Dissertations / Theses on the topic 'Information privacy'

To see the other types of publications on this topic, follow the link: Information privacy.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Aleem, Muhammad Usman. "Essays in information privacy." Thesis, University of British Columbia, 2015. http://hdl.handle.net/2429/53940.

Full text
Abstract:
This thesis explores absence of proficient online privacy markets, where sellers can offer privacy enhanced services to consumers, who value privacy. Over three papers, I provide insight to aspects that hinder these markets and potential ways to remedy them. In the first paper, I contend that the changing nature of transactions in online markets – transactions that include consumers’ personal information – has introduced another aspect of uncertainty: privacy uncertainty. I theoretically explore the relationship among privacy uncertainty and seller and product uncertainty. Since uncertainty is the result of information asymmetry, I delve deeper into the nature of information asymmetry by distinguishing between its pre-purchase and post-purchase aspects and their respective effects on privacy uncertainty. Using lab experiments, I demonstrate that post-purchase information asymmetry leads to higher privacy uncertainty, a result that discredits the contemporary practice of using “notice and consent” in online markets. The second paper explores how sellers can improve the communication of their privacy practices and profit from them. To achieve this I define what good privacy practices mean and describe how to measure the quality of such practices. I theorize that app sellers can make better privacy claims if they also include data that supports their privacy claims and provide information about the practices of other similar app sellers (category-claims). I study these propositions across three experiments and find that category claims lead to greater perception of privacy quality as well as willingness to buy. While prior privacy literature has placed an emphasis on understanding consumer privacy preferences at the time of information disclosure, the last paper explores what happens after the information has been disclosed. In particular, I am interested in understanding consumers’ behavior after they experience a privacy failure, which occurs when consumer’s expectations about collection, use and protection of their personal information are disconfirmed. Using the critical incidence technique, we surveyed 321 individuals who had experienced a privacy failure and found that consumers predominantly react by exhibiting “helplessness”, which can be alleviated by providing a simple recovery mechanisms and privacy controls that enable consumers to add, remove and monitor their collected personal information.
Business, Sauder School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
2

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.
In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
APA, Harvard, Vancouver, ISO, and other styles
3

Aron, Yotam. "Information privacy for linked data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85215.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2013.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 77-79).
As data mining over massive amounts of linked data becomes more and more prevalent in research applications, information privacy becomes a more important issue. This is especially true in the biological and medical fields, where information sensitivity is high. Previous experience has shown that simple anonymization techniques, such as removing an individual's name from a data set, are inadequate to fully protect the data's participants. While strong privacy guarantees have been studied for relational databases, these are virtually non-existent for graph-structured linked data. This line of research is important, however, since the aggregation of data across different web sources may lead to privacy leaks. The ontological structure of linked data especially aids these attacks on privacy. The purpose of this thesis is two-fold. The first is to investigate differential privacy, a strong privacy guarantee, and how to construct differentially-private mechanisms for linked data. The second involves the design and implementation of the SPARQL Privacy Insurance Module (SPIM). Using a combination of well-studied techniques, such as authentication and access control, and the mechanisms developed to maintain differential privacy over linked data, it attempts to limit privacy hazards for SPARQL queries. By using these privacy-preservation techniques, data owners may be more willing to share their data sets with other researchers without the fear that it will be misused. Consequently, we can expect greater sharing of information, which will foster collaboration and improve the types of data that researchers can have access to.
by Yotam Aron.
M. Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

De, Cristofaro E. "Sharing sensitive information with privacy." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1450712/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobsson, Andreas. "Exploring Privacy Risks in Information Networks." Licentiate thesis, Ronneby : Blekinge Institute of Technology, 2004. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/80533d43ac292724c125707f003aafbd?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tierney, Matthew Ryan. "Rethinking information privacy for the web." Thesis, New York University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3602740.

Full text
Abstract:

Hanni M. Fakhoury, staff attorney with the Electronic Frontier Foundation, has argued against Supreme Court Justice Samuel Alito’s opinion that society should accept a decline in personal privacy with modern technology, “Technology doesn’t involve an ‘inevitable’ tradeoff [of increased convenience] with privacy. The only inevitability must be the demand that privacy be a value built into our technology” [40]. Our position resonates with Mr. Fakhoury’s assertion for rethinking information privacy for the web. In this thesis, we present three artifacts that address the balance between usability, efficiency, and privacy as we rethink information privacy for the web.

In the first part of this thesis, we propose the design, implementation and evaluation of Cryptagram, a system designed to enhance online photo privacy. Cryptagram enables users to convert photos into encrypted images, which the users upload to Online Social Networks (OSNs). Users directly manage access control to those photos via shared keys that are independent of OSNs or other third parties. OSNs apply standard image transformations (JPEG compression) to all uploaded images so Cryptagram provides image encoding and encryption protocols that are tolerant to these transformations. Cryptagram guarantees that the recipient with the right credentials can completely retrieve the original image from the transformed version of the uploaded encrypted image while the OSN cannot infer the original image. Cryptagram’s browser extension integrates seamlessly with preexisting OSNs, including Facebook and Google+, and currently has over 400 active users.

In the second part of this thesis, we introduce the design of Lockbox, a system designed to provide end-to-end private file-sharing with the convenience of Google Drive or Dropbox. Lockbox uniquely combines two important design points: (1) a federated system for detecting and recovering from server equivocation and (2) a hybrid cryptosystem over delta encoded data to balance storage and bandwidth costs with efficiency for syncing end-user data. To facilitate appropriate use of public keys in the hybrid cryptosystem, we integrate a service that we call KeyNet, which is a web service designed to leverage existing authentication media (e.g., OAuth, verified email addresses) to improve the usability of public key cryptography.

In the third part of this thesis, we propose a new system, Compass, which realizes the philosophical privacy framework of contextual integrity (CI) as a full OSN design. CI), which we believe better captures users privacy expectations in OSNs. In Compass, three properties hold: (a) users are associated with roles in specific contexts; (b) every piece of information posted by a user is associated with a specific context; (c) norms defined on roles and attributes of posts in a context govern how information is shared across users within that context. Given the definition of a context and its corresponding norm set, we describe the design of a compiler that converts the human-readable norm definitions to generate appropriate information flow verification logic including: (a) a compact binary decision diagram for the norm set; and (b) access control code that evaluates how a new post to a context will flow. We have implemented a prototype that shows how the philosophical framework of contextual integrity can be realized in practice to achieve strong privacy guarantees with limited additional verification overhead.

APA, Harvard, Vancouver, ISO, and other styles
7

Giaconi, Giulio. "Information-theoretic privacy in smart meters." Thesis, Imperial College London, 2018. http://hdl.handle.net/10044/1/62630.

Full text
Abstract:
Smart grids promise to enhance drastically the efficiency of today's power networks. One of the key components of smart grids is the smart meter, which allows to monitor a user's electricity consumption with much higher resolution compared to conventional energy meters. However, the high resolution of smart meter measurements also entails serious privacy implications for the users, as it makes easier to distinguish the power signature of single appliances from the aggregate household consumption. This would lead an attacker, which may be a thief, a surveillance agency, or the utility provider itself, to gain insights into users' activities and behaviors. In this dissertation we analyze several privacy-preserving techniques that protect users' privacy without diminishing the utility of smart grids. We adopt physical resources that are increasingly available at the users' premises, such as renewable energy sources and rechargeable batteries, and use them to minimize the information leaked about a user's electricity consumption, as well as the cost of energy. We deploy information-theoretic tools to characterize the fundamental limits of smart meter privacy, measuring privacy via mutual information, and characterizing single-letter expressions for the information leaked when considering infinite and zero-capacity rechargeable batteries. These scenarios represent lower and upper bounds on the privacy performance of more realistic settings with finite-capacity rechargeable batteries. When considering a finite-capacity battery, we express the information leakage as an additive quantity, and cast the problem as a stochastic control problem, which can be solved by dynamic programming. We also propose more empirical privacy-preserving strategies, testing their performance against real smart meter measurements and time of use pricing tariffs. In particular, we measure privacy as the squared difference between the smart meter measurements and a target profile, which we consider as a completely private power profile, and characterize the optimal trade-off between privacy and cost of energy.
APA, Harvard, Vancouver, ISO, and other styles
8

Cofone, Ignacio Nicolas <1987&gt. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.

