Academic literature on the topic 'Privacy evaluation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy evaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy evaluation"

1

Sohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.

Full text
Abstract:
Healthcare providers are legally bound to ensure the privacy preservation of healthcare metadata. Usually, privacy concerning research focuses on providing technical and inter-/intra-organizational solutions in a fragmented manner. In this wake, an overarching evaluation of the fundamental (technical, organizational, and third-party) privacy-preserving measures in healthcare metadata handling is missing. Thus, this research work provides a multilevel privacy assurance evaluation of privacy-preserving measures of the Dutch healthcare metadata landscape. The normative and empirical evaluation comprises the content analysis and process mining discovery and conformance checking techniques using real-world healthcare datasets. For clarity, we illustrate our evaluation findings using conceptual modeling frameworks, namely e3-value modeling and REA ontology. The conceptual modeling frameworks highlight the financial aspect of metadata share with a clear description of vital stakeholders, their mutual interactions, and respective exchange of information resources. The frameworks are further verified using experts’ opinions. Based on our empirical and normative evaluations, we provide the multilevel privacy assurance evaluation with a level of privacy increase and decrease. Furthermore, we verify that the privacy utility trade-off is crucial in shaping privacy increase/decrease because data utility in healthcare is vital for efficient, effective healthcare services and the financial facilitation of healthcare enterprises.
APA, Harvard, Vancouver, ISO, and other styles
2

van Aaken, Dominik, and Andreas Ostermaier. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Academy of Management Proceedings 2013, no. 1 (January 2013): 15830. http://dx.doi.org/10.5465/ambpp.2013.131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

van Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Kyklos 67, no. 2 (April 10, 2014): 133–55. http://dx.doi.org/10.1111/kykl.12047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Petrakos, Nikolaos, Stefanos Monachos, Emmanouil Magkos, and Panayiotis Kotzanikolaou. "Design and Implementation of an Anonymous and Secure Online Evaluation Protocol." Electronics 9, no. 9 (September 1, 2020): 1415. http://dx.doi.org/10.3390/electronics9091415.

Full text
Abstract:
Course evaluations have become a common practice in most academic environments. To enhance participation, evaluations should be private and ensure a fair result. Related privacy-preserving method and technologies (e.g., anonymous credentials, Privacy Attribute-Based Credentials, and domain signatures) fail to address, at least in an obvious way, the minimal security and practicality requirements. In this paper, we propose, evaluate, and implement an efficient, anonymous evaluation protocol for academic environments. The protocol borrows ideas from well-known and efficient cryptographic approaches for anonymously submitting ballots in Internet elections for issuing one-time credentials and for anonymously broadcasting information. The proposed protocol extends the above approaches in order to provably satisfy properties such as the eligibility, privacy, fairness and verifiability of the evaluation system. Compared to the state of the art, our approach is less complex and more effective, while security properties of the proposed protocol are verified using the ProVerif cryptographic protocol verifier. A web-based implementation of the protocol has been developed and compared to other approaches and systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Mamakou, Xenia J., Dimitris K. Kardaras, and Eleutherios A. Papathanassiou. "Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology." Journal of Information Science 44, no. 4 (March 1, 2017): 425–42. http://dx.doi.org/10.1177/0165551517697610.

Full text
Abstract:
Privacy issues are a top priority in web design. However, websites’ evaluation methods do not consider legal and ethical issues. This article proposes a fuzzy logic–based methodology for evaluating websites’ compliance with legal and ethical principles. Using fuzzy Delphi and fuzzy numbers, the methodology develops the Fuzzy Legal and Ethical Compliance Index (FLECI) that addresses the inherited vagueness of the evaluation process and calculates websites’ conformity to legal and ethical guidelines. To illustrate the proposed methodology, this research collects data and then evaluates and classifies 100 websites with respect to their privacy policies using fuzzy equivalence. This article provides a foundation for the development of comprehensive website evaluation methods that include privacy and ethical issues in their evaluations. Future research can investigate the applicability of the proposed methodology and the fuzzy numbers calculated in this article in websites across industries and cultural activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Charlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.

Full text
Abstract:
It is a widely accepted proposition, reflected in privacy-enhancing legislation and regulations, that individuals will have less privacy in their workplace activities than in their private lives. However, modern technologies and business practices have blurred the boundary between private life and workplace, and a re-evaluation of the traditional legislative and regulatory protections for privacy in employment is required.
APA, Harvard, Vancouver, ISO, and other styles
7

Asad, Muhammad, Ahmed Moustafa, and Chao Yu. "A Critical Evaluation of Privacy and Security Threats in Federated Learning." Sensors 20, no. 24 (December 15, 2020): 7182. http://dx.doi.org/10.3390/s20247182.

