scholarly journals Corrigendum to “Shewhart-Type Charts for Masked Data: A Strategy for Handling the Privacy Issue”

2021 ◽  
Vol 2021 ◽  
pp. 1-1
Author(s):  
Said Farooq Shah ◽  
Zawar Hussain ◽  
Muhammad Riaz ◽  
Salman Arif Cheema
Keyword(s):  

2015 ◽  
Vol 8 (4) ◽  
pp. 93
Author(s):  
Muhammad Aqib ◽  
Jonathan Cazalas

With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide many facilities to the users who want information regarding a specific area or directions using an optimal path to a destination. Due to these reasons, the number of clients using these applications is increasing on a daily basis. Although these services are very useful and are making it easy for us to get information about our surroundings, some issues are also linked with the use of these applications and their services. One of the more significant issues of using these services is privacy with respect to sending personal location information to location-based services servers. Researchers have provided many solutions to solve these issues. One of the solutions is through caching and use of k-anonymity techniques. In this paper, we have proposed a method to solve the privacy issue that uses caching data approach to reduce the number of queries sent to the location-based services server. We also discuss the use of the concept of k-anonymity when no relevant data is available in cache, and queries are sent to the server.


Author(s):  
M. Chandraleka ◽  
D. Anitha

In mobile, many applications provide services to the users based on the photos provided by the user.Certain applications, client users take a photo of a certain spot and send it to a server, the server identifies the spot with an image recognizer and returns its related information to the users.It can cause a privacy issue because image recognition results are sometimes privacy sensitive.To overcome the problems of existing approaches, proposed an Encryption-Free framework for Privacy preserving Image Recognition, called Enfpire.InEnfPire, the server cannot identify the client users current location, its candidates can only be presented. In proposed thefeature extraction with CNN algorithm help to collect the unique and accurate features from input image and also used Duplicate Detection process to detect images with same features present within same index.In proposed approach user transform the extracted image feature x into y on the user server and sends it to the public server.With the transformation , the effectiveness of the original feature x is degraded so that the public server cannot uniquely recognize the spot-ID of user from y.It only retrives the relevant spot ID’s.The unique spot ID will identify and information regarding the spot and relevant images will be given to the user.


2022 ◽  
Vol 29 (1) ◽  
pp. 1-32
Author(s):  
Zilong Liu ◽  
Xuequn Wang ◽  
Xiaohan Li ◽  
Jun Liu

Although individuals increasingly use mobile applications (apps) in their daily lives, uncertainty exists regarding how the apps will use the information they request, and it is necessary to protect users from privacy-invasive apps. Recent literature has begun to pay much attention to the privacy issue in the context of mobile apps. However, little attention has been given to designing the permission request interface to reduce individuals’ perceived uncertainty and to support their informed decisions. Drawing on the principal–agent perspective, our study aims to understand the effects of permission justification, certification, and permission relevance on users’ perceived uncertainty, which in turn influences their permission authorization. Two studies were conducted with vignettes. Our results show that certification and permission relevance indeed reduce users’ perceived uncertainty. Moreover, permission relevance moderates the relationship between permission justification and perceived uncertainty. Implications for theory and practice are discussed.


2019 ◽  
pp. 1818-1839
Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

With the increased use of the Internet to share confidential information with other users around the world, the demands to protect this information are also increasing. This is why, today, privacy has found its important place in users' lives. However, Internet users have different interpretations of the meaning of privacy. This fact makes it difficult to find the best way to address the privacy issue. In addition, most of the current standard protocols in use over the Internet do not support the level of privacy that most users expect. The purpose of this chapter is to discuss the best balance between users' expectation and the practical level of privacy to address user privacy needs and evaluate the most important protocols from privacy aspects.