Full text
Abstract:
The thesis aims to make the dynamics of the tradeoffs involving privacy more visible; both theoretically and in two of the central current policy debates in European data protection law, the right to be forgotten and online tracking. In doing so, it offers an explanation for data protection law from an economic perspective and provides a basis for the evaluation of further data protection measures.
APA, Harvard, Vancouver, ISO, and other styles
9

El-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.

Full text
Abstract:
This thesis considers how an information privacy system can and should develop in Libya. Currently, no information privacy system exists in Libya to protect individuals when their data is processed. This research reviews the main features of privacy law in several key jurisdictions in light of Libya's social, cultural, and economic context. The thesis identifies the basic principles that a Libyan privacy law must consider, including issues of scope, exceptions, principles, remedies, penalties, and the establishment of a legitimate data protection authority. This thesis concludes that Libya should adopt a strong information privacy law framework and highlights some of the considerations that will be relevant for the Libyan legislature.
APA, Harvard, Vancouver, ISO, and other styles
10

Laufer, Deanna (Deanna Raquel). "Radio Frequency Identification : regulating information privacy protection." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41767.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2007.
Includes bibliographical references (p. 82-87).
As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and things, and the possibility of using the information for marketing, tracking, or even spying, numerous consumer groups are spearheading efforts to ensure that RFID does not breach their privacy rights. While there are some privacy laws regulating specific aspects of commerce, there are no laws which currently apply to the collection and use of information as it pertains to RFID. This lack of formal regulation allows companies to legally engage in practices which may encroach on consumers' privacy. However, RFID has the potential to optimize supply chain practices as well as provide other benefits to both consumers and businesses. As RFID use becomes more widespread, regulatory strategies should be considered to protect consumers' right to privacy while obtaining the benefits of using the technology. This thesis explores consumer and industry opinion of RFID through a customized survey. Results of the survey found that consumer and industry opinion are similar in many aspects, especially in the concern for protecting privacy and the desire for a regulatory mechanism to enforce those privacy rights. This thesis addresses the question of whether market-based solutions, self-regulation, or government regulation is the best option for addressing consumers' legitimate concerns of privacy while allowing businesses to reap the benefits of using the technology.
(cont.) The regulatory options are compared and then discussed based on the needs of consumers and industry members as determined by the survey. Finally, four recommendations are suggested to provide guidance for ensuring a positive acceptance of RFID while acknowledging the privacy rights of consumers.
by Deanna R. Laufer.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
11

Calmon, Flavio du Pin. "Information-theoretic metrics for security and privacy." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101567.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 143-150).
In this thesis, we study problems in cryptography, privacy and estimation through the information-theoretic lens. We introduce information-theoretic metrics and associated results that shed light on the fundamental limits of what can be learned from noisy data. These metrics and results, in turn, are used to evaluate and design both symmetric-key encryption schemes and privacy-assuring mappings with provable information-theoretic security guarantees. We start by studying information-theoretic properties of symmetric-key encryption in the "small key" regime (i.e. when the key rate is smaller than the entropy rate of the message source). It is well known that security against computationally unbounded adversaries in such settings can only be achieved when the communicating parties share a key that is at least as long as the secret message (i.e. plaintext) being communicated, which is infeasible in practice. Nevertheless, even with short keys, we show that a certain level of security can be guaranteed, albeit not perfect secrecy. In order to quantify exactly how much security can be provided with short keys, we propose a new security metric, called symbol secrecy, that measures how much an adversary that observes only the encrypted message learns about individual symbols of the plaintext. Unlike most traditional rate-based information-theoretic metrics for security, symbol secrecy is non-asymptotic. Furthermore, we demonstrate how fundamental symbol secrecy performance bounds can be achieved through standard code constructions (e.g. Reed-Solomon codes). While much of information-theoretic security has considered the hiding of the plaintext, cryptographic metrics of security seek to hide functions thereof. Consequently, we extend the definition of symbol secrecy to quantify the information leaked about certain classes of functions of the plaintext. This analysis leads to a more general question: can security claims based on information metrics be translated into guarantees on what an adversary can reliably infer from the output of a security system? On the one hand, information metrics usually quantify how far the probability distribution between the secret and the disclosed information is from the ideal case where independence is achieved. On the other hand, estimation guarantees seek to assure that an adversary cannot significantly improve his estimate of the secret given the information disclosed by the system. We answer this question in the positive, and present formulations based on rate-distortion theory that allow security bounds given in terms of information metrics to be transformed into bounds on how well an adversary can estimate functions of secret variable. We do this by solving a convex program that minimizes the average estimation error over all possible distributions that satisfy the bound on the information metric. Using this approach, we are able to derive a set of general sharp bounds on how well certain classes of functions of a hidden variable can(not) be estimated from a noisy observation in terms of different information metrics. These bounds provide converse (negative) results: If an information metric is small, then any non-trivial function of the hidden variable cannot be estimated with probability of error or mean-squared error smaller than a certain threshold. The main tool used to derive the converse bounds is a set of statistics known as the Principal Inertia Components (PICs). The PICs provide a fine-grained decomposition of the dependence between two random variables. Since there are well-studied statistical methods for estimating the PICs, we can then determine the (im)possibility of estimating large classes of functions by using the bounds derived in this thesis and standard statistical tests. The PICs are of independent interest, and are applicable to problems in information theory, statistics, learning theory, and beyond. In the security and privacy setting, the PICs fulfill the dual goal of providing (i) a measure of (in)dependence between the secret and disclosed information of a security system, and (ii) a complete characterization of the functions of the secret information that can or cannot be reliably inferred given the disclosed information. We study the information-theoretic properties of the PICs, and show how they characterize the fundamental limits of perfect privacy. The results presented in this thesis are applicable to estimation, security and privacy. For estimation and statistical learning theory, they shed light on the fundamental limits of learning from noisy data, and can help guide the design of practical learning algorithms. Furthermore, as illustrated in this thesis, the proposed converse bounds are particularly useful for creating security and privacy metrics, and characterize the inherent trade-off between privacy and utility in statistical data disclosure problems. The study of security systems through the information-theoretic lens adds a new dimension for understanding and quantifying security against very powerful adversaries. Furthermore, the framework and metrics discussed here provide practical insight on how to design and improve security systems using well-known coding and optimization techniques. We conclude the thesis by presenting several promising future research directions.
by Flavio du Pin Calmon.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
12

Dahlstrom, Glenda. "Privacy and confidentiality of patient health information." MU has:, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3052167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tsai, Janice Y. "The Impact of Salient Privacy Information on Decision-Making." Research Showcase @ CMU, 2009. http://repository.cmu.edu/dissertations/1.

