Enforcing Privacy on the Semantic Web

Author(s):  
Abdelmounaam Rezgui ◽  
Athman Rouguettaya ◽  
Zaki Malik

Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably. Previously unknown or hard-to-get information is now readily available to us. The World Wide Web has played an important role in this information revolution. Often, sensitive information is exchanged among users, Web services, and software agents. This exchange of information has highlighted the problem of privacy. A large number of strategies employed to preserve people’s privacy require users to define their respective privacy requirements and make decisions about the disclosure of their information. Personal judgments are usually made based on the sensitivity of the information and the reputation of the party to which the information is to be disclosed. In the absence of a comprehensive privacy preserving mechanism, no guarantees about information disclosure can be made. The emerging Semantic Web is expected to make the challenge more acute in the sense that it would provide a whole infrastructure for the automation of information processing on the Web. On the privacy front, this means that privacy invasion would net more quality and sensitive personal information. In this chapter, we describe a reputation-based approach to automate privacy enforcement in a Semantic Web environment. We propose a reputation management system that monitors Web services and collects, evaluates, updates, and disseminates information related to their reputation for the purpose of privacy protection.

2008 ◽  
pp. 3713-3727
Author(s):  
Abdelmounaam Rezgui ◽  
Athman Rouguettaya ◽  
Zaki Malik

Over the past few years there has been a huge influx of web accessible information. Information access and storage methods have grown considerably. Previously unknown or hard-to-get information is now readily available to us. The World Wide Web has played an important role in this information revolution. Often, sensitive information is exchanged among users, Web services, and software agents. This exchange of information has highlighted the problem of privacy. A large number of strategies employed to preserve people’s privacy require users to define their respective privacy requirements and make decisions about the disclosure of their information. Personal judgments are usually made based on the sensitivity of the information and the reputation of the party to which the information is to be disclosed. In the absence of a comprehensive privacy preserving mechanism, no guarantees about information disclosure can be made. The emerging Semantic Web is expected to make the challenge more acute in the sense that it would provide a whole infrastructure for the automation of information processing on the Web. On the privacy front, this means that privacy invasion would net more quality and sensitive personal information. In this chapter, we describe a reputation-based approach to automate privacy enforcement in a Semantic Web environment. We propose a reputation management system that monitors Web services and collects, evaluates, updates, and disseminates information related to their reputation for the purpose of privacy protection.


2007 ◽  
Vol 9 (2) ◽  
Author(s):  
P. L. Wessels ◽  
L. P. Steenkamp

One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information. 


2014 ◽  
Vol 10 (2) ◽  
pp. 23-44
Author(s):  
Hongwei “Chris” Yang

A paper survey of 489 Chinese college students was conducted in spring, 2012 to test a conceptual model of online information disclosure in social media. It shows that young Chinese SNS users' prior negative experience of online disclosure significantly increased their online privacy concerns and their perceived risk. Their online privacy concerns undermined their trust of online companies, marketers and laws to protect privacy and elevated their perceived risk. Their trust strongly predicted their intent to disclose the lifestyle and sensitive information. Their online privacy concerns only inhibited them from disclosing sensitive information in social media. However, their prior negative experience did not directly predict their intent of self-disclosure on SNS. Implications for academia and industry are discussed.


2021 ◽  
Vol 27 (1) ◽  
pp. 146045822098003
Author(s):  
Tania Moerenhout ◽  
Ignaas Devisch ◽  
Laetitia Cooreman ◽  
Jodie Bernaerdt ◽  
An De Sutter ◽  
...  

Patient access to electronic health records gives rise to ethical questions related to the patient-doctor-computer relationship. Our study aims to examine patients’ moral attitudes toward a shared EHR, with a focus on autonomy, information access, and responsibility. A de novo self-administered questionnaire containing three vignettes and 15 statements was distributed among patients in four different settings. A total of 1688 valid questionnaires were collected. Patients’ mean age was 51 years, 61% was female, 50% had a higher degree (college or university), and almost 50% suffered from a chronic illness. Respondents were hesitant to hide sensitive information electronically from their care providers. They also strongly believed hiding information could negatively affect the quality of care provided. Participants preferred to be informed about negative test results in a face-to-face conversation, or would have every patient decide individually how they want to receive results. Patients generally had little experience using patient portal systems and expressed a need for more information on EHRs in this survey. They tended to be hesitant to take up control over their medical data in the EHR and deemed patients share a responsibility for the accuracy of information in their record.


2011 ◽  
Vol 20 (04) ◽  
pp. 357-370 ◽  
Author(s):  
D. PAULRAJ ◽  
S. SWAMYNATHAN ◽  
M. MADHAIYAN

One of the key challenges of the Service Oriented Architecture is the discovery of relevant services for a given task. In Semantic Web Services, service discovery is generally achieved by using the service profile ontology of OWL-S. Profile of a service is a derived, concise description and not a functional part of the semantic web service. There is no schema present in the service profile to describe the input, output (IO), and the IOs in the service profile are not always annotated with ontology concepts, whereas the process model has such a schema to describe the IOs which are always annotated with ontology concepts. In this paper, we propose a complementary sophisticated matchmaking approach which uses the concrete process model ontology of OWL-S instead of the concise service profile ontology. Empirical analysis shows that high precision and recall can be achieved by using the process model-based service discovery.


Sign in / Sign up

Export Citation Format

Share Document