Full text
Abstract:
With the advent of smart devices, smartphones, and smart everything, the Internet of Things (IoT) has emerged with an incredible impact on the industries and human life. The IoT consists of millions of clients that exchange massive amounts of critical data, which results in high privacy risks when processed by a centralized cloud server. Motivated by this privacy concern, a new machine learning paradigm has emerged, namely Federated Learning (FL). Specifically, FL allows for each client to train a learning model locally and performs global model aggregation at the centralized cloud server in order to avoid the direct data leakage from clients. However, despite this efficient distributed training technique, an individual’s private information can still be compromised. To this end, in this paper, we investigate the privacy and security threats that can harm the whole execution process of FL. Additionally, we provide practical solutions to overcome those attacks and protect the individual’s privacy. We also present experimental results in order to highlight the discussed issues and possible solutions. We expect that this work will open exciting perspectives for future research in FL.
APA, Harvard, Vancouver, ISO, and other styles
8

Babaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." International Journal of Strategic Information Technology and Applications 10, no. 2 (April 2019): 44–58. http://dx.doi.org/10.4018/ijsita.2019040103.

Full text
Abstract:
The main purpose of designing vehicular ad-hoc networks (VANETs) is to achieve safety by periodically broadcasting the vehicle's coordinates with a high precision. This advantage brings a threat represented in the possible tracking and identification of the vehicles. A possible solution is to use and change pseudonyms. However, even by changing pseudonyms, the vehicle could still be tracked if the adversary has a prior knowledge about the potential start and end points of a particular driver who has social interactions (e.g., with neighbors) which introduces the concept of vehicular social networks (VSNs). This article extends the authors previous work, namely: “EPP Extreme Points Privacy for Trips and Home Identification in Vehicular Social Networks,” which exploits the nature of the end points that are common between VSN users in order to create shared zones to anonymize them. The extension is represented by (a) the evaluation of the enjoyed location privacy of VSN users after quitting the district in addition to (b) detailing the used environment during the evaluation.
APA, Harvard, Vancouver, ISO, and other styles
9

AKIYAMA, Ken, Tomofumi HIRAYAMA, Yoshiki NAKAMURA, and Masao INUI. "PRIVACY AND COMMUNICATION IN OFFICE ENVIRONMENT EVALUATION." Journal of Architecture and Planning (Transactions of AIJ) 61, no. 484 (1996): 97–104. http://dx.doi.org/10.3130/aija.61.97_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yan, Zheng, Wenxiu Ding, Valtteri Niemi, and Athanasios V. Vasilakos. "Two Schemes of Privacy-Preserving Trust Evaluation." Future Generation Computer Systems 62 (September 2016): 175–89. http://dx.doi.org/10.1016/j.future.2015.11.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Privacy evaluation"

1

Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.

Full text
Abstract:
People are increasingly concerned about online privacy and how computers collect, process, share, and store their personal information. Such concerns are understandable given the growing number of privacy invasions and the pervasiveness of information capture and sharing between IT systems. This situation has led to an increasingly regulated environment, limiting what systems may do, and what safeguards they must offer users. Privacy is an especially important concern in the fields of computer supported collaborative work (CSCW), Ubiquitous Computing, and e-commerce, where the nature of the applications often requires some information collection and sharing. In order to minimize risks to users it is essential to identify privacy problems early in the design process. Several methods and frameworks for accomplishing this have been proposed in the last decades. These frameworks, though based on hard-earned experience and great insight, have not seen widespread adoption despite the high level of interest in this topic. Part of the reason for this is likely the lack of evaluation and study of these frameworks. In our research we examine the key design and analysis frameworks and their elements, and compare these to the kinds of problems users face and are concerned with in terms of privacy. Based on this analysis of the relative strengths and weaknesses of existing design frameworks we derive a new design framework; STRAP (STRuctured Analysis of Privacy). In STRAP we combine light-weight goal-oriented analysis with heuristics to provide a simple yet effective design framework. We validate our analysis by demonstrating in a series of design experiments that STRAP is more efficient and effective than any one of the existing design frameworks, and provide quantitative and qualitative evidence of the value of using such frameworks as part of the design process.
APA, Harvard, Vancouver, ISO, and other styles
2

Lundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mood, Benjamin, and Benjamin Mood. "Optimizing Secure Function Evaluation on Mobile Devices." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12505.

Full text
Abstract:
Secure function evaluation (SFE) on mobile devices, such as smartphones, allows for the creation of new privacy-preserving applications. Generating the circuits on smartphones which allow for executing customized functions, however, is infeasible for most problems due to memory constraints. In this thesis, we develop a new methodology for generating circuits that is memory-efficient. Using the standard SFDL language for describing secure functions as input, we design a new pseudo- assembly language (PAL) and a template-driven compiler, generating circuits which can be evaluated with the canonical Fairplay evaluation framework. We deploy this compiler and demonstrate larger circuits can now be generated on smartphones. We show our compiler's ability to interface with other execution systems and perform optimizations on that execution system. We show how runtime generation of circuits can be used in practice. Our results demonstrate the feasibility of generating garbled circuits on mobile devices. This thesis includes previously published co-authored material.
APA, Harvard, Vancouver, ISO, and other styles
4

O'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.