Full text
Abstract:
People value their privacy; however, they typically do not make the protection of their privacy a priority. Privacy is oftentimes not tangible, complicating the efforts of technology users to express and act according to their privacy needs. Additionally, people may not be fully aware of the risks they are subjecting themselves to once they use the Internet for financial transactions, or create profiles on online social networks. Companies post privacy policies inform people about their informational practices; but, this information is extremely difficult to use and typically not considered in users’ decision-making processes. Privacy concerns have also had an impact on users’ adoption of new technologies that share personal information. A plethora of mobile location-finding technologies applications have become available over the last two decades, but the products and services offered by the technology developers may not comprehensively address the privacy implications and privacy concerns surrounding their use. The design considerations for these products may not provide the necessarily amount of control or risk mitigation for users to ensure that their location information is not misused. In this thesis, I focus on the impact of salient privacy information on privacy concerns and behavior in two contexts: online shopping and the use of a mobile-location sharing technology. I examine several case studies focusing on the evolution of privacy attitudes after people use specific technologies. Based on the examination of the use of a location-sharing system, I highlight several design considerations for mobile-location application developers to ensure they address their users privacy concerns. I use the results of online surveys and user studies to provide concrete information on the impact of feedback on the comfort with using location-sharing technology. This research shows that users will pay a premium to purchase from websites that offer better privacy policies IF that privacy information is made visible and understandable. This research points to the importance of control in the management of privacy concerns. Whether it be mandated by legislation, or recommended in industry standards or design standards, offering users control in the form of understandable privacy policy information, or control over the disclosure of personal information by technology, is essential.
APA, Harvard, Vancouver, ISO, and other styles
14

Mao, Congcong. "Privacy Issues in IoT : Privacy concerns in smart home." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90587.

Full text
Abstract:
In a world of the Internet of Things, smart home has shown a great potency and trend. A smart home is a convenient home setup where appliances and devices can be automatically controlled remotely from any internet-connected place in the world using a mobile or other networked device. Smart home has changed the way the residents interacted with their home and realised more convenience. Although this technology also has positive impact on saving energy and resources, privacy issues in it have shown to one of the biggest obstacles to the adaption of this technology. The purpose of this thesis is to study smart home users’ perceptions of smart homes and their privacy awareness and concerns. The research was conducted through interviews and followed an interpretive research paradigm and a qualitative research approach. In this study, 5 smart home owners were interviewed to investigate their reasons for purchasing IoT devices, their perceptions of smart home privacy risks, and actions to protect their privacy, as well as managing IoT devices and/or its data. The research results show that there are privacy risks existing in smart homes. Consumers’ privacy data is collected secretly, which needs to be controlled, and privacy issues have to be addressed in the near future for the smart home to be fully adopted by the society.
APA, Harvard, Vancouver, ISO, and other styles
15

Holmstrup, Mark A. "Privacy protection standards for the information sharing environment." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FHolmstrup.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Bergin, Richard D. ; Josefek, Robert A. "September 2009." Description based on title screen as viewed on November 9, 2009. Author(s) subject terms: Information Sharing Environment, privacy, collaboration, constitutionality, Transportation Security Administration, Program Manager Information Sharing Environment, information sharing. Includes bibliographical references (p. 89-96). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Dayan, Michael Oved. "Privacy boundaries : stories of protecting personal autonomy in the information age." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85147.

Full text
Abstract:
In 1890, lawyers Samuel Warren and Louis Brandeis conceived of a "sacred" right, the right to "be let alone." They argued for this right as a measure of "retreat from the world" for protection of an individual's "inviolate personality." Their argument was born in response to intrusions made possible with technological developments in printing and photography. For over a 100-year period, the concept of privacy has received attention from a multi-disciplinary collection of scholars. Despite this significant attention, however, relatively little consideration has been paid to conceptualizations of privacy in the everyday. My dissertation utilizes the focus group method to access individuals' stories about privacy in everyday lives. The unit of the story is important because it contains rich connotative language, imbued with meaning. My method of analysis is inspired primarily by Michel de Certeau and Clifford Geertz. This analysis reveals four significant themes, all linking back to Warren and Brandeis's original conceptualization in thinking about privacy in the everyday: it is associated with fears, it is considered a defence against surveillance, it is conceived of in metaphorical terms as a protective boundary, and it protects personal information and individual autonomy. This dissertation explores how individuals articulate these themes. It finds that individuals apply the language of space as a framework in which to believe their privacy is protected from surveillance.
APA, Harvard, Vancouver, ISO, and other styles
17

Stenmark, Daniel, and Andersson Jesper. "Privacy Paradox : En kvalitativ kartläggning." Thesis, Uppsala universitet, Institutionen för informatik och media, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-390053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dayarathna, Rasika. "Discovering Constructs and Dimensions for Information Privacy Metrics." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-89336.

Full text
Abstract:
Privacy is a fundamental human right. During the last decades, in the information age, information privacy has become one of the most essential aspects of privacy. Information privacy is concerned with protecting personal information pertaining to individuals. Organizations, which frequently process the personal information, and individuals, who are the subjects of the information, have different needs, rights and obligations. Organizations need to utilize personal information as a basis to develop tailored services and products to their customers in order to gain advantage over their competitors. Individuals need assurance from the organizations that their personal information is not changed, disclosed, deleted or misused in any other way. Without this guarantee from the organizations, individuals will be more unwilling to share their personal information. Information privacy metrics is a set of parameters used for the quantitative assessment and benchmark of an organization’s measures to protect personal information. These metrics can be used by organizations to demonstrate, and by individuals to evaluate, the type and level of protection given to personal information. Currently, there are no systematically developed, established or widely used information privacy metrics. Hence, the purpose of this study is to establish a solid foundation for building information privacy metrics by discovering some of the most critical constructs and dimensions of these metrics.  The research was conducted within the general research strategy of design science and by applying research methods such as data collection and analysis informed by grounded theory as well as surveys using interviews and questionnaires in Sweden and in Sri Lanka. The result is a conceptual model for information privacy metrics including its basic foundation; the constructs and dimensions of the metrics.

At the time of the doctoral defense, the following paper was unpublished and had a status as follows: Paper 6: Accepted.

APA, Harvard, Vancouver, ISO, and other styles
19

Balan, Khalil. "User perspective of privacy and surveillance on social networks." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-63876.

Full text
Abstract:
Social networks have integrated into people’s daily lives and they became a powerful medium for effective marketing and communication worldwide. Problem raise when governments and special agencies violate users’ information privacy under the pretext of protecting national security or something as, furthermore, when information became the source of income for social networks it became necessary to investigate users concerns about informational privacy on social platforms, if there are. The main purpose of the thesis is to understand what level of privacy awareness users on social networks have and how much relevant knowledge about surveillance on social networks they recognize. Moreover, the thesis aims to present users’ opinion about surveillance on Facebook and if they accept to be surveyed in certain scenarios. As results, the study has identified ambiguity in Facebook terms and data policy, while there has been clarity that Facebook applies massive surveillance in terms of data collection on all users on the network. 71% of the participants had concerns about their privacy on social networks, two-thirds of the participants didn’t read Facebook terms and 76% did believe that social networks sell users information for own benefits. The majority of the interview participants showed lack of knowledge about data collection on social networks, and didn’t know if governments do surveillance on social platforms or not. However, 37% of the survey participants claimed that they have nothing to hide and governments can look into their activities online, and almost similar percentage supported such an action. Further, most of the interview participants protect their informational privacy on social networks by having good privacy settings, controlling who have access to certain posts or managing friends list. However, 1/3 of the participants who had good privacy settings didn’t know all their friends on FB. Through personal observations on data analysis and literature review, I concluded the thesis with some suggestions of possible approaches to enhance information privacy, these recommendations present my own thoughts and weren’t derived in academic way rather personal notes during the thesis study.
APA, Harvard, Vancouver, ISO, and other styles
20

Hering, Ana-Klara. "Post-mortem relational privacy expanding the sphere of personal information protected by privacy law /." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Stewart, Michael Clark. "How Private is Private?: Effects of Degree of Information Sharing on Group Ideation." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23238.

