Academic literature on the topic 'Privacy evaluation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy evaluation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy evaluation"
Sohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Full textvan Aaken, Dominik, and Andreas Ostermaier. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Academy of Management Proceedings 2013, no. 1 (January 2013): 15830. http://dx.doi.org/10.5465/ambpp.2013.131.
Full textvan Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Kyklos 67, no. 2 (April 10, 2014): 133–55. http://dx.doi.org/10.1111/kykl.12047.
Full textPetrakos, Nikolaos, Stefanos Monachos, Emmanouil Magkos, and Panayiotis Kotzanikolaou. "Design and Implementation of an Anonymous and Secure Online Evaluation Protocol." Electronics 9, no. 9 (September 1, 2020): 1415. http://dx.doi.org/10.3390/electronics9091415.
Full textMamakou, Xenia J., Dimitris K. Kardaras, and Eleutherios A. Papathanassiou. "Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology." Journal of Information Science 44, no. 4 (March 1, 2017): 425–42. http://dx.doi.org/10.1177/0165551517697610.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textAsad, Muhammad, Ahmed Moustafa, and Chao Yu. "A Critical Evaluation of Privacy and Security Threats in Federated Learning." Sensors 20, no. 24 (December 15, 2020): 7182. http://dx.doi.org/10.3390/s20247182.
Full textBabaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." International Journal of Strategic Information Technology and Applications 10, no. 2 (April 2019): 44–58. http://dx.doi.org/10.4018/ijsita.2019040103.
Full textAKIYAMA, Ken, Tomofumi HIRAYAMA, Yoshiki NAKAMURA, and Masao INUI. "PRIVACY AND COMMUNICATION IN OFFICE ENVIRONMENT EVALUATION." Journal of Architecture and Planning (Transactions of AIJ) 61, no. 484 (1996): 97–104. http://dx.doi.org/10.3130/aija.61.97_3.
Full textYan, Zheng, Wenxiu Ding, Valtteri Niemi, and Athanasios V. Vasilakos. "Two Schemes of Privacy-Preserving Trust Evaluation." Future Generation Computer Systems 62 (September 2016): 175–89. http://dx.doi.org/10.1016/j.future.2015.11.006.
Full textDissertations / Theses on the topic "Privacy evaluation"
Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.
Full textLundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.
Full textMood, Benjamin, and Benjamin Mood. "Optimizing Secure Function Evaluation on Mobile Devices." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12505.
Full textO'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.
Full textCvach, Marek, Menal Sanna Kahsay, and Micaela Shamoun. "Privacy online: Exploring consumers’ evaluation of privacy issues in relation to personalised advertisement when buying online." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40054.
Full textMajeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.
Full textRohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.
Full textTiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
Abril, Castellano Daniel. "Privacy protection methods for documents and risk evaluation for microdata." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/285353.
Full textThe capability to collect and store digital information by statistical agencies, governments or individuals has created huge opportunities to analyze and build knowledge-based models. With the rise of Internet many services and companies have exploited these opportunities collecting huge amounts of data, which most of the cases are considered confidential. This causes the need to develop methods that allow the dissemination of confidential data for data mining purposes while preserving individuals' private information. Thus, personal data could be collected, transferred or sold to third parties ensuring the individuals' confidentiality, but still being statistically useful. Internet is full of unstructured textual data like posts or documents with a large content of information that can be extracted and analyzed. Documents are especially difficult to protect due to their lack of structure. In this thesis we distinguish two different models to protect documents. On the one hand, we consider the protection of a collection of documents, so this set of documents can be analyzed by means of text mining and machine learning techniques. On the other hand, we consider the protection of single documents by means of the documents' sanitization. This is the process of detecting and removing the parts of the text considered sensitive. When dealing with governmental classified information, sanitization attempts to reduce the sensitiveness of the document, possibly yielding a non-classified document. In this way, governments show they uphold the freedom of information while the national security is not jeopardised. This thesis presents a set of different methods and experiments for the protection of unstructured textual data protection and besides, it introduces an advanced method to evaluate the security of microdata protection methods. The main contributions are: * The development of a new semi-automatic method to assist documents' declassification. * The definition of two specific metrics for evaluating the information loss and disclosure risk of sanitized documents. * The development of two cluster-based approaches based on the k-anonymity principle to anonymize vector space models. One exploits the sparsity and the other exploits the possible semantic relations of those vectors. * The study of advanced methods to evaluate the disclosure risk of microdata protection methods. In particular, we have developed a general supervised metric learning approach for distance-based record linkage. Moreover, we have reviewed the suitability of a set of parameterized distance functions that can be used together with the supervised approach.
Paananen, K. (Kimmo). "Evaluation of privacy, security and quality of Internet-based communication solutions." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605221866.
Full textEschricht, Johannes. "mHealth and the need of evaluation processes." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16442.
Full textBooks on the topic "Privacy evaluation"
Peter, Fletcher, ed. Practical Web traffic analysis: Standards, privacy, techniques, results. Birmingham: Glasshaus, 2002.
Find full textComplete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.
Find full textPearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.
Find full textCatalfamo, Holly A. Openness and privacy in Ontario: an evaluation of the implementation of FIPPA: (The Freedom of Information and Protection of Privacy Act, 1987, Chapter 25 and Ontario Regulation 532/87). St. Catharines, [Ont.]: Dept. of Politics, Brock University, 1993.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Find full textInstitute of Medicine (U.S.). Committee on the Role of Institutional Review Boards in Health Services Research Data Privacy Protection. Protecting data privacy in health services research. Washington, D.C: National Academy Press, 2000.
Find full textNo more rights without remedies: An impact evaluation of the National Crime Victim Law Institute's victims' rights clinics. Santa Monica, CA: RAND, 2012.
Find full textComplete guide to security and privacy metrics: Measuring regulatory compliance, operational resilience, and ROI. Boca Raton, FL: Auerbach Publications, 2006.
Find full textBook chapters on the topic "Privacy evaluation"
Ardagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.
Full textPang, Bo, Long Chen, Xiong Fan, and Qiang Tang. "Multi-input Laconic Function Evaluation." In Information Security and Privacy, 369–88. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55304-3_19.
Full textDe Marsico, Maria. "Biometric Systems Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1605-1.
Full textCastro, Jordi. "A Computational Evaluation of Optimization Solvers for CTA." In Privacy in Statistical Databases, 11–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33627-0_2.
Full textHu, Jingchen, Jerome P. Reiter, and Quanli Wang. "Disclosure Risk Evaluation for Fully Synthetic Categorical Data." In Privacy in Statistical Databases, 185–99. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11257-2_15.
Full textKitazawa, Shigeki, Masakazu Soshi, and Atsuko Miyaji. "Evaluation of Anonymity of Practical Anonymous Communication Networks." In Information Security and Privacy, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45067-x_2.
Full textFörster, David. "Evaluation of Pseudonym Strategies." In Verifiable Privacy Protection for Vehicular Communication Systems, 27–54. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-18550-3_3.
Full textDe Marsico, Maria. "Biometric Spoofing and Its Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1657-1.
Full textManzanares-Salor, Benet, David Sánchez, and Pierre Lison. "Automatic Evaluation of Disclosure Risks of Text Anonymization Methods." In Privacy in Statistical Databases, 157–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_12.
Full textLivraga, Giovanni. "Privacy in Microdata Release: Challenges, Techniques, and Approaches." In Data-Driven Policy Impact Evaluation, 67–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78461-8_5.
Full textConference papers on the topic "Privacy evaluation"
Kunihiro, Noboru, Wen-Jie Lu, Takashi Nishide, and Jun Sakuma. "Outsourced Private Function Evaluation with Privacy Policy Enforcement." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00068.
Full textZhou, Liang, Xin Wei, Jingwu Cui, and Baoyu Zheng. "Privacy-Aware QoE Evaluation." In 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, 2017. http://dx.doi.org/10.1109/vtcspring.2017.8108550.
Full textLazzeretti, Riccardo, Jorge Guajardo, and Mauro Barni. "Privacy preserving ECG quality evaluation." In the. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2361407.2361435.
Full textBoyd, Kendrick, Eric Lantz, and David Page. "Differential Privacy for Classifier Evaluation." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808769.2808775.
Full textKorshunov, Pavel, and Touradj Ebrahimi. "PEViD: privacy evaluation video dataset." In SPIE Optical Engineering + Applications, edited by Andrew G. Tescher. SPIE, 2013. http://dx.doi.org/10.1117/12.2030974.
Full textMello, Victor, Tania Basso, and Regina Moraes. "A Test Process Model to Evaluate Performance Impact of Privacy Protection Solutions." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2014. http://dx.doi.org/10.5753/wtf.2014.22946.
Full textFarnan, Nicholas L., Adam J. Lee, and Ting Yu. "Investigating privacy-aware distributed query evaluation." In the 9th annual ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866919.1866926.
Full textHuang, Hsiao-Ying, and Masooda Bashir. "Privacy by region: Evaluation online users' privacy perceptions by geographical region." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821721.
Full textLicorish, Sherlock A., Stephen G. MacDonell, and Tony Clear. "Analyzing confidentiality and privacy concerns." In EASE '15: 19th International Conference on Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2745802.2745819.
Full textSun, Ruoxi, and Minhui Xue. "Quality Assessment of Online Automated Privacy Policy Generators." In EASE '20: Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3383219.3383247.
Full textReports on the topic "Privacy evaluation"
Vonk, Jaynie. Going Digital: Privacy and data security under GDPR for quantitative impact evaluation. Oxfam, October 2019. http://dx.doi.org/10.21201/2019.5211.
Full textRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, October 2021. http://dx.doi.org/10.21248/gups.63413.
Full textAgarwal, Smisha, Madhu Jalan, Holly C. Wilcox, Ritu Sharma, Rachel Hill, Emily Pantalone, Johannes Thrul, Jacob C. Rainey, and Karen A. Robinson. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), May 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Full textMichelitsch, Roland, Roni Szwedzki, José Ignacio Sembler, Ulrike Haarsager, José Carbajo, Juan Felipe Murcia, Raphael Seiwald, et al. Evaluation of Public-Private Partnerships in Infrastructure. Inter-American Development Bank, March 2017. http://dx.doi.org/10.18235/0000641.
Full textStrachan, Anna Louise. Potential Private Sector Involvement in Supporting Refugee Livelihoods and Self-reliance in Uganda: Annotated Bibliography. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.072.
Full textPires, Jose Claudio Linhares, Gunnar Gotz, Regina Legarreta, Diego Del Pilar, Stefania De Santis, Melanie Putic, Ruben Lamdany, Kai Preugschat, and Nadia Ramírez. Corporate Evaluation: Evaluation of Guarantee Instruments at the IDB Group. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0004191.
Full textBrophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5340.
Full textSzwedzki, Roni, Roland Michelitsch, Ulrike Haarsager, José Ignacio Sembler, María Cabrera, Rocío Funes Aguilera, Juan Felipe Murcia, et al. Approach Paper: Evaluation of Public-Private (PPPs) Partnerships in Infrastructure. Inter-American Development Bank, August 2016. http://dx.doi.org/10.18235/0000579.
Full textSembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.
Full textLinares, Ana Maria, Roland Michelitsch, Ulrike Haarsager, Jose Claudio Pires, Alejandro Soriano, Roni Szwedzki, Stephany Maqueda Gassos, et al. Approach Paper: Evaluation of the Implementation of the Private Sector Merge-out. Inter-American Development Bank, June 2017. http://dx.doi.org/10.18235/0000720.
Full text