Full text
Abstract:
The legal system and the social sciences share an interest in privacy but have developed separate conceptualizations of the concept. The result is two similar but conflicting theories of privacy that make different assumptions about how people behave and how that behavior can be controlled. The purpose of this study was to begin testing these theories by examining the operationalization of privacy through mandated standards intended to ensure privacy for the mentally ill. Specifically, the standards set in Wyatt v. Stickney, which reflect the idea that privacy is a sphere of space free from outside intrusion, were examined to see if they did indeed ensure privacy. Using two units in a facility that met the standards mandated by the court in Wyatt v. Stickney, the research examined staff and patient perceptions of privacy. Thirty-five patients were interviewed and twenty-four staff completed questionnaires on the overall habitability of the unit and patient privacy. Results indicated that the Wyatt court's operationalization of privacy as primarily a visual phenomena was inadequate and although the specific standards ordered to ensure privacy were reported to be effective by a simple majority of patients, overall patients reported a lack of privacy. Staff responses were generally in agreement with patients but they tended to use more extreme or stronger ratings. The present study also has implications for the legal conceptualization of privacy. It was found that privacy was perceived as important by patients; that autonomy as evidenced by control was an important issue for a minority of patients; and, the right of selective disclosure was not a major concern of patients. Needed future areas of research that were identified included: comparing privacy ratings across a variety of group living situations, comparing the mentally ill's conceptualizations of privacy from others, determining the effect of privacy on the therapeutic goals of an institution and therapeutic outcome and, determine the relative importance of privacy to the mentally ill.
APA, Harvard, Vancouver, ISO, and other styles
5

Cvach, Marek, Menal Sanna Kahsay, and Micaela Shamoun. "Privacy online: Exploring consumers’ evaluation of privacy issues in relation to personalised advertisement when buying online." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40054.

Full text
Abstract:
Background The development of the Internet has changed the direction of advertising. Personalised advertising has emerged as the most effective and most profitable form of advertisement. Although personalised advertisement has been praised by many, privacy related concerns have been raised since it can be perceived as a violation of the consumer's privacy. Online shopping is another activity growing on the Internet, which also raises concerns about privacy. Therefore, we find it interesting to look on how personalised advertisement in relation to privacy issues can affect the consumer when buying online. Purpose The purpose of this thesis is to investigate how online shoppers respond to privacy issues and personalised advertising. The research will focus on the shoppers’ perspective of privacy issues with personalised advertising online. It will also provide companies with useful insights into customer behaviour when shopping online, with the intention of evaluating various forms of personalised advertisement and their effectiveness in order to strengthen companies’ online personalised marketing campaigns. Method As multiple explanations to one and the same research question are sought, the research will be conducted from an interpretivist standpoint. A qualitative research method has been chosen in the form of twelve semi-structured interviews with individuals who have been residents of Sweden for more than six months, with a wide range of ages and an equal representation of the male and female gender. The empirical findings will be analysed based on the grounded theory where common themes based on similarities will be presented. Conclusion It was concluded that the attitudes towards personalised advertisement, privacy issues and its effect on buying behaviour depends on where the advertisement comes from as well as from where the individual is shopping. Furthermore, it was also found that although privacy concerns were raised it did not prevent individuals from continuing to purchase online, only from what sites the purchasing was conducted.
APA, Harvard, Vancouver, ISO, and other styles
6

Majeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.

Full text
Abstract:
As computers are getting integral part of daily lives, threats to privacy and personal information of users are increasing. Privacy-Invasive Software (PIS) is common problem now days. A reputation system named the PISKeeper system has been developed as countermeasure against PIS. This thesis aims at evaluating this system in order to know how and to what extent the PISKeeper system helps users in selecting the right software for their computers. Quantitative approach was adapted to evaluate the PISKeeper system. An experiment was designed and executed on computer users from different age groups and experiences in controlled lab environment. The results have proved that the PISKeeper system helped users in selecting right software for their computer by providing essential information about the specific software and comments from previous users of that software. Apart for evaluating the PISKeeper system, this thesis also aims to suggest improvements for the system. Sometimes PIS is bundled with legitimate software and users are informed about this by stating in End User License Agreement (EULA). Usually the users do not read EULA before accepting it giving consent to whatever written in it. This thesis also aims at suggesting an alternative way to present EULA content so the user may be informed about the behavior of the software in more convenient way.
APA, Harvard, Vancouver, ISO, and other styles
7

Rohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.