Full text
Abstract:
Many Computer-Supported Cooperative Work (CSCW) applications go to great lengths to maximize transparency by making available participants\' actions and respective application states to all others in real-time. Designers might intend to enhance coordination through increased transparency, but what other outcomes might be influenced by these choices? We developed two versions of a CSCW application to support a group idea generation task for collocated groups. One version had diminished transparency in comparison to the other. We studied the effects of this varied transparency on the groups\' generativity and collaboration. We found that in modulating transparency there was a trade-off between generativity and collaboration. Groups with diminished transparency felt that their groupmates built on their ideas more, but groups with increased transparency were more generative. These findings are tentative but suggest that the full story of group vs. solitary, private vs. public manipulations of technology, at least in the area of idea generation, is not yet sufficiently theorized or understood.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
22

An, Nan. "Protect Data Privacy in E-Healthcare in Sweden." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1619.

Full text
Abstract:

Sweden healthcare adopted much ICT (information and communication technology). It is a highly information intensive place. This thesis gives a brief description of the background of healthcare in Sweden and ICT adoption in healthcare, introduces an Information system security model, describes the technology and law about data privacy and carries out a case through questionnaire and interview.

APA, Harvard, Vancouver, ISO, and other styles
23

Aldhaheri, Omar. "Factors influencing information privacy in Abu Dhabi Emirate." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/22485.

Full text
Abstract:
Individuals in the UAE and Abu Dhabi Emirate, in particular, have become increasingly concerned about their private information. This is mainly due to the use of technology, which makes accessing, transmitting and editing personal information faster and easier. Besides the use of technology, and the awareness and understanding of the privacy of expatriates, working in Abu Dhabi Emirate has had an impact on UAE citizens in terms of their rights to privacy. There is a need for organisations to comply with international bodies in protecting individuals rights to privacy and to increase the exploration of culturally sensitive information in the media. These issues have all led to the importance of and need to explore and identify Abu Dhabi Emirate employees perceptions, and the factors influencing their behaviour, towards privacy. The aim of this research was to investigate and analyse factors influencing employees information privacy behaviour and employees perceptions, awareness and behaviour on the handling of private information in the Abu Dhabi Emirate public sector, ADEC, as well as to provide practical recommendations to improve the privacy. The research methods used in this project are based on a mixed-method approach comprising both quantitative and qualitative strategies. Qualitative data collection in this research included face-to-face interviews and focus groups with Abu Dhabi Education Council. Quantitative surveys for all the Abu Dhabi Education Council were also utilised. The research identified the types of information that were considered private and defined privacy in the context of UAE culture. The main factors influencing privacy in Abu Dhabi Emirate employees were identified and analysed such as national culture, organisation culture and perceived benefits as examples. Following this, practical recommendations for changes to promote and enhance privacy in Abu Dhabi Emirate were offered. A model has been developed and designed based on the factors influencing individual information behaviour regarding private information handling, interrelated and influenced. This is essential to provide a practical model capable of acting as a guideline to help organisations, decision makers, and strategic planners in the Abu Dhabi Emirate public sector decide how best to approach privacy policy.
APA, Harvard, Vancouver, ISO, and other styles
24

Jacobsson, Andreas. "Privacy and security in Internet-based information systems." Doctoral thesis, Karlskrona : Department of Systems and Software Engineering, Blekinge Institute of Technology, 2008. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/f26dd7141e165324c12573f6002db90c?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Proaño, Lozada Alejandro Adrián. "Privacy of Contextual Information in Wireless Sensor Networks." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/577358.

Full text
Abstract:
Continuous advances in electronics, wireless technologies, manufacturing processes, and software engineering have led to the proliferation of a plethora of mobile devices — mobile phones, tablets, wearables, sensors, smart consumer electronics, etc. — in our everyday lives. The interconnection of these devices into a single web of communication, information, and computation gives rise to a densely meshed wireless ecosystem that transforms the way users interact with their environment. However, ubiquitous interactions with devices that collect data about user activities pose challenging privacy and security problems. Without protection mechanisms, the systems we deploy breach user privacy, often without the user’s knowledge or consent. The collected information could reveal the user whereabouts, track his motion through space, infer his habits and personal preferences, record user relationships, acquaintances, and contacts, and compromise sensitive information. We investigate the leakage of the so-called contextual information in wireless communications. We focus on event-driven wireless sensor networks (WSNs), whereby wireless transmissions are triggered upon the detection of important events such as the detection of an object of interest, the recording of an abnormal physical parameter, etc. Privacy in event-driven WSNs is particularly important, because traffic patterns can be directly associated to events. We devise general traffic analysis techniques for extracting contextual information from WSN communications. We further investigate the inference of contextual information when the WSN transmissions are protected by traffic normalization methods, which rely on statistical source anonymity (SSA). To counter traffic analysis, we develop resource-efficient communication and routing methods for reporting events over multi-hop routes without revealing the event location and occurrence time, as well as the location of the sink. Our work explores the tradeoff between the communication overhead for normalizing traffic and the end-to-end real packet delay for delivering the event report to the sink. This is achieved by limiting the number of fake transmissions for obfuscating traffic patterns. To do so, we map the problem of selecting fake sources to the problem of finding a minimum connected dominating set (MCDS) that covers the WSN deployment area. We then impose transmission schedules on the fake sources to accelerate the delivery of real event reports. Finally, we propose strong privacy traffic normalization techniques that reduce the number of fake transmissions without relying on the concept of statistical source anonymity. In the proposed solution, the WSN is partitioned into connected dominating sets (CDSs) that are activated in a round-robin fashion. We show that our methods reduce the communication by several orders of magnitude, while maintaining privacy under strong adversary models.
APA, Harvard, Vancouver, ISO, and other styles
26

Ericson, Johannes, and Vahab Bayati. "Are you concerned? : A study of the consumers’ concern about the information the organizations’ gather about them." Thesis, Umeå University, Umeå School of Business, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1711.

Full text
Abstract:

The current information society is collecting information about individual needs, wants and desires continuously with the help of new technologies. Information systems, such as consumer relationship management (CRM) have a crucial importance when providing personalized services to the customers. This is done by gathering, storing, maintaining and distributing important consumer knowledge throughout the organization. (Chen & Popovich, 2003) However as previous studies have shown, consumers are becoming increasingly concerned about threats to their personal privacy when new technologies are integrated into the society (e.g. Cranor et al, 1999; Kervenoael et al, 2007). As these emerging issues are becoming more common in the consumers’ daily lives, it is of great importance to discover their perceptions about it. Hence, the purpose of this study is to examine the consumers’ perception about their privacy and how they affiliate with their personal information being processed in various organizations.

The theoretical framework suggests that several factors affects the consumers comfort in sharing personal information to companies, such as the physical environment of the organization, which type of information that is shared, what organization that stores and uses the information, the psychological distance the actors have to each other and how much control the consumers have over the use of their personal information. A selfadministered questionnaire was used to collect the data. The results showed that the majority of the respondents were concerned about the information that is gathered about them, which further emphasises the importance of this study. It was evident that the respondents were more willing to provide demographic and lifestyle information, rather than financial and purchase related information. The results also showed a variation depending on which organization that is considered. The various organizations were categorized into four different groups; Intimate distance, personal distance, social distance and public distance, depending on the respondents’ perceived comfort in sharing their personal information with them.

Some significant differences were observed between the various demographic groups as well. One of the findings indicates that men appear to be more comfortable in sharing their personal information to certain companies in comparison to women, due to a higher intellectual risk-propensity. It is argued that the consumers concern for privacy is an important issue to consider for companies. In order to maintain a strong relationship with their customers it should be integrated as an essential part of their CRM-strategies to make their information gathering techniques more efficient.

APA, Harvard, Vancouver, ISO, and other styles
27

Tian, Yuan. "Privacy Preserving Information Sharing in Modern and Emerging Platforms." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1186.

