The Unheard Story of Organizational Motivations Towards User Privacy

Author(s):  
Awanthika Senarath ◽  
Nalin Asanka Gamagedara Arachchilage

There could be numerous reasons that drive organizations to provide privacy protections to end users in the applications they develop and maintain. Organizational motivations towards privacy affects the quality of privacy received by end users. Understanding these motivations and the approaches taken by organizations towards privacy protection would assist the policymakers and regulators to define effective frameworks encouraging organizational privacy practices. This study focuses on understanding the motivations behind organizational decisions and the approaches they take to embed privacy into the software applications. The authors analyzed 40 organizations different in size, scope, scale of operation, nature of data used, and revenue. they identified four groups of organizations characterized by the approach taken to provide privacy protection to their users. The taxonomy contributes to the organizational perspective of privacy. The knowledge presented here would help addressing the challenges in the domain of user privacy in software applications and services.

Author(s):  
Awanthika Senarath ◽  
Nalin Asanka Gamagedara Arachchilage

There could be numerous reasons that drive organizations to provide privacy protections to end users in the applications they develop and maintain. Organizational motivations towards privacy affects the quality of privacy received by end users. Understanding these motivations and the approaches taken by organizations towards privacy protection would assist the policymakers and regulators to define effective frameworks encouraging organizational privacy practices. This study focuses on understanding the motivations behind organizational decisions and the approaches they take to embed privacy into the software applications. The authors analyzed 40 organizations different in size, scope, scale of operation, nature of data used, and revenue. they identified four groups of organizations characterized by the approach taken to provide privacy protection to their users. The taxonomy contributes to the organizational perspective of privacy. The knowledge presented here would help addressing the challenges in the domain of user privacy in software applications and services.


2020 ◽  
Vol 10 (14) ◽  
pp. 4835
Author(s):  
Cheng-Te Li ◽  
Zi-Yun Zeng

Users pay increasing attention to their data privacy in online social networks, resulting in hiding personal information, such as profile attributes and social connections. While network representation learning (NRL) is widely effective in social network analysis (SNA) tasks, it is essential to learn effective node embeddings from privacy-protected sparse and incomplete network data. In this work, we present a novel NRL model to generate node embeddings that can afford data incompleteness coming from user privacy protection. We propose a structure-attribute enhanced matrix (SAEM) to alleviate data sparsity and develop a community-cluster informed NRL method, c2n2v, to further improve the quality of embedding learning. Experiments conducted across three datasets, three simulations of user privacy protection, and three downstream SNA tasks exhibit the promising performance of our NRL model SAEM+c2n2v.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3519 ◽  
Author(s):  
Ying Qiu ◽  
Yi Liu ◽  
Xuan Li ◽  
Jiahui Chen

Location-based services (LBS) bring convenience to people’s lives but are also accompanied with privacy leakages. To protect the privacy of LBS users, many location privacy protection algorithms were proposed. However, these algorithms often have difficulty to maintain a balance between service quality and user privacy. In this paper, we first overview the shortcomings of the existing two privacy protection architectures and privacy protection technologies, then we propose a location privacy protection method based on blockchain. Our method satisfies the principle of k-anonymity privacy protection and does not need the help of trusted third-party anonymizing servers. The combination of multiple private blockchains can disperse the user’s transaction records, which can provide users with stronger location privacy protection and will not reduce the quality of service. We also propose a reward mechanism to encourage user participation. Finally, we implement our approach in the Remix blockchain to show the efficiency, which further indicates the potential application prospect for the distributed network environment.


2019 ◽  
Vol 54 (6) ◽  
Author(s):  
Sawsan Ali Hamid ◽  
Rana Alauldeen Abdalrahman ◽  
Inam Abdullah Lafta ◽  
Israa Al Barazanchi

Recently, web services have presented a new and evolving model for constructing the distributed system. The meteoric growth of the Web over the last few years proves the efficacy of using simple protocols over the Internet as the basis for a large number of web services and applications. Web service is a modern technology of web, which can be defined as software applications with a programmatic interface based on Internet protocol. Web services became common in the applications of the web by the help of Universal, Description, Discovery and Integration; Web Service Description Language and Simple Object Access Protocol. The architecture of web services refers to a collection of conceptual components in which common sets of standard can be defined among interoperating components. Nevertheless, the existing Web service's architecture is not impervious to some challenges, such as security problems, and the quality of services. Against this backdrop, the present study will provide an overview of these issues. Therefore, it aims to propose web services architecture model to support distributed system in terms of application and issues.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
◽  