Full text
Abstract:
Abstract When personal data are collected and utilised to produce personal data intensive services, users of these services are exposed to the possibility of privacy losses. Users’ information privacy concerns may lead to non-adoption of new services and technologies, affecting the quality and the completeness of the collected data. These issues make it challenging to fully reap the benefits brought by the services. The evaluation of information privacy concerns makes it possible to address these concerns in the design and the development of personal data intensive services. This research investigated how privacy concerns evaluations should be developed to make them valid in the evolving data collection contexts. The research was conducted in two phases: employing a mixed-method research design and using a literature review methodology. In Phase 1, two empirical studies were conducted, following a mixed-method exploratory sequential design. In both studies, the data subjects’ privacy behaviour and privacy concerns that were associated with mobility data collection were first explored qualitatively, and quantitative instruments were then developed based on the qualitative results to generalise the findings. Phase 2 was planned to provide an extensive view on privacy behaviour and some possibilities to develop privacy concerns evaluation in new data collection contexts. Phase 2 consisted of two review studies: a systematic literature review of privacy behaviour models and a review of the EU data privacy legislation changes. The results show that in evolving data collection contexts, privacy behaviour and concerns have characteristics that differ from earlier ones. Privacy concerns have aspects specific to these contexts, and their multifaceted nature appears emphasised. Because privacy concerns are related to other privacy behaviour antecedents, it may be reasonable to incorporate some of these antecedents into evaluations. The existing privacy concerns evaluation instruments serve as valid starting points for evaluations in evolving personal data collection contexts. However, these instruments need to be revised and adapted to the new contexts. The development of privacy concerns evaluation may be challenging due to the incoherence of the existing privacy behaviour research. More overarching research is called for to facilitate the application of the existing knowledge
Tiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
APA, Harvard, Vancouver, ISO, and other styles
8

Abril, Castellano Daniel. "Privacy protection methods for documents and risk evaluation for microdata." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/285353.

Full text
Abstract:
La capacitat de recollir i emmagatzemar informació per agencies d'estadística, governs o individus ha creat grans oportunitats d'anàlisi de les dades i la creació de models basats en el coneixent. A més, amb el creixement d'Internet moltes companyies han decidit canviar els seus antics models de negoci per uns basats en la venta i l'explotació de les dades personals, les qual en molts dels casos contenen informació confidencial. Aquest fet ha creat la necessitat de desenvolupar mètodes per a la difusió de dades amb contingut confidencial amb fins de mineria de dades, assegurant que la informació confidencial no pugui ser vinculada als individus als qual pertanyen. D'aquesta manera, les dades prèviament protegides poden ser transferides, publicades o venudes a terceres parts assegurant la confidencialitat dels individus que hi apareixen i a la vegada sent útils per aquells que les vulguin analitzar. Una àrea d'aplicació molt clara són els documents de text els quals avui dia omplen la major part de la xarxa. Els documents de text són especialment difícils de protegir. A causa de la seva complicada estructura és difícil detectar les parts que poden contenir informació sensible. En aquesta tesi s'ha distingit dos models diferents de protecció de documents. Per una banda, s'ha considerat la protecció de col·leccions de documents, de manera que aquests conjunts de textos puguin ser analitzats utilitzant tècniques clàssiques de mineria de textos i d'aprenentatge automàtic. Per l'altra banda, s'ha considerat la protecció individualitzada de cada document. La sanitització de documents és el procés habitual mitjançant el qual les parts sensibles o confidencials d'un text són detectades i eliminades. L'aplicació manual d'aquesta tècnica és molt habitual per a la declassificació i possible difusió de documents governamentals confidencials. D'aquesta manera, els governs demostren que estan a favor del dret a la llibertat d'informació, mentre que la seguretat nacional no es veu compromesa. Aquesta tesi presenta un conjunt de proteccions i avaluacions per a la protecció de textos. A més, introdueix un mètode d'aprenentatge supervisat per l'avaluació del risc de revelació per mètodes de protecció de microdades. Les principals contribucions d'aquesta tesi són les següents: * El desenvolupament d'un mètode semiautomàtic per ajudar a la declassificació de documents confidencials. * La formalització de mesures específiques per a l'avaluació del risc de revelació i la informació perduda en aplicar mètodes de protecció per sanitització. * El desenvolupament de dos mètodes basats en el principi de k-anonimitat per la protecció de col·leccions de documents representades com un model d'espai vectorials. El primer mètode explota la distribució dels vectors mentre que el segon es basa en les possibles relacions semàntiques dels vectors de paraules. * L'estudi de mètodes avançats per avaluar el risc de revelació d'informació sensible sobre microdades després de ser protegides. En particular, es proposa un mètode d'aprenentatge supervisat per a l'enllaç de registres basat en distàncies. Aquest mètode es basa en l'aprenentatge dels paràmetres proporcionats per una funció. Diferents tipus de funcions han estat utilitzades per tal d'estudiar la seva eficàcia en l'avaluació del risc.
The capability to collect and store digital information by statistical agencies, governments or individuals has created huge opportunities to analyze and build knowledge-based models. With the rise of Internet many services and companies have exploited these opportunities collecting huge amounts of data, which most of the cases are considered confidential. This causes the need to develop methods that allow the dissemination of confidential data for data mining purposes while preserving individuals' private information. Thus, personal data could be collected, transferred or sold to third parties ensuring the individuals' confidentiality, but still being statistically useful. Internet is full of unstructured textual data like posts or documents with a large content of information that can be extracted and analyzed. Documents are especially difficult to protect due to their lack of structure. In this thesis we distinguish two different models to protect documents. On the one hand, we consider the protection of a collection of documents, so this set of documents can be analyzed by means of text mining and machine learning techniques. On the other hand, we consider the protection of single documents by means of the documents' sanitization. This is the process of detecting and removing the parts of the text considered sensitive. When dealing with governmental classified information, sanitization attempts to reduce the sensitiveness of the document, possibly yielding a non-classified document. In this way, governments show they uphold the freedom of information while the national security is not jeopardised. This thesis presents a set of different methods and experiments for the protection of unstructured textual data protection and besides, it introduces an advanced method to evaluate the security of microdata protection methods. The main contributions are: * The development of a new semi-automatic method to assist documents' declassification. * The definition of two specific metrics for evaluating the information loss and disclosure risk of sanitized documents. * The development of two cluster-based approaches based on the k-anonymity principle to anonymize vector space models. One exploits the sparsity and the other exploits the possible semantic relations of those vectors. * The study of advanced methods to evaluate the disclosure risk of microdata protection methods. In particular, we have developed a general supervised metric learning approach for distance-based record linkage. Moreover, we have reviewed the suitability of a set of parameterized distance functions that can be used together with the supervised approach.
APA, Harvard, Vancouver, ISO, and other styles
9