Author(s):  
Li Lu

Due to low cost and easy deployment, RFID has become a promising technology in many applications, such as retailing, medical-patient management, logistics, and supply chain management. Although a number of RFID standards have been issued and widely adopted by many off-the-shelf products, those standards, however, scarcely added privacy concerns because of computing and communication patterns. On the other hand, in RFID systems, RF tags emit their unique serial numbers to RF readers. Without privacy protection, however, any reader can identify a tag ID via the emitted serial number. Indeed, a malicious reader can easily perform bogus authentications with detected tags to retrieve sensitive information within its scanning range. The main obstacle to preserving privacy in RFID systems lies in the capability of tags. Due to the cost consideration, common RFID tags have tight constraints on power, computational capacity, and memory. Therefore, the mature cryptographic tools for bulky PCs are not suitable for RFID devices. In this chapter, the author focuses on the privacy issue to establish scalable and private RFID systems. The chapter first discusses the privacy issue in RFID systems; and then correspondingly introduces privacy preserving techniques including privacy-preserving authentication and secure ownership transfer. Finally, the theoretic formal privacy models for RFID systems are given, in which the author formally defines privacy and the behaviors of adversaries in RFID systems. Based on a formal model, say the weak privacy model, the chapter illustrates the methodology for designing highly efficient privacy-preserving authentication protocols.


2011 ◽  
Vol 8 (4) ◽  
pp. 485-496 ◽  
Author(s):  
Colin J Bennett

It has recently become fashionable within the surveillance studies community to subject the concept and regime of “privacy protection” to some very rigorous criticism.   “Privacy” and all that it entails is argued to be too narrow, too based on liberal assumptions of subjectivity, too implicated in rights-based theory and discourse, insufficiently sensitive to the social sorting and discriminatory aspects of surveillance, and overly embroiled in spatial metaphors about “invasion” and “intrusion.”  As a concept, and as a way to frame the various social and political challenges encountered within “surveillance societies,” it is inadequate.   These critiques are important, and to some extent, have set scholarly inquiry on a new, exciting and broader, trajectory than that offered by privacy scholars. On closer examination, however, these critiques are often based on some faulty assumptions about the contemporary framing of the privacy issue, and about the governance of the issue.  Privacy, as a concept, regime, a set of policy instruments, and as a way to frame civil society activism, shows an extraordinary resilience. Surveillance scholars must learn to live with it.  


2003 ◽  
Vol 6 (2) ◽  
pp. 384-398
Author(s):  
A. C. Jordaan ◽  
Y. Jordaan

The world economic system’s transformation from a dominantly mass-production model, to a mass-customisation model is seen as creating a demand for personal information on consumers. This has lead many consumers to feel the need to protect their information because businesses request personal information during commercial transactions. This conceptual paper addresses information privacy as a marketing-related issue with an inter-disciplinary nature and aims to illustrate how marketing and economics can work together in a more cohesive manner. The information privacy issue is presented as striking a fair balance between the privacy interests of consumers, the financial interests of businesses, and the sustainability of an economy in the global environment. The paper concludes that consumer information privacy will always remain an issue of protection for consumers, an ethical issue for marketers, and is fast becoming an issue of social responsibility for government.


MANUSYA ◽  
2004 ◽  
Vol 7 (4) ◽  
pp. 138-156
Author(s):  
Takanori Tamura

In this paper, we discuss the Japanese feeling of privacy. In Japan, though “Information Society” had made Japanese people aware of their privacy, Japanese like to talk about their daily life on web diaries. We presume that these tendencies towards the privacy issue were encouraged by Japanese cultural attitudes. We tested this observation (hypothesis) through content analysis of newspaper databases and web log articles using computer coding and an online survey. Through the content analysis, we found that the diffusion of information causes a sense of crisis of privacy in newspaper articles but also found people’s interest in writing about their lives. Through the online survey, we clarified existence of two axes, which are privacy and wataskushi. Opposite to discussions in information ethics, and our expectations, privacy variables are not influenced by individualistic variables or independent self-image variables. There were influenced by in-between variables and violation of reciprocity variables. The concern for watakushi was influenced by both collaborative self image, reciprocity and individualism variables. That contains contradictory attitudes. This complexity is characteristic of watakushi privacy.


2002 ◽  
Vol 9 (3) ◽  
pp. 181-188 ◽  
Author(s):  
Hooghiemstra
Keyword(s):  

AbstractNo Abstract


Sign in / Sign up

Export Citation Format

Share Document