Abstract Patient information material (PIM) is omnipresent in healthcare. It is used to convey information or to familiarize potential end-users to offers of support. PIM recaps or elaborates on relevant information and offers recommendation for action. However, the quality of available PIM varies. When the formal and content-related quality of PIM is suboptimal, it not only fails to be effective but can also lead to uncertainty, misunderstandings, resistance or ignorance (e.g. of a support offer). Highly complex information requires much attention on the quality of the PIM, especially with respect to end-users (e.g. vulnerable groups). Excellent communication through the use of PIM is thus essential within complex interventions. Checklists, such as 'Discern' or 'PEMAT', as well as criteria catalogues or evidence-based patient information standards, may assist in the development, quality assessment and optimization of PIM. The inclusion of the end-users is recommended but for various reasons does not often take place. The innovative “integrated, cross-sectional Psycho-Oncology” (isPO) programme, offers needs-driven, professional support to all adult, newly diagnosed cancer patients early in their sickness trajectory. IsPO was developed in 2018. It was implemented and a formative evaluated in 2019. When developing this programme, different PIM were created top-down by the programme designers. During implementation, it became evident that these PIM materials required further improvement. A testing and optimization process started using the participatory health research (PHR) approach and was completed in a five-month period. A PIM-optimisation team was founded, which included the project partners involved in the network support, self-help organisations and the external evaluation institute. A practical instrument (PIM-checklist) for optimising the isPO-PIM was designed, piloted and used for testing by end-users, isPO service providers, and experts. Based on the recommendations in the checklist, the material was revised accordingly. Additionally, the PIM was completed with the design of two new components. Four optimisation rounds were conducted. The optimized PIM was tested on its comprehensibility (for end-users) and its usability (for service providers). During the presentations, the audience is invited to comment on critical questions that may appear during optimization (e.g. timing). Afterwards, there will be a skill building part with a focus on collaborative learning (45 minutes). First, we will focus on the requirements for a practical instrument that is handy for end-users, service providers and experts (mind mapping exercise). Finally, participants will be able to explore the following topics “World Café” discussion: (1) how to plan, conduct and communicate the development of optimization of PIM in a CI program, (2) what needs to be considered for the optimization (e.g. team composition, resources), and (3) how to continuously achieve end-userś participation. Key messages Excellent PIM are essential for a complex interventiońs success in practice and must include information and foster actionability. the iterative PIM design processes benefits from high user participation.


Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1139
Author(s):  
Mykola Beshley ◽  
Natalia Kryvinska ◽  
Halyna Beshley ◽  
Oleg Yaremko ◽  
Julia Pyrih

A virtual router model with a static and dynamic resource reconfiguration for future internet networking was developed. This technique allows us to create efficient virtual devices with optimal parameters (queue length, queue overflow management discipline, number of serving devices, mode of serving devices) to ensure the required level of quality of service (QoS). An analytical model of a network device with virtual routers is proposed. By means of the mentioned mathematical representation, it is possible to determine the main parameters of the virtual queue system, which are based on the first in, first out (FIFO) algorithm, in order to analyze the efficiency of network resources utilization, as well as to determine the parameters of QoS flows, for a given intensity of packets arrival at the input interface of the network element. In order to research the guaranteed level of QoS in future telecommunications networks, a simulation model of a packet router with resource virtualization was developed. This model will allow designers to choose the optimal parameters of network equipment for the organization of virtual routers, which, in contrast to the existing principle of service, will provide the necessary quality of service provision to end users in the future network. It is shown that the use of standard static network device virtualization technology is not able to fully provide a guaranteed level of QoS to all present flows in the network by the criterion of minimum delay. An approach for dynamic reconfiguration of network device resources for virtual routers has been proposed, which allows more flexible resource management at certain points in time depending on the input load. Based on the results of the study, it is shown that the dynamic virtualization of the network device provides a guaranteed level of QoS for all transmitted flows. Thus, the obtained results confirm the feasibility of using dynamic reconfiguration of network device resources to improve the quality of service for end users.


Libri ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Zongda Wu ◽  
Chenglang Lu ◽  
Youlin Zhao ◽  
Jian Xie ◽  
Dongdong Zou ◽  
...  

Abstract This paper reviews a large number of research achievements relevant to user privacy protection in an untrusted network environment, and then analyzes and evaluates their application limitations in personalized information retrieval, to establish the conditional constraints that an effective approach for user preference privacy protection in personalized information retrieval should meet, thus providing a basic reference for the solution of this problem. First, based on the basic framework of a personalized information retrieval platform, we establish a complete set of constraints for user preference privacy protection in terms of security, usability, efficiency, and accuracy. Then, we comprehensively review the technical features for all kinds of popular methods for user privacy protection, and analyze their application limitations in personalized information retrieval, according to the constraints of preference privacy protection. The results show that personalized information retrieval has higher requirements for users’ privacy protection, i.e., it is required to comprehensively improve the security of users’ preference privacy on the untrusted server-side, under the precondition of not changing the platform, algorithm, efficiency, and accuracy of personalized information retrieval. However, all kinds of existing privacy methods still cannot meet the above requirements. This paper is an important study attempt to the problem of user preference privacy protection of personalized information retrieval, which can provide a basic reference and direction for the further study of the problem.


2020 ◽  
Vol 195 ◽  
pp. 105679
Author(s):  
Zongda Wu ◽  
Shigen Shen ◽  
Xinze Lian ◽  
Xinning Su ◽  
Enhong Chen

Sign in / Sign up

Export Citation Format

Share Document