Paananen, K. (Kimmo). "Evaluation of privacy, security and quality of Internet-based communication solutions." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605221866.

Full text
Abstract:
The privacy and security of communication in the Internet are gaining increased public interest. Highly popular Voice over Internet Protocol (VoIP) technology allows the use of easy, versatile and low-cost Internet communication solutions. There are, however, privacy and security concerns and threats related to VoIP-based communication, just like with any traffic transmitted over the public Internet. Possibility to integrate a VoIP solution as part of self-made applications is also important for many organizations. The problem is to find a low cost solution which provides possibility for integration, good level of security and privacy, and also acceptable service quality in varying wireless network conditions. This thesis examined the fundamentals of VoIP technology, reasons and background of security threats, and presented the ways to mitigate the risks. Based on this information, publicly available communication solutions were searched and evaluated using Quality Function Deployment (QFD) derived method. The products were compared from the perspective of privacy and security they provide, taking into account in particular the purchase and operating costs, and connectivity into self-made applications. The best solution from the comparison was also taken to further tests for service availability and video quality Mean Opinion Score (MOS) in the real-world mobile network. The measurements aimed to reveal how the solution performs in different radio network conditions, and what kind of video quality it can offer. The research results show that there were a few good solutions available based on search criteria. The best solution, Linphone, was taken to the further quality tests in the live 4G Long Term Evolution (LTE) network. Measurements revealed that Linphone can provide satisfactory quality and reliability even on poor network conditions, and also secure the traffic seemingly well. Only some minor problems with video stream starting were found during the tests. For the future work I would suggest more measurements using different wireless network technologies including Wi-Fi. The real protocol level security analysis of Linphone would also reveal if there are any security pitfalls in the current implementation.
APA, Harvard, Vancouver, ISO, and other styles
10

Eschricht, Johannes. "mHealth and the need of evaluation processes." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16442.

Full text
Abstract:
There are currently a great deal of available health applications available on various app-stores around the globe and more is being added each day. With that vast amount of available options, which health applications are trustworthy and offers the functionality that the users are looking for? With the current regulations and classification processes, it is difficult to know if mHealth services offers the high standards that it should. This thesis investigates the need for mHealth services tobe subject of an evaluation process, by a health organization or a government agency, to ensure that quality standards are high. We discover the current “state-of-the-art” of mHealth and the privacy-and usability aspects of mHealth, we find outif evaluated and approved mHealth applications are believed to be more attractive to use than the non-evaluated counterparts, and lastly, we identify what aspects is important to evaluate of mHealth applications. To provide answers to the thesis, we perform a literature review and distribute a survey to a small group of potential users of mHealth services. The literature review provides information about the current state of mHealth around the globe. Moreover, the literature review also reveals that both usability, but especially privacy, is of major importance when creating mHealth services. We also discover that there are voices from field experts that suggests mHealth services to be subject of an evaluation process, similar to what we suggest in this thesis. With the survey, we identify the respondents’ current utilization of mHealth services. We also find out what aspects they believe is important and if their trust and utilization of an evaluated and approved mHealth service would be affected compared to a non-evaluated counterpart. The respondents of the survey is parents of young children, a group that is likely in need of medical attention in one way or another and still has the technical experience that is required to answer the survey.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy evaluation"

1

Peter, Fletcher, ed. Practical Web traffic analysis: Standards, privacy, techniques, results. Birmingham: Glasshaus, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Complete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Catalfamo, Holly A. Openness and privacy in Ontario: an evaluation of the implementation of FIPPA: (The Freedom of Information and Protection of Privacy Act, 1987, Chapter 25 and Ontario Regulation 532/87). St. Catharines, [Ont.]: Dept. of Politics, Brock University, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

United States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Institute of Medicine (U.S.). Committee on the Role of Institutional Review Boards in Health Services Research Data Privacy Protection. Protecting data privacy in health services research. Washington, D.C: National Academy Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

No more rights without remedies: An impact evaluation of the National Crime Victim Law Institute's victims' rights clinics. Santa Monica, CA: RAND, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Complete guide to security and privacy metrics: Measuring regulatory compliance, operational resilience, and ROI. Boca Raton, FL: Auerbach Publications, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy evaluation"

1

Ardagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pang, Bo, Long Chen, Xiong Fan, and Qiang Tang. "Multi-input Laconic Function Evaluation." In Information Security and Privacy, 369–88. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55304-3_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

De Marsico, Maria. "Biometric Systems Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1605-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Castro, Jordi. "A Computational Evaluation of Optimization Solvers for CTA." In Privacy in Statistical Databases, 11–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33627-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Jingchen, Jerome P. Reiter, and Quanli Wang. "Disclosure Risk Evaluation for Fully Synthetic Categorical Data." In Privacy in Statistical Databases, 185–99. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11257-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kitazawa, Shigeki, Masakazu Soshi, and Atsuko Miyaji. "Evaluation of Anonymity of Practical Anonymous Communication Networks." In Information Security and Privacy, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45067-x_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Förster, David. "Evaluation of Pseudonym Strategies." In Verifiable Privacy Protection for Vehicular Communication Systems, 27–54. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-18550-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De Marsico, Maria. "Biometric Spoofing and Its Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1657-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manzanares-Salor, Benet, David Sánchez, and Pierre Lison. "Automatic Evaluation of Disclosure Risks of Text Anonymization Methods." In Privacy in Statistical Databases, 157–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Livraga, Giovanni. "Privacy in Microdata Release: Challenges, Techniques, and Approaches." In Data-Driven Policy Impact Evaluation, 67–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78461-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy evaluation"

1

Kunihiro, Noboru, Wen-Jie Lu, Takashi Nishide, and Jun Sakuma. "Outsourced Private Function Evaluation with Privacy Policy Enforcement." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhou, Liang, Xin Wei, Jingwu Cui, and Baoyu Zheng. "Privacy-Aware QoE Evaluation." In 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, 2017. http://dx.doi.org/10.1109/vtcspring.2017.8108550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lazzeretti, Riccardo, Jorge Guajardo, and Mauro Barni. "Privacy preserving ECG quality evaluation." In the. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2361407.2361435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Boyd, Kendrick, Eric Lantz, and David Page. "Differential Privacy for Classifier Evaluation." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808769.2808775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Korshunov, Pavel, and Touradj Ebrahimi. "PEViD: privacy evaluation video dataset." In SPIE Optical Engineering + Applications, edited by Andrew G. Tescher. SPIE, 2013. http://dx.doi.org/10.1117/12.2030974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mello, Victor, Tania Basso, and Regina Moraes. "A Test Process Model to Evaluate Performance Impact of Privacy Protection Solutions." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2014. http://dx.doi.org/10.5753/wtf.2014.22946.

Full text
Abstract:
Organizational Information Systems (IS) collect, store, and manage personal information through web applications and services. Due to regulation laws and to protect the privacy of clients, such information must be kept private. Some solutions were developed to protect privacy personal information. Obviously, this additional resource will produce a performance impact and evaluating it is essential to determine the feasibility of the solution. This paper presents a process model to evaluate the performance impact introduced by privacy protection solutions in web applications. Case study shows the tests were useful to identify the conditions in which the solution under evaluation is able to work with minimal performance impact.
APA, Harvard, Vancouver, ISO, and other styles
7

Farnan, Nicholas L., Adam J. Lee, and Ting Yu. "Investigating privacy-aware distributed query evaluation." In the 9th annual ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866919.1866926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Hsiao-Ying, and Masooda Bashir. "Privacy by region: Evaluation online users' privacy perceptions by geographical region." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Licorish, Sherlock A., Stephen G. MacDonell, and Tony Clear. "Analyzing confidentiality and privacy concerns." In EASE '15: 19th International Conference on Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2745802.2745819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Ruoxi, and Minhui Xue. "Quality Assessment of Online Automated Privacy Policy Generators." In EASE '20: Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3383219.3383247.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy evaluation"

1

Vonk, Jaynie. Going Digital: Privacy and data security under GDPR for quantitative impact evaluation. Oxfam, October 2019. http://dx.doi.org/10.21201/2019.5211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, October 2021. http://dx.doi.org/10.21248/gups.63413.

Full text
Abstract:
The aim of this study was to identify and evaluate different de-identification techniques that may be used in several mobility-related use cases. To do so, four use cases have been defined in accordance with a project partner that focused on the legal aspects of this project, as well as with the VDA/FAT working group. Each use case aims to create different legal and technical issues with regards to the data and information that are to be gathered, used and transferred in the specific scenario. Use cases should therefore differ in the type and frequency of data that is gathered as well as the level of privacy and the speed of computation that is needed for the data. Upon identifying use cases, a systematic literature review has been performed to identify suitable de-identification techniques to provide data privacy. Additionally, external databases have been considered as data that is expected to be anonymous might be reidentified through the combination of existing data with such external data. For each case, requirements and possible attack scenarios were created to illustrate where exactly privacy-related issues could occur and how exactly such issues could impact data subjects, data processors or data controllers. Suitable de-identification techniques should be able to withstand these attack scenarios. Based on a series of additional criteria, de-identification techniques are then analyzed for each use case. Possible solutions are then discussed individually in chapters 6.1 - 6.2. It is evident that no one-size-fits-all approach to protect privacy in the mobility domain exists. While all techniques that are analyzed in detail in this report, e.g., homomorphic encryption, differential privacy, secure multiparty computation and federated learning, are able to successfully protect user privacy in certain instances, their overall effectiveness differs depending on the specifics of each use case.
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Smisha, Madhu Jalan, Holly C. Wilcox, Ritu Sharma, Rachel Hill, Emily Pantalone, Johannes Thrul, Jacob C. Rainey, and Karen A. Robinson. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), May 2022. http://dx.doi.org/10.23970/ahrqepctb41.

Full text
Abstract:
Background. Mental health mobile applications (apps) have the potential to expand the provision of mental health and wellness services to traditionally underserved populations. There is a lack of guidance on how to choose wisely from the thousands of mental health apps without clear evidence of safety, efficacy, and consumer protections. Purpose. This Technical Brief proposes a framework to assess mental health mobile applications with the aim to facilitate selection of apps. The results of applying the framework will yield summary statements on the strengths and limitations of the apps and are intended for use by providers and patients/caregivers. Methods. We reviewed systematic reviews of mental health apps and reviewed published and gray literature on mental health app frameworks, and we conducted four Key Informant group discussions to identify gaps in existing mental health frameworks and key framework criteria. These reviews and discussions informed the development of a draft framework to assess mental health apps. Iterative testing and refinement of the framework was done in seven successive rounds through double application of the framework to a total of 45 apps. Items in the framework with an interrater reliability under 90 percent were discussed among the evaluation team for revisions of the framework or guidance. Findings. Our review of the existing frameworks identified gaps in the assessment of risks that users may face from apps, such as privacy and security disclosures and regulatory safeguards to protect the users. Key Informant discussions identified priority criteria to include in the framework, including safety and efficacy of mental health apps. We developed the Framework to Assist Stakeholders in Technology Evaluation for Recovery (FASTER) to Mental Health and Wellness and it comprises three sections: Section 1. Risks and Mitigation Strategies, assesses the integrity and risk profile of the app; Section 2. Function, focuses on descriptive aspects related to accessibility, costs, organizational credibility, evidence and clinical foundation, privacy/security, usability, functions for remote monitoring of the user, access to crisis services, and artificial intelligence (AI); and Section 3. Mental Health App Features, focuses on specific mental health app features, such as journaling and mood tracking. Conclusion. FASTER may be used to help appraise and select mental health mobile apps. Future application, testing, and refinements may be required to determine the framework’s suitability and reliability across multiple mental health conditions, as well as to account for the rapidly expanding applications of AI, gamification, and other new technology approaches.
APA, Harvard, Vancouver, ISO, and other styles
4

Michelitsch, Roland, Roni Szwedzki, José Ignacio Sembler, Ulrike Haarsager, José Carbajo, Juan Felipe Murcia, Raphael Seiwald, et al. Evaluation of Public-Private Partnerships in Infrastructure. Inter-American Development Bank, March 2017. http://dx.doi.org/10.18235/0000641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strachan, Anna Louise. Potential Private Sector Involvement in Supporting Refugee Livelihoods and Self-reliance in Uganda: Annotated Bibliography. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.072.

Full text
Abstract:
There is some evidence of the private sector playing a role in supporting refugee livelihoods and self-reliance in Uganda during the period 2016-2020. However, a number of evaluations and research reports highlight the potential for greater private sector involvement, if existing constraints are addressed. Key lessons identified in the literature include the need for more research, especially on market potential, to address the existing knowledge gaps on the role the private sector can play in supporting refugee livelihoods and self-reliance in Uganda. The literature notes that limited access to capital, as well as appropriate financing schemes, are key constraints to the growth of the agribusiness sector. Furthermore, access to natural resources required for agri-business, such as land and water needs to receive more attention from NGOs and donors. The evidence also shows that there is a need for guidelines on the monitoring and evaluation of humanitarian adaptations of market systems development programming. The literature also notes that local actors should be involved in the design and assessment of investment opportunities and risk of interventions to increase project impact.
APA, Harvard, Vancouver, ISO, and other styles
6

Pires, Jose Claudio Linhares, Gunnar Gotz, Regina Legarreta, Diego Del Pilar, Stefania De Santis, Melanie Putic, Ruben Lamdany, Kai Preugschat, and Nadia Ramírez. Corporate Evaluation: Evaluation of Guarantee Instruments at the IDB Group. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0004191.

Full text
Abstract:
This evaluation reviews the experience of the Inter-American Development Bank Group (IDB Group) with using medium- and long-term guarantees to support its clients during the period 2005 to 2020. This is the first evaluation by the Office of Evaluation and Oversight (OVE) of the guarantee instrument - an instrument that has the potential to mobilize private resources and has been in the tool kit of the Inter-American Development Bank (IDB) since its establishment (see IDB, 1996). The evaluation is delivered at a time when the IDB Group and its borrowers are looking for innovative ways to mobilize additional financing to confront the consequences of the COVID-19 pandemic, to meet the Sustainable Development Goals, and to comply with the Paris Agreement. The From Billions to Trillions initiative prepared jointly by several multilateral development banks (MDBs) aims to mobilize private financing for these goals (AfDB et al., 2015). This evaluation examines the extent to which the IDB Group has used guarantees to mobilize private resources and identifies the main challenges to the use of long- and medium-term guarantees. The focus is on guarantees as an instrument, and thus the evaluation does not assess the outcomes of projects and programs financed using guarantees.
APA, Harvard, Vancouver, ISO, and other styles
7

Brophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Szwedzki, Roni, Roland Michelitsch, Ulrike Haarsager, José Ignacio Sembler, María Cabrera, Rocío Funes Aguilera, Juan Felipe Murcia, et al. Approach Paper: Evaluation of Public-Private (PPPs) Partnerships in Infrastructure. Inter-American Development Bank, August 2016. http://dx.doi.org/10.18235/0000579.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.

Full text
Abstract:
This approach paper defines the objectives, scope, and methodology for the evaluation of IDB Invest by the Office of Evaluation and Oversight (OVE). At the 2015 annual meeting in Busan, the Boards of Governors of the Inter-American Development Bank (IDB) and the Inter-American Investment Corporation (IIC) decided to consolidate the IDB Group's private sector operations into the IIC. This decision was accompanied by a US$2.03 billion capital increase for the IIC over a 10-year period (2016-2025). This process of consolidation and capitalization, known as the private sector merge-out, took effect on 1 January 2016. In 2017, OVE completed a midterm review of implementation of the private sector merge-out to identify emerging lessons that might be helpful in completing the merge-out. In November 2017, the IIC was rebranded as IDB Invest. At the request of the Boards of Executive Directors of the IDB and IDB Invest, this evaluation was included in OVE's 2021-2022 work program. The Busan Resolution set forth a “Renewed Vision” for promoting development through the private sector. This Renewed Vision provides a long-term framework (2016-2025) for IDB Invest and focuses on strengthening development effectiveness, development impact, and additionality of operations, as well as maximizing the efficient use of resources and synergies between the IDB Group's public and private sector activities. The merge-out was selected as the way to implement this Renewed Vision. The challenges posed by the COVID-19 health crisis, as well as current discussions on the need to pursue a new business model for the institution and its financial and operational implications, make this an ideal moment to take stock of lessons learned and provide input for future discussions at the corporate level. Against this backdrop, this evaluation seeks to report independently to the Boards of Executive Directors of the IDB and IDB Invest on the effectiveness of the implementation to date of the Renewed Vision that gave rise to the creation of IDB Invest. This evaluation will also use the findings of OVE's 2017 midterm review of implementation of the merge-out to further analyze areas that had not yet matured at that time (e.g., finance, operations management, development effectiveness, etc.). The evaluation will cover the period from January 2016 (when the merge-out took effect) to December 2021.
APA, Harvard, Vancouver, ISO, and other styles
10

Linares, Ana Maria, Roland Michelitsch, Ulrike Haarsager, Jose Claudio Pires, Alejandro Soriano, Roni Szwedzki, Stephany Maqueda Gassos, et al. Approach Paper: Evaluation of the Implementation of the Private Sector Merge-out. Inter-American Development Bank, June 2017. http://dx.doi.org/10.18235/0000720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography