people outside the users social circles, for purposes of social discovery-to help them identify new peers and learn about peers interests and social surroundings, Sharing images within online content sharing sites, therefore, may quickly lead to unwanted disclosure. The aggregated information can result in unexpected exposure of one’s social environment and lead to abuse of one’s personal information.


2021 ◽  
pp. 1-27
Author(s):  
Markus Knell

Abstract This paper studies how the rates of deduction for early retirement have to be determined in pay-as-you-go (PAYG) systems in order to keep their budget stable. The derivation of these deductions requires the use of a multiperiod intertemporal budget constraint that involves assumptions about the retirement behavior of past, present, and future cohorts. In general, it is not possible to calculate budget-neutral deductions from the budget constraint of a single individual who retires before the target retirement age—an approach that dominates the related literature. Only for specific cases one can use this second approach but then one has to adjust the discount rate to the assumption about collective retirement. If there is only one deviating individual, then the right choice is the market interest rate while for a stationary retirement distribution it is the internal rate of return of the PAYG system. In this case, the necessary deductions are lower than under the standard approach. This is also true for retirement ages that fluctuate randomly around a stationary distribution. Various long-run developments (e.g., increases in life expectancy or permanent changes in the average retirement age) might cause challenges for the sustainability of the pension system. These developments, however, can only be dealt with by adequate adjustments to the basic pension formulas and not by the use of deduction rates.


2013 ◽  
Vol 20 (1) ◽  
pp. 63-78
Author(s):  
Maria Inês de Oliveira Martins

Abstract The need of private insurers for information on the candidate’s health risks is recognized by the law, which places pre-contractual duties of disclosure upon the candidates. When the risks are influenced by health factors, e.g. in the case of life- and health insurances, it implies the provision of health information by the candidates, who thus voluntarily limit their right to privacy. This consent, however, often happens in a context of factual coercion to contract. Next to this, from a legal standpoint, the collection of personal information must respond to the principle of proportionality. Against this background, this article assesses the compatibility of questionnaire techniques that rely on open-ended health related questions with the right to privacy, as protected by Portuguese and international law. It then analyses the extent of pre-contractual duties of disclosure as defined by the Portuguese Insurance Act, which requires the candidate to volunteer all the relevant information independently of being asked for it. In doing so, the article also refers to some other European countries. It concludes that the relevant Portuguese legislation is incompatible both with Portuguese constitutional law and with international law.


Obiter ◽  
2016 ◽  
Vol 37 (3) ◽  
Author(s):  
Melody Musoni

The focus of this note is to analyze whether the Cybercrimes and Cybersecurity Bill provides a harmonization between search and seizure and the constitutional right to privacy. This will be achieved by discussing the State powers of search and seizure in cyberspace vis-à-vis the right to privacy as envisaged in the Protection of Personal Information Act. Further, this note investigates whether the Cybercrimes and Cybersecurity Bill achieves the purpose of combatting cybercrimes without the infringement of the right to privacy. Subsequently, the article provides plausible recommendations on how the State should lawfully conduct searches and seizures of articles related to cybercrimes.


2016 ◽  
Vol 15 (12) ◽  
pp. 7308-7315
Author(s):  
Festim HALILI HALILI ◽  
Avni RUSTEMI

Always before we start creating or accessing a particular system, it is more than necessary to have a clearer picture of how to create, respectively, how to approach a certain system, in this case of a e-business system. It is much easier as for systems makers, as well as for ordinary users when they have before them a model of how to be accessed in such a system, because such a thing will orient users much easier to purchase products online through various systems on the one hand, but on the other hand it would help makers of systems create much easier such systems when they have already before them the right design. Modeling systems may be done in different ways, depending on the context of its research, but we in this paper we will use UML diagrams for modeling online system where we will make a comparison between UML diagrams and we will present each type of UML diagram in terms of customer access in online systems. Also using predictive techniques as CPM and PERT techniques in the paper we will present the main activities required for access to an online system by different users, and their graphic presentation and critical path finding, which shows the best way to approach such a system. There shall not fail and the description of business models and the introduction of some e-business models that are commonly used in practice in the days of today.


Bioderecho.es ◽  
2019 ◽  
Author(s):  
María Mercedes Serrano Pérez

Resumen: El tratamiento de la información personal en el contexto de la salud y de la investigación en salud ha de conjugar el derecho a la protección de datos de las personas con la necesidad de utilizar la información para la satisfacción de la vertiente colectiva que incorpora el derecho a la salud. El beneficio de dicha armonía repercute en toda la sociedad. Las leyes de protección de datos han de perseguir dicho objetivo.  Summary: The treatmen of personal information in the context of health and the investigation has to harmonize the right to data protection with the use of information to satisfy the social side of the right to health. The benefit of this relationship has an impact on society. Data protection laws pursue this objective


2017 ◽  
Vol 28 (08) ◽  
pp. 731-741 ◽  
Author(s):  
Barbra H. B. Timmer ◽  
Louise Hickson ◽  
Stefan Launer

AbstractPrevious research, mostly reliant on self-reports, has indicated that hearing aid (HA) use is related to the degree of hearing impairment (HI). No large-scale investigation of the relationship between data-logged HA use and HI has been conducted to date.This study aimed to investigate if objective measures of overall daily HA use and HA use in various listening environments are different for adults with mild HI compared to adults with moderate HI.This retrospective study used data extracted from a database of fitting appointments from an international group of HA providers. Only data from the participants’ most recent fitting appointment were included in the final dataset.A total of 8,489 bilateral HA fittings of adults over the age of 18 yr, conducted between January 2013 and June 2014, were included. Participants were subsequently allocated to HI groups, based on British Society of Audiology and American Speech-Language-Hearing Association audiometric descriptors.Fitting data from participating HA providers were regularly transferred to a central server. The data, with all personal information except age and gender removed, contained participants’ four-frequency average (at 500, 1000, 2000, and 4000 Hz) as well as information on HA characteristics and usage. Following data cleaning, bivariate and post hoc statistical analyses were conducted.The total sample of adults’ average daily HA use was 8.52 hr (interquartile range [IQR] = 5.49–11.77) in the left ear and 8.51 hr (IQR = 5.49–11.72) in the right ear. With a few exceptions, there were no statistical differences between hours of HA use for participants with mild HI compared to those with moderate impairment. Across all mild and moderate HI groups, the most common overall HA usage was between 8 and 12 hr per day. Other factors such as age, gender, and HA style also showed no relationship to hours of use. HAs were used, on average, for 7 hr (IQR = 4.27–9.96) per day in quiet and 1 hr (IQR = 0.33–1.41) per day in noisy listening situations.Clinical populations with mild HI use HAs as frequently as those with a moderate HI. These findings support the recommendation of HAs for adults with milder degrees of HI.


Sign in / Sign up

Export Citation Format

Share Document