Full text
Abstract:
Users share a large amount of information with modern platforms such as web platforms and social platforms for various services. However, they face the risk of information leakage because modern platforms still lack proper security policies. Existing security policies, such as permission systems and isolation, can help regulate information sharing. However, these policies have problems, such as coarse granularity, bad usability, and incompleteness, especially when new features are introduced. I investigate the security impacts of new features in web and mobile platforms and find design problems that lead to user information leakage. Based on these analyses, I propose design principles for permission systems that mediate how information should be shared in modern and emerging platforms, such as web and social platforms, to provide functionality with privacy preserved. I aim to design permission systems that only allow least-privilege information access. Specifically, I utilize program analysis and natural language processing to understand how applications use sensitive data and correlate these data with their functionality. With this understanding, I design schemes that ask for user consent about unexpected information access and automatically reduce overprivileged access. I provide guidelines for platform designers to build their permission systems according to respective adversary models and resources. In particular, I implement the new permission system for social platforms and Internet of Things (IoT) platforms that enable least-privilege information sharing. For the social platforms, I incorporate the primitives of Opaque handle, Opaque display, and User-driven access control (OOU) to design a least-privilege, user-friendly, developer-friendly, and feature-rich permission system. According to my study on Facebook, OOU can be applied to remove or replace 81.2% of sensitive permission instances without affecting functionality. For IoT platforms, I present a new authorization framework, SmartAuth, that supports user-centric, semantic-based authorization. SmartAuth automatically collects security-relevant information from an IoT application’s description, code, and annotations, and generates an authorization user interface to bridge the gap between the functionalities explained to the user and the operations the application actually performs.
APA, Harvard, Vancouver, ISO, and other styles
28

Watson, Lisa. "Privacy of personal information on the Internet, do privacy concerns affect on-line consumer transactions?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0004/MQ43354.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Watson, Lisa (Lisa M. ). Carleton University Dissertation Management Studies. "Privacy of personal information on the Internet; do privacy concerns affect on-line consumer transactions?" Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kittichokechai, Kittipong. "Communication With Reconstruction and Privacy Constraints." Doctoral thesis, KTH, Kommunikationsteori, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145134.

Full text
Abstract:
Communication networks are an integral part of the Internet of Things (IoT) era. They enable endless opportunities for connectivity in a wide range of applications, leading to advances in efficiency of day-to-day life. While creating opportunities, they also incur several new challenges. In general, we wish to design a system that performs optimally well in all aspects. However, there usually exist competing objectives which lead to tradeoffs. In this thesis, driven by several applications, new features and objectives are included into the system model, making it closer to reality and needs. The results presented in this thesis aim at providing insight into the fundamental tradeoff of the system performance which can serve as a guideline for the optimal design of real-world communication systems. The thesis is divided into two parts. The first part considers the aspect of signal reconstruction requirement as a new objective in the source and channel coding problems. In this part, we consider the framework where the quality and/or availability of the side information can be influenced by a cost-constrained action sequence. In the source coding problem, we impose a constraint on the reconstruction sequence at the receiver that it should be reproduced at the sender, and characterize the fundamental tradeoff in the form of the rate-distortion-cost region, revealing the optimal relation between compression rate, distortion, and action cost. The channel coding counterpart is then studied where a reconstruction constraint is imposed on the channel input sequence such that it should be reconstructed at the receiver. An extension to the multi-stage channel coding problem is also considered where inner and outer bounds to the capacity region are given. The result on the channel capacity reveals interesting consequence of imposing an additional reconstruction requirement on the system model which has a causal processing structure. In the second part, we consider the aspect of information security and privacy in lossy source coding problems. The sender wishes to compress the source sequence in order to satisfy a distortion criterion at the receiver, while revealing only limited knowledge about the source to an unintended user. We consider three different aspects of information privacy. First, we consider privacy of the source sequence against the eavesdropper in the problem of source coding with action-dependent side information. Next, we study privacy of the source sequence due to the presence of a public helper in distributed lossy source coding problems. The public helper is assumed to be either a user who provides side information over a public link which can be eavesdropped, or a legitimate user in the network who helps to relay information to the receiver, but may not ignore the information that is not intended for it. Lastly, we take on a new perspective of information privacy in the source coding problem. That is, instead of protecting the source sequence, we are interested in the privacy of the reconstruction sequence with respect to a user in the system. For above settings, we provide the complete characterization of the rate-distortion(-cost)-leakage/equivocation region or corresponding inner and outer bounds for discrete memoryless systems.

QC 20140514

APA, Harvard, Vancouver, ISO, and other styles
31

Awwal, Mohammad Abdul. "An Empirical Investigation of the Relationship between Computer Self-Efficacy and Information Privacy Concerns." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/82.

Full text
Abstract:
The Internet and the growth of Information Technology (IT) and their enhanced capabilities to collect personal information have given rise to many privacy issues. Unauthorized access of personal information may result in identity theft, stalking, harassment, and other invasions of privacy. Information privacy concerns are impediments to broad-scale adoption of the Internet for purchasing decisions. Computer self-efficacy has been shown to be an effective predictor of behavioral intention and a critical determinant of intention to use Information Technology. This study investigated the relationship between an individual's computer self-efficacy and information privacy concerns; and also examined the differences among different age groups and between genders regarding information privacy concerns and their relationships with computer self-efficacy. A paper-based survey was designed to empirically assess computer self-efficacy and information privacy concerns. The survey was developed by combining existing validated scales for computer self-efficacy and information privacy concerns. The target population of this study was the residents of New Jersey, U.S.A. The assessment was done by using the mall-intercept approach in which individuals were asked to fill out the survey. The sample size for this study was 400 students, professionals, and mature adults. The Shapiro-Wilk test was used for testing data normality and the Spearman rank-order test was used for correlation analyses. MANOVA test was used for comparing mean values of computer self-efficacy and information privacy concerns between genders and among age groups. The results showed that the correlation between computer self-efficacy and information privacy concerns was significant and positive; and there were differences between genders and among age groups regarding information privacy concerns and their relationships with computer self-efficacy. This study contributed to the body of knowledge about the relationships among antecedents and consequences of information privacy concerns and computer self-efficacy. The findings of this study can help corporations to improve e-commerce by targeting privacy policy-making efforts to address the explicit areas of consumer privacy concerns. The results of this study can also help IT practitioners to develop privacy protection tools and processes to address specific consumer privacy concerns.
APA, Harvard, Vancouver, ISO, and other styles
32

Bakke, Sharen A. "Privacy, Control, and the Use of Information Technology: The Development, Validation, and Testing of the Privacy-Invasive Perceptions Scale." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1145192698.

Full text
Abstract:
Thesis (Ph.D.)--Kent State University, 2006.
Title from PDF t.p. (viewed Sept. 20, 2006). Advisor: Alan Brandyberry and Marvin Troutt. Keywords: privacy; control; information technology use; scale development. Includes bibliographical references (p. 103-120).
APA, Harvard, Vancouver, ISO, and other styles
33

Parra, Arnau Javier. "Privacy protection of user profiles in personalized information systems." Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/144937.

Full text
Abstract:
In recent times we are witnessing the emergence of a wide variety of information systems that tailor the information-exchange functionality to meet the specific interests of their users. Most of these personalized information systems capitalize on, or lend themselves to, the construction of profiles, either directly declared by a user, or inferred from past activity. The ability of these systems to profile users is therefore what enables such intelligent functionality, but at the same time, it is the source of serious privacy concerns. Although there exists a broad range of privacy-enhancing technologies aimed to mitigate many of those concerns, the fact is that their use is far from being widespread. The main reason is that there is a certain ambiguity about these technologies and their effectiveness in terms of privacy protection. Besides, since these technologies normally come at the expense of system functionality and utility, it is challenging to assess whether the gain in privacy compensates for the costs in utility. Assessing the privacy provided by a privacy-enhancing technology is thus crucial to determine its overall benefit, to compare its effectiveness with other technologies, and ultimately to optimize it in terms of the privacy-utility trade-off posed. Considerable effort has consequently been devoted to investigating both privacy and utility metrics. However, most of these metrics are specific to concrete systems and adversary models, and hence are difficult to generalize or translate to other contexts. Moreover, in applications involving user profiles, there are a few proposals for the evaluation of privacy, and those existing are not appropriately justified or fail to justify the choice. The first part of this thesis approaches the fundamental problem of quantifying user privacy. Firstly, we present a theoretical framework for privacy-preserving systems, endowed with a unifying view of privacy in terms of the estimation error incurred by an attacker who aims to disclose the private information that the system is designed to conceal. Our theoretical analysis shows that numerous privacy metrics emerging from a broad spectrum of applications are bijectively related to this estimation error, which permits interpreting and comparing these metrics under a common perspective. Secondly, we tackle the issue of measuring privacy in the enthralling application of personalized information systems. Specifically, we propose two information-theoretic quantities as measures of the privacy of user profiles, and justify these metrics by building on Jaynes' rationale behind entropy-maximization methods and fundamental results from the method of types and hypothesis testing. Equipped with quantifiable measures of privacy and utility, the second part of this thesis investigates privacy-enhancing, data-perturbative mechanisms and architectures for two important classes of personalized information systems. In particular, we study the elimination of tags in semantic-Web applications, and the combination of the forgery and the suppression of ratings in personalized recommendation systems. We design such mechanisms to achieve the optimal privacy-utility trade-off, in the sense of maximizing privacy for a desired utility, or vice versa. We proceed in a systematic fashion by drawing upon the methodology of multiobjective optimization. Our theoretical analysis finds a closed-form solution to the problem of optimal tag suppression, and to the problem of optimal forgery and suppression of ratings. In addition, we provide an extensive theoretical characterization of the trade-off between the contrasting aspects of privacy and utility. Experimental results in real-world applications show the effectiveness of our mechanisms in terms of privacy protection, system functionality and data utility.
APA, Harvard, Vancouver, ISO, and other styles
34

Bauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.
Committee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
35

Boucher, Duane Eric. "An information privacy model for primary health care facilities." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007181.

Full text
Abstract:
The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
APA, Harvard, Vancouver, ISO, and other styles
36

Katsikouli, Panagiota. "Distributed and privacy preserving algorithms for mobility information processing." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31110.

Full text
Abstract:
Smart-phones, wearables and mobile devices in general are the sensors of our modern world. Their sensing capabilities offer the means to analyze and interpret our behaviour and surroundings. When it comes to human behaviour, perhaps the most informative feature is our location and mobility habits. Insights from human mobility are useful in a number of everyday practical applications, such as the improvement of transportation and road network infrastructure, ride-sharing services, activity recognition, mobile data pre-fetching, analysis of the social behaviour of humans, etc. In this dissertation, we develop algorithms for processing mobility data. The analysis of mobility data is a non trivial task as it involves managing large quantities of location information, usually spread out spatially and temporally across many tracking sensors. An additional challenge in processing mobility information is to publish the data and the results of its analysis without jeopardizing the privacy of the involved individuals or the quality of the data. We look into a series of problems on processing mobility data from individuals and from a population. Our mission is to design algorithms with provable properties that allow for the fast and reliable extraction of insights. We present efficient solutions - in terms of storage and computation requirements - , with a focus on distributed computation, online processing and privacy preservation.
APA, Harvard, Vancouver, ISO, and other styles
37

Wilson, David W. "Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/555938.

Full text
Abstract:
Advances in information technology have amplified issues related to privacy and the disclosure of personal information. New technologies have enabled an explosion in the amount and variety of information created, stored, and potentially shared about people, and there has been a corresponding explosion in privacy-related concerns and conversations in academic and non-academic forums. This dissertation contributes to one such conversation, adding to our understanding of the mechanisms that shape individuals' privacy concerns in the context of disclosure of personal information. Individuals must overcome their information privacy concerns in order for personal information disclosure to take place, but the mechanisms surrounding this process are highly dependent on the context of disclosure. Accordingly, this research seeks to build understanding around the ways in which privacy concerns are mitigated or counterbalanced in three different disclosure contexts. Essay 1, positioned in the e-commerce context, contributes uniquely to an emerging stream of disclosure research that considers irrationality within the privacy disclosure decision process. Essay 2 is focused on a less frequently examined disclosure context - online social networks - and examines the tension between individuals' privacy concerns and their desire for social benefits and personal expression, focusing especially on the social network technology's ability to support impression management behavior. Finally, Essay 3 examines the mitigation of privacy concerns in the context of involuntary disclosure - increasingly common in the modern online environment - wherein the primary goal is to reduce concerns or anxiety regarding the information already disclosed. In comparing disclosure processes across these contexts, this research provides insights regarding consistencies and distinctions among the different domains. Insights gained, both within and across these contexts, are valuable to both privacy researchers and professional stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
38

Graff, Irene. "ESSAYS IN INFORMATION PRIVACY: DEFINING & ANALYZING ONLINE EQUIVOCATION." Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/486661.

Full text
Abstract:
Business Administration/Strategic Management
D.B.A.
As quickly as individuals engage in new ways to share personal information online, their concerns over privacy are increasing. Online engagement is not just “to share or not to share,” but a continuum of the disclosure. To remain engaged online and to avoid privacy exposure, individuals sometimes omit or provide inaccurate information. This process is defined as online equivocation. Drawing on privacy calculus research, this study investigates how individuals use online equivocation to lower privacy concerns in mobile computing, essentially reducing the costs of online disclosure. Several studies are used to explain and analyze online equivocation and draw out the implications for theory, firms, society, and individuals. To achieve this a qualitative questionnaire was distributed among 547 individuals across the United States asking subjects to report whether they had provided inaccurate data online in privacy-concerned situations and to detail the various strategies used. The results indicate that online equivocation can be categorized into five distinct strategies organized on a continuum of level of effort: omission, abbreviation, substitution, combined substitution, and alternative persona. A follow-up questionnaire was completed with 582 respondents that showed individuals use one more online equivocation strategy in the majority of personal information sharing. This result provides a framework for further study of online equivocation. A third and final survey tested a new conceptual model constructed from the results of the previous questionnaires to examine the effects of online equivocation on privacy concerns, collecting 2,947 responses. The final survey analysis found that individuals employed online equivocation strategies to help reduce privacy concerns in mobile computing and contributed to privacy calculus theory, contending that individuals will make a cost-benefit analysis regarding whether to disclose inaccurate personal information to reduce privacy concerns. However, the research shows that the behavior of online equivocation positively effects mobile privacy concerns, implying that the more that individuals online equivocate, the more likely they are to be concerned about privacy. Overall, the study shows that online equivocation is a fairly common strategy, leading to high percentages of inaccurate data collected by businesses. Inaccurate personal information from consumers can misinform companies and lead to incorrect business decisions, affecting the nature of the products or services offered. Firms aiming to compete online depend on the quality of the information they collect from consumers and may view understanding this phenomenon as strategically crucial to competitiveness.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
39

Cheng, Xiaolu. "Efficient Information Dissemination in Vehicular Networks with Privacy Protection." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5560.

