Journal articles on the topic 'Privacy evaluation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Privacy evaluation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Full textvan Aaken, Dominik, and Andreas Ostermaier. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Academy of Management Proceedings 2013, no. 1 (January 2013): 15830. http://dx.doi.org/10.5465/ambpp.2013.131.
Full textvan Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Kyklos 67, no. 2 (April 10, 2014): 133–55. http://dx.doi.org/10.1111/kykl.12047.
Full textPetrakos, Nikolaos, Stefanos Monachos, Emmanouil Magkos, and Panayiotis Kotzanikolaou. "Design and Implementation of an Anonymous and Secure Online Evaluation Protocol." Electronics 9, no. 9 (September 1, 2020): 1415. http://dx.doi.org/10.3390/electronics9091415.
Full textMamakou, Xenia J., Dimitris K. Kardaras, and Eleutherios A. Papathanassiou. "Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology." Journal of Information Science 44, no. 4 (March 1, 2017): 425–42. http://dx.doi.org/10.1177/0165551517697610.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textAsad, Muhammad, Ahmed Moustafa, and Chao Yu. "A Critical Evaluation of Privacy and Security Threats in Federated Learning." Sensors 20, no. 24 (December 15, 2020): 7182. http://dx.doi.org/10.3390/s20247182.
Full textBabaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." International Journal of Strategic Information Technology and Applications 10, no. 2 (April 2019): 44–58. http://dx.doi.org/10.4018/ijsita.2019040103.
Full textAKIYAMA, Ken, Tomofumi HIRAYAMA, Yoshiki NAKAMURA, and Masao INUI. "PRIVACY AND COMMUNICATION IN OFFICE ENVIRONMENT EVALUATION." Journal of Architecture and Planning (Transactions of AIJ) 61, no. 484 (1996): 97–104. http://dx.doi.org/10.3130/aija.61.97_3.
Full textYan, Zheng, Wenxiu Ding, Valtteri Niemi, and Athanasios V. Vasilakos. "Two Schemes of Privacy-Preserving Trust Evaluation." Future Generation Computer Systems 62 (September 2016): 175–89. http://dx.doi.org/10.1016/j.future.2015.11.006.
Full textCottrill, C. D., and P. 'Vonu' Thakuriah. "Privacy in context: an evaluation of policy-based approaches to location privacy protection." International Journal of Law and Information Technology 22, no. 2 (November 26, 2013): 178–207. http://dx.doi.org/10.1093/ijlit/eat014.
Full textSaini, Ikjot, Benjamin St. Amour, and Arunita Jaekel. "Intelligent Adversary Placements for Privacy Evaluation in VANET." Information 11, no. 9 (September 14, 2020): 443. http://dx.doi.org/10.3390/info11090443.
Full textAvizheh, Sepideh, Preston Haffey, and Reihaneh Safavi-Naini. "Privacy-preserving FairSwap: Fairness and privacy interplay." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 417–39. http://dx.doi.org/10.2478/popets-2022-0021.
Full textFestag, Sven, and Cord Spreckelsen. "Privacy-Preserving Deep Learning for the Detection of Protected Health Information in Real-World Data: Comparative Evaluation." JMIR Formative Research 4, no. 5 (May 5, 2020): e14064. http://dx.doi.org/10.2196/14064.
Full textXudong, Yang, Gao Ling, Li Yan, Zhu Hairong, Gao Quanli, Zheng Jie, and Wang Hai. "A Blockchain-Based Location Privacy-Preserving Scheme in Location-Based Service." Mobile Information Systems 2022 (April 6, 2022): 1–16. http://dx.doi.org/10.1155/2022/1931451.
Full textFroelicher, David, Juan R. Troncoso-Pastoriza, Apostolos Pyrgelis, Sinem Sav, Joao Sa Sousa, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. "Scalable Privacy-Preserving Distributed Learning." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 323–47. http://dx.doi.org/10.2478/popets-2021-0030.
Full textRaval, Nisarg, Ashwin Machanavajjhala, and Jerry Pan. "Olympus: Sensor Privacy through Utility Aware Obfuscation." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 5–25. http://dx.doi.org/10.2478/popets-2019-0002.
Full textJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Full textIsmail, Leila, and Huned Materwala. "Blockchain Paradigm for Healthcare: Performance Evaluation." Symmetry 12, no. 8 (July 22, 2020): 1200. http://dx.doi.org/10.3390/sym12081200.
Full textJunejo, Aisha Zahid, Manzoor Ahmed Hashmani, and Mehak Maqbool Memon. "Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges." Applied Sciences 11, no. 15 (July 29, 2021): 7013. http://dx.doi.org/10.3390/app11157013.
Full textWang Rui, Wei Xianglin, Wu Lifa, and He Zhengqiu. "Privacy-aware Trust Evaluation Model for Web Service." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 5, no. 8 (April 30, 2013): 823–22. http://dx.doi.org/10.4156/aiss.vol5.issue8.98.
Full textZhang, Qiujin, Rong Jiang, Tong Li, Zifei Ma, Ming Yang, and Juan Yang. "Cloud Computing Privacy Security Risk Analysis and Evaluation." Recent Patents on Computer Science 11, no. 1 (October 18, 2018): 32–43. http://dx.doi.org/10.2174/2213275911666180719121041.
Full textQiao, Yuncheng, Qiujun Lan, Zhongding Zhou, and Chaoqun Ma. "Privacy-preserving credit evaluation system based on blockchain." Expert Systems with Applications 188 (February 2022): 115989. http://dx.doi.org/10.1016/j.eswa.2021.115989.
Full textArputharaj, Dr Vijay, Mr Mahmud El Yakub, Mr Saheed Tunde, and Mr M. Ponsuresh. "Evaluation On Threats To Privacy In Personal Relationships." International Journal of Advanced Networking and Applications 13, no. 04 (2022): 5089–94. http://dx.doi.org/10.35444/ijana.2022.13412.
Full textZHU, Youwen, and Tsuyoshi TAKAGI. "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A, no. 1 (2014): 409–12. http://dx.doi.org/10.1587/transfun.e97.a.409.
Full textCHEN, Zhenguo, and Liqin TIAN. "Privacy-Preserving Model of IoT Based Trust Evaluation." IEICE Transactions on Information and Systems E100.D, no. 2 (2017): 371–74. http://dx.doi.org/10.1587/transinf.2016edl8185.
Full textGood, Kenneth, and Kenneth Roy. "Open plan privacy index measurement source speaker evaluation." Journal of the Acoustical Society of America 121, no. 5 (May 2007): 3035. http://dx.doi.org/10.1121/1.4781683.
Full textClarke, R. "An evaluation of privacy impact assessment guidance documents." International Data Privacy Law 1, no. 2 (February 15, 2011): 111–20. http://dx.doi.org/10.1093/idpl/ipr002.
Full textGhafarian, Ahmad, and Seyed Amin. "Forensics Evaluation of Privacy of Portable Web Browsers." International Journal of Computer Applications 147, no. 8 (August 16, 2016): 5–11. http://dx.doi.org/10.5120/ijca2016911009.
Full textMarky, Karola, Nina Gerber, Michelle Gabriela Pelzer, Mohamed Khamis, and Max Mühlhäuser. "“You offer privacy like you offer tea”: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 400–420. http://dx.doi.org/10.56553/popets-2022-0115.
Full textYan, Qiben, Jianzhi Lou, Mehmet C. Vuran, and Suat Irmak. "Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems." ACM Transactions on Sensor Networks 17, no. 4 (July 22, 2021): 1–30. http://dx.doi.org/10.1145/3463575.
Full textOlacsi, Gary S., Joy Kempic, and Robert J. Beaton. "Image Quality of Privacy Filters for Displays." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 42, no. 22 (October 1998): 1565–69. http://dx.doi.org/10.1177/154193129804202207.
Full textLu, Donghang, Albert Yu, Aniket Kate, and Hemanta Maji. "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 396–416. http://dx.doi.org/10.2478/popets-2022-0020.
Full textYousif, Maysa Abubaker, and Aniza Abdul Aziz. "AN EVALUATION OF VISUAL PRIVACY LEVEL IN RESIDENTIAL UNIT'S LAYOUTS IN KHARTOUM, SUDAN." Journal of Islamic Architecture 6, no. 4 (December 26, 2021): 349–59. http://dx.doi.org/10.18860/jia.v6i4.12201.
Full textHong, Tie, SongZhu Mei, ZhiYing Wang, and JiangChun Ren. "A Novel Vertical Fragmentation Method for Privacy Protection Based on Entropy Minimization in a Relational Database." Symmetry 10, no. 11 (November 14, 2018): 637. http://dx.doi.org/10.3390/sym10110637.
Full textSun, Da-Zhi, Li Sun, and Ying Yang. "On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy." Sensors 19, no. 15 (July 24, 2019): 3259. http://dx.doi.org/10.3390/s19153259.
Full textGong, Mengchun, Shuang Wang, Lezi Wang, Chao Liu, Jianyang Wang, Qiang Guo, Hao Zheng, Kang Xie, Chenghong Wang, and Zhouguang Hui. "Evaluation of Privacy Risks of Patients’ Data in China: Case Study." JMIR Medical Informatics 8, no. 2 (February 5, 2020): e13046. http://dx.doi.org/10.2196/13046.
Full textMartins, Paulo. "Respect for privacy begins when gathering information." Comunicação e Sociedade 25 (June 30, 2014): 186–201. http://dx.doi.org/10.17231/comsoc.25(2014).1868.
Full textZheng, He, Bo Wu, Heyi Wei, Jinbiao Yan, and Jianfeng Zhu. "A Quantitative Method for Evaluation of Visual Privacy in Residential Environments." Buildings 11, no. 7 (June 26, 2021): 272. http://dx.doi.org/10.3390/buildings11070272.
Full textSanfilippo, Madelyn, Brett Frischmann, and Katherine Standburg. "Privacy as Commons: Case Evaluation Through the Governing Knowledge Commons Framework." Journal of Information Policy 8, no. 1 (March 1, 2018): 116–66. http://dx.doi.org/10.5325/jinfopoli.8.1.0116.
Full textWang, Long. "RFID Tag Anti-Collision Security Study and Evaluation." Applied Mechanics and Materials 752-753 (April 2015): 1250–56. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1250.
Full textBagdasaryan, Eugene, Peter Kairouz, Stefan Mellem, Adrià Gascón, Kallista Bonawitz, Deborah Estrin, and Marco Gruteser. "Towards Sparse Federated Analytics: Location Heatmaps under Distributed Differential Privacy with Secure Aggregation." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 162–82. http://dx.doi.org/10.56553/popets-2022-0104.
Full textBenjumea, Jaime, Jorge Ropero, Octavio Rivera-Romero, Enrique Dorronzoro-Zubiete, and Alejandro Carrasco. "Privacy Assessment in Mobile Health Apps: Scoping Review." JMIR mHealth and uHealth 8, no. 7 (July 2, 2020): e18868. http://dx.doi.org/10.2196/18868.
Full textSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (October 27, 2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Full textWang, Jinbao, Ling Tian, Yan Huang, Donghua Yang, and Hong Gao. "Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems." Security and Communication Networks 2018 (September 26, 2018): 1–15. http://dx.doi.org/10.1155/2018/7963163.
Full textZimmeck, Sebastian, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N. Cameron Russell, and Norman Sadeh. "MAPS: Scaling Privacy Compliance Analysis to a Million Apps." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 66–86. http://dx.doi.org/10.2478/popets-2019-0037.
Full textZhou, Yang, Hua Shen, and Mingwu Zhang. "A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control." Symmetry 14, no. 2 (February 19, 2022): 415. http://dx.doi.org/10.3390/sym14020415.
Full textDogruel, Leyla. "Privacy nudges as policy interventions: comparing US and German media users’ evaluation of information privacy nudges." Information, Communication & Society 22, no. 8 (November 13, 2017): 1080–95. http://dx.doi.org/10.1080/1369118x.2017.1403642.
Full textNasiri, Negar, and MohammadReza Keyvanpour. "Classification and Evaluation of Privacy Preserving Data Mining Methods." International Journal of Information & Communication Technology Research 12, no. 3 (September 1, 2020): 27–37. http://dx.doi.org/10.52547/ijict.12.3.27.
Full textBlundo, Carlo, Emiliano De Cristofaro, and Paolo Gasti. "EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity." Journal of Computer Security 22, no. 3 (March 20, 2014): 355–81. http://dx.doi.org/10.3233/jcs-130482.
Full text