Academic literature on the topic 'Information privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information privacy"
White, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.
Full textCollier, Graham. "Information privacy." Information Management & Computer Security 3, no. 1 (March 1995): 41–45. http://dx.doi.org/10.1108/09685229510792979.
Full textCamenisch, Jan. "Information privacy?!" Computer Networks 56, no. 18 (December 2012): 3834–48. http://dx.doi.org/10.1016/j.comnet.2012.10.012.
Full textLitman, Jessica. "Information Privacy/Information Property." Stanford Law Review 52, no. 5 (May 2000): 1283. http://dx.doi.org/10.2307/1229515.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textLai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang, and Willy Susilo. "Privacy-enhanced attribute-based private information retrieval." Information Sciences 454-455 (July 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Full textConger, Sue. "Personal Information Privacy." Journal of Electronic Commerce in Organizations 7, no. 1 (January 2009): 71–82. http://dx.doi.org/10.4018/jeco.2009010106.
Full textMancilla, Desla, and Sue Biedermann. "Health Information Privacy." Health Care Manager 28, no. 1 (January 2009): 71–74. http://dx.doi.org/10.1097/hcm.0b013e318196de6c.
Full textMuenchinger, Nancy E. "INFORMATION PRIVACY REGULATION:." Computer Law & Security Review 17, no. 6 (November 2001): 390–94. http://dx.doi.org/10.1016/s0267-3649(01)01107-4.
Full textLow, John. "Information and Privacy." Australian Journal of Hospital Pharmacy 28, no. 1 (February 1998): 2–3. http://dx.doi.org/10.1002/jppr19982812.
Full textDissertations / Theses on the topic "Information privacy"
Aleem, Muhammad Usman. "Essays in information privacy." Thesis, University of British Columbia, 2015. http://hdl.handle.net/2429/53940.
Full textBusiness, Sauder School of
Graduate
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Full textIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
Aron, Yotam. "Information privacy for linked data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85215.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 77-79).
As data mining over massive amounts of linked data becomes more and more prevalent in research applications, information privacy becomes a more important issue. This is especially true in the biological and medical fields, where information sensitivity is high. Previous experience has shown that simple anonymization techniques, such as removing an individual's name from a data set, are inadequate to fully protect the data's participants. While strong privacy guarantees have been studied for relational databases, these are virtually non-existent for graph-structured linked data. This line of research is important, however, since the aggregation of data across different web sources may lead to privacy leaks. The ontological structure of linked data especially aids these attacks on privacy. The purpose of this thesis is two-fold. The first is to investigate differential privacy, a strong privacy guarantee, and how to construct differentially-private mechanisms for linked data. The second involves the design and implementation of the SPARQL Privacy Insurance Module (SPIM). Using a combination of well-studied techniques, such as authentication and access control, and the mechanisms developed to maintain differential privacy over linked data, it attempts to limit privacy hazards for SPARQL queries. By using these privacy-preservation techniques, data owners may be more willing to share their data sets with other researchers without the fear that it will be misused. Consequently, we can expect greater sharing of information, which will foster collaboration and improve the types of data that researchers can have access to.
by Yotam Aron.
M. Eng.
De, Cristofaro E. "Sharing sensitive information with privacy." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1450712/.
Full textJacobsson, Andreas. "Exploring Privacy Risks in Information Networks." Licentiate thesis, Ronneby : Blekinge Institute of Technology, 2004. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/80533d43ac292724c125707f003aafbd?OpenDocument.
Full textTierney, Matthew Ryan. "Rethinking information privacy for the web." Thesis, New York University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3602740.
Full textHanni M. Fakhoury, staff attorney with the Electronic Frontier Foundation, has argued against Supreme Court Justice Samuel Alito’s opinion that society should accept a decline in personal privacy with modern technology, “Technology doesn’t involve an ‘inevitable’ tradeoff [of increased convenience] with privacy. The only inevitability must be the demand that privacy be a value built into our technology” [40]. Our position resonates with Mr. Fakhoury’s assertion for rethinking information privacy for the web. In this thesis, we present three artifacts that address the balance between usability, efficiency, and privacy as we rethink information privacy for the web.
In the first part of this thesis, we propose the design, implementation and evaluation of Cryptagram, a system designed to enhance online photo privacy. Cryptagram enables users to convert photos into encrypted images, which the users upload to Online Social Networks (OSNs). Users directly manage access control to those photos via shared keys that are independent of OSNs or other third parties. OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides image encoding and encryption protocols that are tolerant to these transformations. Cryptagram guarantees that the recipient with the right credentials can completely retrieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the original image. Cryptagram’s browser extension integrates seamlessly with preexisting OSNs, including Facebook and Google+, and currently has over 400 active users.
In the second part of this thesis, we introduce the design of Lockbox, a system designed to provide end-to-end private file-sharing with the convenience of Google Drive or Dropbox. Lockbox uniquely combines two important design points: (1) a federated system for detecting and recovering from server equivocation and (2) a hybrid cryptosystem over delta encoded data to balance storage and bandwidth costs with efficiency for syncing end-user data. To facilitate appropriate use of public keys in the hybrid cryptosystem, we integrate a service that we call KeyNet, which is a web service designed to leverage existing authentication media (e.g., OAuth, verified email addresses) to improve the usability of public key cryptography.
In the third part of this thesis, we propose a new system, Compass, which realizes the philosophical privacy framework of contextual integrity (CI) as a full OSN design. CI), which we believe better captures users privacy expectations in OSNs. In Compass, three properties hold: (a) users are associated with roles in specific contexts; (b) every piece of information posted by a user is associated with a specific context; (c) norms defined on roles and attributes of posts in a context govern how information is shared across users within that context. Given the definition of a context and its corresponding norm set, we describe the design of a compiler that converts the human-readable norm definitions to generate appropriate information flow verification logic including: (a) a compact binary decision diagram for the norm set; and (b) access control code that evaluates how a new post to a context will flow. We have implemented a prototype that shows how the philosophical framework of contextual integrity can be realized in practice to achieve strong privacy guarantees with limited additional verification overhead.
Giaconi, Giulio. "Information-theoretic privacy in smart meters." Thesis, Imperial College London, 2018. http://hdl.handle.net/10044/1/62630.
Full textCofone, Ignacio Nicolas <1987>. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.
Full textEl-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.
Full textLaufer, Deanna (Deanna Raquel). "Radio Frequency Identification : regulating information privacy protection." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.
Full textIncludes bibliographical references (p. 82-87).
As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.
(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.
by Deanna R. Laufer.
S.M.
Books on the topic "Information privacy"
1959-, Schwartz Paul M., ed. Information privacy law. 4th ed. New York: Wolters Kluwer Law & Business, 2011.
Find full textMarc, Rotenberg, and Schwartz Paul M. 1959-, eds. Information privacy law. 2nd ed. New York: Aspen Publishers, 2005.
Find full text1959-, Schwartz Paul M., ed. Information privacy law. 3rd ed. New York, NY: Aspen Publishers, 2008.
Find full textMarc, Rotenberg, ed. Information privacy law. New York: Aspen Publishers, 2003.
Find full text1959-, Schwartz Paul M., ed. Privacy, information, and technology. 3rd ed. New York: Wolters Kluwer Law & Business, 2011.
Find full textBaek, Joonsang, and Sushmita Ruj, eds. Information Security and Privacy. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5.
Full textBoyd, Colin, and Leonie Simpson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39059-3.
Full textVaradharajan, Vijay, and Yi Mu, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-47719-5.
Full textMu, Yi, Willy Susilo, and Jennifer Seberry, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70500-0.
Full textPieprzyk, Josef, Hossein Ghodosi, and Ed Dawson, eds. Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1.
Full textBook chapters on the topic "Information privacy"
Lategan, Frans, and Martin S. Olivier. "Enforcing Privacy by Withholding Private Information." In Information Security for Global Information Infrastructures, 421–30. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35515-3_43.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "Information Privacy Requirements." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1677-1.
Full textTsohou, Aggeliki, and Aikaterini Soumelidou. "Information Privacy Awareness." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1484-1.
Full textZhang, Rui. "Acquiring Key Privacy from Data Privacy." In Information Security and Cryptology, 359–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21518-6_25.
Full textAwari, G. K., and Sarvesh V. Warjurkar. "Organization Privacy." In Ethics in Information Technology, 67–102. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003280989-3.
Full textWu, Qianhong, Bo Qin, Yi Mu, and Willy Susilo. "Privacy for Private Key in Signatures." In Information Security and Cryptology, 84–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01440-6_9.
Full textVedder, Anton. "Privacy 3.0." In Information Technology and Law Series, 17–28. The Hague, The Netherlands: T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_2.
Full textDabrowski, Adrian, Katharina Krombholz, Edgar R. Weippl, and Isao Echizen. "Smart Privacy Visor: Bridging the Privacy Gap." In Business Information Systems Workshops, 235–47. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26762-3_21.
Full textGevers, Steven, and Bart De Decker. "Privacy Friendly Information Disclosure." In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 636–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11915034_87.
Full textNwankwo, Iheanyi Samuel. "Information Privacy in Nigeria." In African Data Privacy Laws, 45–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_3.
Full textConference papers on the topic "Information privacy"
Chesnokova, Lesya. "Privacy & Secrecy: The Right to Control of Personal Information." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-06.
Full textRezer, Tatiana. "Privacy Right as A Personal Value in an Information Society." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-76.
Full textGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting data privacy in private information retrieval schemes." In the thirtieth annual ACM symposium. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/276698.276723.
Full text"THE PRIVACY ADVOCATE (PRIVAD) - A Framework for Negotiating Individual Privacy Contracts." In 3rd International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0001282100880095.
Full textCaftori, Netiva, and Steve Teicher. "Information Privacy Issues in the Information Age." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2452.
Full textBhattacharya, J., S. K. Gupta, and B. Agrawal. "Protecting Privacy of Health Information through Privacy Broker." In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06). IEEE, 2006. http://dx.doi.org/10.1109/hicss.2006.402.
Full textAkyol, Emrah, Cedric Langbort, and Tamer Basar. "Privacy constrained information processing." In 2015 54th IEEE Conference on Decision and Control (CDC). IEEE, 2015. http://dx.doi.org/10.1109/cdc.2015.7402924.
Full textHsu, Hsiang, Shahab Asoodeh, and Flavio P. Calmon. "Information-Theoretic Privacy Watchdogs." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849440.
Full textAgrawal, R. "Privacy cognizant information systems." In the 10th ACM conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/948109.948111.
Full text"Publisher's Information." In Privacy: Devices, Protocols, and Applications. IEEE, 2011. http://dx.doi.org/10.1109/lightsec.2011.19.
Full textReports on the topic "Information privacy"
Popovic, Ales, H. Jeff Smith, James Y. L. Thong, and Sunil Wattal. Information Privacy. MIS Quarterly, May 2017. http://dx.doi.org/10.25300/misq/2019/curations/05292017.
Full textGallegos, J., V. Hamilton, T. Gaylor, K. McCurley, and T. Meeks. Information integrity and privacy for computerized medical patient records. Office of Scientific and Technical Information (OSTI), September 1996. http://dx.doi.org/10.2172/392809.
Full textAli, S. Nageeb, and Roland Bénabou. Image Versus Information: Changing Societal Norms and Optimal Privacy. Cambridge, MA: National Bureau of Economic Research, April 2016. http://dx.doi.org/10.3386/w22203.
Full textCurran, J., and A. Marine. Privacy and Accuracy Issues in Network Information Center Databases. RFC Editor, August 1992. http://dx.doi.org/10.17487/rfc1355.
Full textDEPARTMENT OF THE ARMY WASHINGTON DC. Information Management: Telecommunications: Record Communications and the Privacy Communications System. Fort Belvoir, VA: Defense Technical Information Center, September 1990. http://dx.doi.org/10.21236/ada402244.
Full textLi, Bing, Zhijie Wang, Dijiang Huang, and Yan Zhu. Toward Privacy-preserving Content Access Control for Information Centric Networking. Fort Belvoir, VA: Defense Technical Information Center, March 2014. http://dx.doi.org/10.21236/ada606547.
Full textCullen, Zoë, and Ricardo Perez-Truglia. The Salary Taboo: Privacy Norms and the Diffusion of Information. Cambridge, MA: National Bureau of Economic Research, October 2018. http://dx.doi.org/10.3386/w25145.
Full textHasty, III, and Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada242183.
Full textRoss, Ronald S. Assessing Security and Privacy Controls in Federal Information Systems and Organizations:. National Institute of Standards and Technology, December 2014. http://dx.doi.org/10.6028/nist.sp.800-53ar4.
Full textCuellar, J., J. Polk, J. Morris, and M. Thomson. Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information. Edited by H. Schulzrinne and H. Tschofenig. RFC Editor, January 2013. http://dx.doi.org/10.17487/rfc6772.
Full text