Full text
Abstract:
Vehicular ad hoc network (VANET) is a key component of intelligent transportation System (ITS). In VANETs, vehicles and roadside units exchange information for the purpose of navigation, safe driving, entertainment and so on. The high mobility of vehicles makes efficient and private communications in VANETs a big challenge. Improving the performance of information dissemination while protecting data privacy is studied in this research. Meet-Table based information dissemination method is first proposed, so as to improve the information dissemination, and to efficiently distribute information via utilizing roadside units, Cloud Computing, and Fog Computing. A clustering algorithm is proposed as well, to improve the stability for self-organized cluster-based dissemination in VANETs on highways. Then, fuzzy neural networks are used to improve the stability and security of routing protocols, AODV, and design a novel protocol, GSS-AODV. To further protect data privacy, a multi-antenna based information protection approach for vehicle-to-vehicle(V2V) communications is also proposed.
APA, Harvard, Vancouver, ISO, and other styles
40

Doig, Jennifer Michelle. "Impact of online privacy concerns and brand reputation on consumer willingness to provide personal information." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/91648/1/Jennifer_Doig_Thesis.pdf.

Full text
Abstract:
The aim of this research was to identify the role of brand reputation in encouraging consumer willingness to provide personal data online, for the benefits of personalisation. This study extends on Malhotra, Kim and Agarwal’s (2004) Internet Users Information Privacy Concerns Model, and uses the theoretical underpinning of Social Contract Theory to assess how brand reputation moderates the relationship between trusting beliefs and perceived value (Privacy Calculus framework) with willingness to give personal information. The research is highly relevant as most privacy research undertaken to date focuses on consumer related concerns. Very little research exists examining the role of brand reputation and online privacy. Practical implications of this research include gaining knowledge as to how to minimise online privacy concerns; improve brand reputation; and provide insight on how to reduce consumer resistance to the collection of personal information and encourage consumer opt-in.
APA, Harvard, Vancouver, ISO, and other styles
41

Sang, Lin. "Social Big Data and Privacy Awareness." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-242444.

Full text
Abstract:
Based on the rapid development of Big Data, the data from the online social network becomea major part of it. Big data make the social networks became data-oriented rather than social-oriented. Taking this into account, this dissertation presents a qualitative study to research howdoes the data-oriented social network affect its users’ privacy management for nowadays. Within this dissertation, an overview of Big Data and privacy issues on the social network waspresented as a background study. We adapted the communication privacy theory as a frameworkfor further analysis how individuals manage their privacy on social networks. We study socialnetworks as an entirety in this dissertation. We selected Facebook as a case study to present theconnection between social network, Big Data and privacy issues. The data that supported the result of this dissertation collected by the face-to-face and in-depthinterview study. As consequence, we found that the people divided the social networks intodifferent level of openness in order to avoid the privacy invasions and violations, according totheir privacy concern. They reduced and transferred their sharing from an open social networkto a more close one. However, the risk of privacy problems actually raised because peopleneglected to understand the data process on social networks. They focused on managed theeveryday sharing but too easily allowed other application accessed their personal data on thesocial network (such like the Facebook profile).
APA, Harvard, Vancouver, ISO, and other styles
42

Crounse, Shane. "The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /." Online version of thesis, 2009. http://hdl.handle.net/1850/8638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Mojarad, Vishkaie Seyedeh Elssa. "A Qualitative Inquiry into Online Privacy and Information Sharing Concerns of Internet Users." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-52204.

Full text
Abstract:
Information privacy concerns are one of the major causes behind a dramatic decline in the readiness of individuals to share their personal information on the Internet. The aim of this research is to explore the information privacy concerns from the users’ perspective. In the focal point of this qualitative study stands the kryast.se website. The healthcare promotion activities that this website carries out involve the sharing by its users of their personal information on the Internet. For this reason, this study takes recourse to the construct of Internet Users’ Information Privacy Concerns (IUIPC) developed by Malhotra, Kim and Agarwal (2004) as its interpretive framework. It was expected that by using both semi-structured interviews and non-participant observation among the users of the above mentioned website, the concerns of its users can be identified through the interpretative lens of the analytical framework that Malhotra et al. (2004) proposed for privacy concerns of Internet Users. The results of this study indicate that the selected conceptual lens has sufficiently accounted for the concerns that website users may have when sharing their personal information on the Internet, while indicating that internet users tend to be reluctant in sharing their sensitive information.
APA, Harvard, Vancouver, ISO, and other styles
44

Bergquist, Jonatan. "Blockchain Technology and Smart Contracts: Privacy-preserving Tools." Thesis, Uppsala universitet, Avdelningen för datalogi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323826.

Full text
Abstract:
The purpose of this Master's thesis is to explore blockchain technology and smart contracts as a way of building privacy-sensitive applications. The main focus is on a medication plan containing prescriptions, built on a blockchain system of smart contracts. This is an example use case, but the results can be transferred to other ones where sensitive data is being shared and a proof of validity or authentication is needed. First the problem is presented, why medication plans are in need of digitalisation and why blockchain technology is a fitting technology for implementing such an application. Then blockchain technology is explained, since it is a very new and relatively unfamiliar IT construct. Thereafter, a design is proposed for solving the problem. A system of smart contracts was built to prove how such an application can be built, and suggested guidelines for how a blockchain system should be designed to fulfil the requirements that were defined. Finally, a discussion is held regarding the applicability of different blockchain designs to the problem of privacy-handling applications.
Syftet med detta examensarbete är att utforska blockkedje teknologi och s.k. smarta kontrakt för att bygga applikationer där känslig information hanteras. Huvudsakligen ligger fokus på att utveckla en struktur baserad på blockkedje teknologi och smarta kontrakt för en medikationsplan. Detta är ett typ-exempel för att visa hur en sådan applikation kan byggas, men resultaten kan överföras till andra områden där känslig data delas mellan parter, eller där ett bevis för korrekthet krävs. Först presenteras problemet, varför medikationsplaner behöver digitaliseras och varför blockkedje teknologi är väl anpassat för att implementera en sådan applikation. Sedan förklaras blockkedje teknologi något djupare i detalj, eftersom det är ett relativt nytt koncept. Därefter föreslås en design för att lösa problemet.  Ett system av smarta kontrakt är byggt för att visa hur en medikationsplan kan byggas, och riktlinjer ges för hur ett blockkedje system bör se ut för att stödja systemet av smarta kontrakt. Till slut hålls en kortare diskussion om hur olika blockkedje-designer kan användas för att appliceras på problemet med känslig information.

Presentation held externally at Technical University Munich on the 29-5-2017 10.50.

APA, Harvard, Vancouver, ISO, and other styles
45

Schreiber, Renate Ingeborg. "Privacy protection in geographic information systems : guidelines for the protection of privacy in GIS in South Africa." Master's thesis, University of Cape Town, 1998. http://hdl.handle.net/11427/16086.

Full text
Abstract:
Includes bibliographical references.
Personal privacy issues are relevant to the GIS community. The distribution and dissemination of personal data is greatly facilitated through GIS tools. The use of these tools has been expanded from traditionally geographical operations to applications in geodemographics, and it is particularly in geodemographics where the protection of privacy becomes an issue. This thesis examines existing privacy protection guidelines put forward by international commercial and governmental sectors; the current international position with regards to the protection of privacy is reviewed, and South African legislation pertaining to these issues is explored. On this basis, a set of privacy protection guidelines is developed which can assist GIS managers in South Africa in ensuring that data collection and management do not infringe on personal privacy.
APA, Harvard, Vancouver, ISO, and other styles
46

Rohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.

Full text
Abstract:
Abstract When personal data are collected and utilised to produce personal data intensive services, users of these services are exposed to the possibility of privacy losses. Users’ information privacy concerns may lead to non-adoption of new services and technologies, affecting the quality and the completeness of the collected data. These issues make it challenging to fully reap the benefits brought by the services. The evaluation of information privacy concerns makes it possible to address these concerns in the design and the development of personal data intensive services. This research investigated how privacy concerns evaluations should be developed to make them valid in the evolving data collection contexts. The research was conducted in two phases: employing a mixed-method research design and using a literature review methodology. In Phase 1, two empirical studies were conducted, following a mixed-method exploratory sequential design. In both studies, the data subjects’ privacy behaviour and privacy concerns that were associated with mobility data collection were first explored qualitatively, and quantitative instruments were then developed based on the qualitative results to generalise the findings. Phase 2 was planned to provide an extensive view on privacy behaviour and some possibilities to develop privacy concerns evaluation in new data collection contexts. Phase 2 consisted of two review studies: a systematic literature review of privacy behaviour models and a review of the EU data privacy legislation changes. The results show that in evolving data collection contexts, privacy behaviour and concerns have characteristics that differ from earlier ones. Privacy concerns have aspects specific to these contexts, and their multifaceted nature appears emphasised. Because privacy concerns are related to other privacy behaviour antecedents, it may be reasonable to incorporate some of these antecedents into evaluations. The existing privacy concerns evaluation instruments serve as valid starting points for evaluations in evolving personal data collection contexts. However, these instruments need to be revised and adapted to the new contexts. The development of privacy concerns evaluation may be challenging due to the incoherence of the existing privacy behaviour research. More overarching research is called for to facilitate the application of the existing knowledge
Tiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
APA, Harvard, Vancouver, ISO, and other styles
47

Sivakumar, Anusha. "Enhancing Privacy Of Data Through Anonymization." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177349.

Full text
Abstract:
A steep rise in availability of personal data has resulted in endless opportunities for data scientists who utilize this open data for research. However, such easy availability of complex personal data challenges privacy of individuals represented in the data. To protect privacy, traditional methods such as using pseudonyms or blurring identity of individuals are followed before releasing data. These traditional methods alone are not sufficient to enhance privacy because combining released data with other publicly available data or background knowledge identifies individuals. A potential solution to this privacy loss problem is to anonymize data so that it cannot be linked to individuals represented in the data. In case of researches involving personal data, anonymization becomes more important than ever. If we alter data to preserve privacy of research participants, the resultant data becomes almost useless for many researches. Therefore, preserving privacy of individuals represented in the data and minimizing data loss caused by privacy preservation is very vital. In this project, we first study the different cases in which attacks take place, different forms of attacks and existing solutions to prevent the attacks. After carefully examining the literature and the undertaken problem, we propose a solution to preserve privacy of research participants as much as possible and to make data useful to the researchers. To support our solution, we consider the case of Digital Footprints which collects and publishes Facebook data with the consent of the users.
En kraftig ökning av tillgång på personligt relaterat data, har lett till oändliga möjligheter för dataforskare att utnyttja dessa data för forskning. En konsekvens är att det blir svårt att bevara personers integritet på grund av den enorma mängd uppgifter som är tillgängliga. För att skydda den personliga integriteten finns möjligheten att med traditionella metoder använda pseudonymer och alias, innan personen publicerar personligt data. Att enbart använda dessa traditionella metoder är inte tillräckligt för att skydda privatlivet, det finns alltid möjligheter att koppla data till verkliga individer. En potentiell lösning på detta problem är att använda anonymiseringstekniker, för att förändra data om individen på att anpassat sätt och på det viset försvåra att data sammankopplas med en individ. Vid undersökningar som innehåller personuppgifter blir anonymisering allt viktigare. Om vi försöker att ändra uppgifter för att bevara integriteten av forskningsdeltagare innan data publiceras, blir den resulterande uppgifter nästan oanvändbar för många undersökningar. För att bevara integriteten av individer representerade i underlaget och att minimera dataförlust orsakad av privatlivet bevarande är mycket viktigt. I denna avhandling har vi studerat de olika fall där attackerna kan ske, olika former av attacker och befintliga lösningar för att förhindra attackerna. Efter att noggrant granskat litteraturen och problemet, föreslår vi en teoretisk lösning för att bevara integriteten av forskningsdeltagarna så mycket som möjligt och att uppgifterna ska vara till nytta för forskning. Som stöd för vår lösning, gällande digitala fotspår som lagrar Facebook uppgifter med samtycke av användarna och släpper den lagrade informationen via olika användargränssnitt.
APA, Harvard, Vancouver, ISO, and other styles
48

Batistic, Kristina. "Privacy in Smart Parking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272998.

Full text
Abstract:
The master thesis project will analyze the smart parking solution used in Frederiksberg municipality, focusing on privacy aspects in different data use cases. The current use case will be analyzed with the focus on its privacy aspects. Frederiksberg municipality is using a camera mounted on a car that records parked cars to check whether parking fee has been paid or not. The system recognizes the license plate out of the picture and checks in the system whether the parking for that license plate has been paid or not if it has not been paid it notifies the parking guard to go to the parked car and hand out a parking ticket. Since the license plate is considered personal data, this system has to follow the legal and other obligations for the handling of personal data, i.e., the new European General Data Protection Regulation. Frederiksberg municipality is also considering using data for secondary purposes, such as parking statistics, input for future regulation, analysis to improve the parking system or even making the data public. This thesis will analyze possible secondary use cases and their privacy impacts and recomn measures. The goal is to protect citizens privacy while providing with the best possible service.
Examensarbetet kommer att analysera den smarta parkeringslösningen som används i Frederiksbergs kommun med fokus på sekretessaspekter i olika fall för dataanvändning. Det aktuella användningsfallet kommer att analyseras med fokus på dess integritetsaspekter. Frederiksberg kommun använder en kamera monterad på en bil som registrerar parkerade bilar för att kontrollera om parkeringsavgiften har betalats eller inte. Systemet känner igen registreringsskylten ur bilden och kontrollerar i systemet om parkeringen för den typskylten har betalats eller inte om den inte har betalats, meddelar parkeringsvakten att gå till den parkerade bilen och dela ut en parkeringsbiljett. Eftersom licensskylten betraktas som personuppgifter måste detta system följa de lagliga och andra skyldigheterna för hantering av personuppgifter, dvs. den nya förordningen om europeisk allmän dataskydd. Frederiksberg kommun överväger också att använda data för sekundära ändamål, som parkeringsstatistik, input för framtida reglering, analys för att förbättra parkeringssystemet eller till och med offentliggöra uppgifterna. Denna avhandling kommer att analysera eventuella fall av sekundär användning och deras inverkan på sekretess och rekommendera skyddsåtgärder. Målet skydda medborgarnas integritet samtidigt som de ger bästa möjliga service.
APA, Harvard, Vancouver, ISO, and other styles
49

Hawkshaw, Robert Stephen. "Tax information exchange and the erosion of taxpayer privacy rights." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/48389.

Full text
Abstract:
The exchange of taxpayer information between revenue agencies has been increasing as a response to globalization and technological advances, which have allowed taxpayers more opportunities for tax avoidance and tax evasion. Tax information exchange allows revenue agencies to take advantage of these same advances. The legal framework through which the exchange of taxpayer information is implemented consists of modifications to existing tax conventions and special Tax Information Exchange Agreements. These tax treaties modify and override domestic privacy laws. The Canadian income tax system operates within a regime of constitutional privacy protections and statutory privacy protections. A balance has been struck between the right to privacy and the State interest in obtaining personal information in order to administer and enforce the tax system. This thesis examines the information gathering powers of the Canada Revenue Agency and the limits on these powers. These powers are broad because taxpayers generally have a low expectation of privacy in their tax information. This thesis argues that the balance struck domestically is predicated on meaningful procedural protections and remedies and on taxpayer information not being shared with third parties. This thesis then examines the tax treaty information exchange provisions and their interaction with Canadian law. This thesis argues that these provisions override domestic law without providing any meaningful procedural protections. This thesis concludes that information exchange in its current state is incompatible with the balance struck by the Courts between taxpayer privacy and the revenue authorities’ need for information.
Law, Faculty of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
50

Ghiami-Mirhosaini, Roozbeh. "Information privacy, an exploratory survey of concerns about organisational practices." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0016/MQ48484.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography