Journal articles on the topic 'Privicy protection'

To see the other types of publications on this topic, follow the link: Privicy protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privicy protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Xie, Guangxu, Gaopan Hou, Qingqi Pei, and Haibo Huang. "Lightweight Privacy Protection via Adversarial Sample." Electronics 13, no. 7 (March 26, 2024): 1230. http://dx.doi.org/10.3390/electronics13071230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Adversarial sample-based privacy protection has its own advantages compared to traditional privacy protections. Previous adversarial sample privacy protections have mostly been centralized or have not considered the issue of hardware device limitations when conducting privacy protection, especially on the user’s local device. This work attempts to reduce the requirements of adversarial sample privacy protections on devices, making the privacy protection more locally friendly. Adversarial sample-based privacy protections rely on deep learning models, which generally have a large number of parameters, posing challenges for deployment. Fortunately, the model structural pruning technique has been proposed, which can be employed to reduce the parameter count of deep learning models. Based on the model pruning technique Depgraph and existing adversarial sample privacy protections AttriGuard and MemGuard, we design two structural pruning-based adversarial sample privacy protections, in which the user obtains the perturbed data through the pruned deep learning model. Extensive experiments are conducted on four datasets, and the results demonstrate the effectiveness of our adversarial sample privacy protection based on structural pruning.
2

Bonomi, Luca, Xiaoqian Jiang, and Lucila Ohno-Machado. "Protecting patient privacy in survival analyses." Journal of the American Medical Informatics Association 27, no. 3 (November 21, 2019): 366–75. http://dx.doi.org/10.1093/jamia/ocz195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Objective Survival analysis is the cornerstone of many healthcare applications in which the “survival” probability (eg, time free from a certain disease, time to death) of a group of patients is computed to guide clinical decisions. It is widely used in biomedical research and healthcare applications. However, frequent sharing of exact survival curves may reveal information about the individual patients, as an adversary may infer the presence of a person of interest as a participant of a study or of a particular group. Therefore, it is imperative to develop methods to protect patient privacy in survival analysis. Materials and Methods We develop a framework based on the formal model of differential privacy, which provides provable privacy protection against a knowledgeable adversary. We show the performance of privacy-protecting solutions for the widely used Kaplan-Meier nonparametric survival model. Results We empirically evaluated the usefulness of our privacy-protecting framework and the reduced privacy risk for a popular epidemiology dataset and a synthetic dataset. Results show that our methods significantly reduce the privacy risk when compared with their nonprivate counterparts, while retaining the utility of the survival curves. Discussion The proposed framework demonstrates the feasibility of conducting privacy-protecting survival analyses. We discuss future research directions to further enhance the usefulness of our proposed solutions in biomedical research applications. Conclusion The results suggest that our proposed privacy-protection methods provide strong privacy protections while preserving the usefulness of survival analyses.
3

Zhenjiang Zhang, Zhenjiang Zhang, and Xiaohua Liu Zhenjiang Zhang. "Cloud-side Collaborative Privacy Protection Based on Differential Privacy." 電腦學刊 32, no. 4 (August 2021): 239–51. http://dx.doi.org/10.53106/199115992021083204019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meier, Yannic, Johanna Schäwel, and Nicole C. Krämer. "Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites." Studies in Communication and Media 10, no. 3 (2021): 283–306. http://dx.doi.org/10.5771/2192-4007-2021-3-283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the present study extended this so-called privacy calculus approach by additionally focusing on privacy protection by means of a tool. Furthermore, it is important to understand contextual differences in privacy behaviors as well as characteristics of privacy-protecting tools that may affect usage intention. Results of an online experiment (N = 511) supported the basic notion of the privacy calculus and revealed that perceived privacy risks were strongly related to participants’ desired privacy protection which, in turn, was positively related to the willingness to use a privacy-protecting tool. Self-disclosure was found to be context dependent, whereas privacy protection was not. Moreover, participants would rather forgo using a tool that records their data, although this was described to enhance privacy protection.
5

Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belobelovol5issue2page74-85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRACT Recognition and protection of a guarantee of human dignity to earn a respectable place in the eyes of the law and government. Related to the interests of law enforcement, the Corruption Eradication Commission (KPK) for the purpose of wiretapping evidence in court, while will protecting the privacyrights of suspects. Legal protections for the accused to be seen as matter of law adopted. Therefore, the protection of the privacy rights of a person to be seen in the investigation process. For the Commission to conduct wiretaps should see privacy rights as stipulated in the law and the government should establish a special set of rules that intercepts, thus providing the possibility for law enforcement has the authority to do so does not conflict with human rights.
6

Nussy, Jennifer Ingelyne. "Mekanisme Komisi Pemberantasan Korupsi dalam Proses Penyadapan dilihat dari Perspektif Hak Asasi Manusia (HAM)." JURNAL BELO 5, no. 2 (May 19, 2020): 74–85. http://dx.doi.org/10.30598/belovol5issue2page74-85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRACT Recognition and protection of a guarantee of human dignity to earn a respectable place in the eyes of the law and government. Related to the interests of law enforcement, the Corruption Eradication Commission (KPK) for the purpose of wiretapping evidence in court, while will protecting the privacyrights of suspects. Legal protections for the accused to be seen as matter of law adopted. Therefore, the protection of the privacy rights of a person to be seen in the investigation process. For the Commission to conduct wiretaps should see privacy rights as stipulated in the law and the government should establish a special set of rules that intercepts, thus providing the possibility for law enforcement has the authority to do so does not conflict with human rights.
7

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
8

Singla, Arun. "The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights." Indian Journal of Law 2, no. 1 (2024): 1–6. http://dx.doi.org/10.36676/ijl.v2.i1.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid pace of digital innovation presents significant challenges to existing privacy laws, necessitating a delicate balance between technological advancement and the protection of individual rights. This paper explores the evolving landscape of privacy law, highlighting the tension between fostering digital innovation and ensuring robust privacy protections. Through a historical overview, the paper traces the development of privacy laws from their inception to the current global regulatory framework, including key legislations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). It delves into the challenges posed by emerging technologies, such as artificial intelligence, the Internet of Things (IoT), and big data, and examines case studies that illustrate these challenges. The analysis reveals a dynamic interplay between innovation and privacy, where stringent regulations may impede technological progress, while lax privacy protections may undermine individual rights. The paper proposes legal reforms and innovative approaches to privacy protection, advocating for a flexible legal framework that can adapt to technological advancements while safeguarding privacy. The conclusion underscores the importance of ethical considerations in shaping future privacy laws and the need for a balanced approach that supports both digital innovation and the protection of individual rights.
9

Chen, Zhixuan, Yixiang Zhang, and Zhiyu Zhang. "Research on Privacy Protection Willingness of New Media Platform Users Based on Theory of Planned Behavior." Communications in Humanities Research 16, no. 1 (November 28, 2023): 264–71. http://dx.doi.org/10.54254/2753-7064/16/20230726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In todays digital age, new media platforms have become an important channel for people to obtain information and entertainment. However, what followed was peoples growing concerns about personal privacy security. This study takes all adults who use new media platforms as the research object, explores various factors that affect the willingness to protect privacy, and provides in-depth and practical suggestions for protecting personal privacy. We used the theory of planned behavior, incorporating factors such as age and privacy concerns. Through questionnaire survey, a large amount of data was collected and analyzed using SPSS26. The results showed that although age was not significantly correlated with privacy protection willingness, attitude, subjective norms, perceived behavioral control, and privacy concerns were significantly positively correlated with privacy protection willingness. From the research results and discussion, it can be seen that individual attitudes towards privacy protection and social pressure are important factors that determine the willingness to protect privacy. At the same time, individuals perceived behavioral control and privacy concerns will also affect their privacy protection behavior. To sum up, this study deeply analyzes the privacy protection willingness of adults on new media platforms, and provides guidance and suggestions for privacy protection behaviors in the digital society. This has certain significance for protecting personal privacy and promoting the sustainable development of the digital society.
10

Nahra, Kirk J. "Remarks by Kirk J. Nahra." Proceedings of the ASIL Annual Meeting 116 (2022): 127–29. http://dx.doi.org/10.1017/amp.2023.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
U.S. privacy law often is criticized in comparison with international privacy regimes, particularly the European Union's General Data Protection Regulation. Parts of this criticism are fair, but, at the same time, U.S. privacy law provides meaningful protections in a substantial set of circumstances, and, on occasion, provides either “better” privacy protection than the GDPR or presents a more targeted approach to balancing appropriate privacy protections with other important public policy concerns. This balancing often is not a question of “consumers vs. industry” (although it certainly can be). In some situations—particularly in the health care settings that I will focus on—it often is a question of providing an appropriate balance between privacy interests and other policy interests that benefit both industry and consumers.
11

Nissim, Kobbi, and Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, no. 2128 (August 6, 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This position paper observes how different technical and normative conceptions of privacy have evolved in parallel and describes the practical challenges that these divergent approaches pose. Notably, past technologies relied on intuitive, heuristic understandings of privacy that have since been shown not to satisfy expectations for privacy protection. With computations ubiquitously integrated in almost every aspect of our lives, it is increasingly important to ensure that privacy technologies provide protection that is in line with relevant social norms and normative expectations. Similarly, it is also important to examine social norms and normative expectations with respect to the evolving scientific study of privacy. To this end, we argue for a rigorous analysis of the mapping from normative to technical concepts of privacy and vice versa. We review the landscape of normative and technical definitions of privacy and discuss specific examples of gaps between definitions that are relevant in the context of privacy in statistical computation. We then identify opportunities for overcoming their differences in the design of new approaches to protecting privacy in accordance with both technical and normative standards. This article is part of a discussion meeting issue ‘The growing ubiquity of algorithms in society: implications, impacts and innovations’.
12

Colangelo, Giuseppe, and Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, no. 6 (May 10, 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Cui, Mingwu, Fangfang Ding, and Kun Cai. "The Influence of Self-Efficacy of College Students in Privacy Protection and Behavior in Social Networking Context." Scientific and Social Research 6, no. 3 (March 29, 2024): 126–43. http://dx.doi.org/10.26689/ssr.v6i3.6445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the era of mobile social media, users who show themselves on social platforms will face the risk of privacy breaches. Frequent data leaks and increasingly complex social media privacy protection terms intensify users’ privacy concerns, along with mandatory privacy exposure, contributing to privacy fatigue among users. This study examines the changes in privacy protection behavior among college students under the influences of privacy concerns and privacy fatigue from the perspective of self-efficacy in privacy protection. Data is collected through a questionnaire survey, and a structural equation model is established to provide insights into protecting user privacy. The results of this research indicate that college students’ internal self-efficacy in privacy protection has a negative impact on privacy fatigue. College students’ privacy concerns are significantly negatively correlated with their willingness to disclose information, while privacy fatigue is significantly positively correlated with their willingness to disclose information. Privacy fatigue among college students has a significant positive influence on both their disclosure intention and the behavior of disengaging from privacy protection.
14

Dales, Loring. "Privacy Protection." Pediatrics 107, no. 6 (June 1, 2001): 1495.2–1495. http://dx.doi.org/10.1542/peds.107.6.1495b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bransfield, Robert. "Privacy ‘Protection’." Psychiatric News 37, no. 17 (September 6, 2002): 32. http://dx.doi.org/10.1176/pn.37.17.0032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Rotenberg, Marc. "Privacy protection." Government Information Quarterly 11, no. 3 (January 1994): 253–54. http://dx.doi.org/10.1016/0740-624x(94)90045-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Qin, Peng, and Lina Wang. "PPVC: Towards a Personalized Local Differential Privacy-Preserving Scheme for V2G Charging Networks." Mathematics 11, no. 20 (October 12, 2023): 4257. http://dx.doi.org/10.3390/math11204257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid development of electric vehicles provides users with convenience of life. When users enjoy the V2G charging service, privacy leakage of their charging location is a crucial security issue. Existing privacy-preserving algorithms for EV access to charging locations suffer from the problem of nondefendable background knowledge attacks and privacy attacks by untrustworthy third parties. We propose a personalized location privacy protection scheme (PPVC) based on differential privacy to meet users’ personalized EV charging requirements while protecting their privacy. First, by constructing a decision matrix, PPVC describes recommended routes’ utility and privacy effects. Then, a utility model is constructed based on the multiattribute theory. The user’s privacy preferences are integrated into the model to provide the route with the best utility. Finally, considering the privacy preference needs of users, the Euclidean distance share is used to assign appropriate privacy budgets to users and determine the generation range of false locations to generate the service request location with the highest utility. The experimental results show that the proposed personalized location privacy protection scheme can meet the service demands of users while reasonably protecting their privacy to provide higher service quality. Compared with existing solutions, PPVC improves the charging efficiency by up to 25%, and 8% at the same privacy protection level.
18

Jia, Dongning, Bo Yin, and Xianqing Huang. "Association Analysis of Private Information in Distributed Social Networks Based on Big Data." Wireless Communications and Mobile Computing 2021 (June 4, 2021): 1–12. http://dx.doi.org/10.1155/2021/1181129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As people’s awareness of the issue of privacy leakage continues to increase, and the demand for privacy protection continues to increase, there is an urgent need for some effective methods or means to achieve the purpose of protecting privacy. So far, there have been many achievements in the research of location-based privacy services, and it can effectively protect the location privacy of users. However, there are few research results that require privacy protection, and the privacy protection system needs to be improved. Aiming at the shortcomings of traditional differential privacy protection, this paper designs a differential privacy protection mechanism based on interactive social networks. Under this mechanism, we have proved that it meets the protection conditions of differential privacy and prevents the leakage of private information with the greatest possibility. In this paper, we establish a network evolution game model, in which users only play games with connected users. Then, based on the game model, a dynamic equation is derived to express the trend of the proportion of users adopting privacy protection settings in the network over time, and the impact of the benefit-cost ratio on the evolutionarily stable state is analyzed. A real data set is used to verify the feasibility of the model. Experimental results show that the model can effectively describe the dynamic evolution of social network users’ privacy protection behaviors. This model can help social platforms design effective security services and incentive mechanisms, encourage users to adopt privacy protection settings, and promote the deployment of privacy protection mechanisms in the network.
19

Rothstein, Mark A. "Currents in Contemporary Ethics." Journal of Law, Medicine & Ethics 33, no. 1 (2005): 154–59. http://dx.doi.org/10.1111/j.1748-720x.2005.tb00217.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
For nearly twenty-five years, federal regulation of privacy issues in research involving human subjects was the primary province of the federal rule for Protection of Human Subjects (Common Rule). As of April 14, 2003, the compliance date for the Privacy Rule of the Health Insurance Portability and Accountability Act (HIPAA), however, the Common Rule and the Privacy Rule jointly regulate research privacy. Although, in theory, the Privacy Rule is intended to complement the Common Rule, there are several areas in which the rules diverge. In some instances the inconsistencies result in gaps in privacy protection; in other instances the inconsistencies result in added burdens on researchers without additional privacy protections. In all instances, the lack of harmonization of these rules has created confusion, frustration, and misunderstanding by researchers, research subjects, and institutional review boards (IRBs). In this article, I review the major provisions of the Privacy Rule for research, explain the areas in which the Privacy Rule and Common Rule differ, and conclude that the two rules should be revised to promote consistency and maximize privacy protections while minimizing the burdens on research.
20

Bamberger, Kenneth A., and Ariel Evan Mayse. "PRE-MODERN INSIGHTS FOR POST-MODERN PRIVACY: JEWISH LAW LESSONS FOR THE BIG DATA AGE." Journal of Law and Religion 36, no. 3 (December 2021): 495–532. http://dx.doi.org/10.1017/jlr.2021.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThis article makes the counterintuitive argument that the millennia-old approach of Jewish law to regulating surveillance, protecting communications, and governing collection and use of information offers important frameworks for protecting privacy in an age of big data and pervasive surveillance. The modern approach to privacy has not succeeded. Notions of individual “rights to be let alone” and “informational self-determination” offer little defense against rampant data collection and aggregation. The substantive promise of a “fundamental human right” of privacy has largely been reduced to illusory procedural safeguards of “notice” and “consent”—manipulable protections by which individuals “agree” to privacy terms with little understanding of the bargain and little power to opt out. Judaism, on the other hand, views privacy as a societal obligation and employs categorical behavioral and architectural mandates that bind all of society's members. It limits waiver of these rules and rejects both technological capacity and the related notion of “expectations” as determinants of privacy's content. It assumes the absence of anonymity and does not depend on the confidentiality of information or behavior, whether knowledge is later used or shared, or whether the privacy subject can show concrete personal harm. When certain types of sensitive information are publicly known or cannot help but be visible, Jewish law still provides rules against their use. Jewish law offers a language that can guide policy debates. It suggests a move from individual control over information as the mechanism for shaping privacy's meaning and enforcement, to a regime of substantive obligations—personal and organizational—to protect privacy. It recognizes the interconnected nature of human interests and comprehends the totality of the harm that pervasive surveillance wreaks on individuals and social relations. It offers a conceptual basis for extending traditional privacy protections to online spaces and new data uses. And it provides a language of dignity that recognizes unequal bargaining power, rejects the aggregation and use of information to create confining personal narratives and judgments, and demands equal protection for all humans.
21

Baruh, Lemi, and Mihaela Popescu. "Big data analytics and the limits of privacy self-management." New Media & Society 19, no. 4 (November 2, 2015): 579–96. http://dx.doi.org/10.1177/1461444815614001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article looks at how the logic of big data analytics, which promotes an aura of unchallenged objectivity to the algorithmic analysis of quantitative data, preempts individuals’ ability to self-define and closes off any opportunity for those inferences to be challenged or resisted. We argue that the predominant privacy protection regimes based on the privacy self-management framework of “notice and choice” not only fail to protect individual privacy, but also underplay privacy as a collective good. To illustrate this claim, we discuss how two possible individual strategies—withdrawal from the market (avoidance) and complete reliance on market-provided privacy protections (assimilation)—may result in less privacy options available to the society at large. We conclude by discussing how acknowledging the collective dimension of privacy could provide more meaningful alternatives for privacy protection.
22

Zhang, Jing, Yanzi Li, Qian Ding, Liwei Lin, and Xiucai Ye. "Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy." Entropy 24, no. 9 (August 23, 2022): 1172. http://dx.doi.org/10.3390/e24091172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability. Differential privacy is a promising privacy protection technology for publishing trajectory data securely. Most of the existing trajectory privacy protection schemes do not take into account the user’s preference for location and the influence of semantic location. Besides, differential privacy for trajectory protection still has the problem of balance between the privacy budget and service quality. In this paper, a semantics- and prediction-based differential privacy protection scheme for trajectory data is proposed. Firstly, trajectory data are transformed into a prefix tree structure to ensure that they satisfy differential privacy. Secondly, considering the influence of semantic location on trajectory, semantic sensitivity combined with location check-in frequency is used to calculate the sensitivity of each position in the trajectory. The privacy level of the position is classified by setting thresholds. Moreover, the corresponding privacy budget is allocated according to the location privacy level. Finally, a Markov chain is used to predict the attack probability of each position in the trajectory. On this basis, the allocation of the privacy budget is further adjusted and its utilization rate is improved. Thus, the problem of the balance between the privacy budget and service quality is solved. Experimental results show that the proposed scheme is able to ensure data availability while protecting data privacy.
23

Islam, Md Toriqul. "ADEQUACY OF PRIVACY REGIME IN BANGLADESH: KEY CHALLENGES AND POTENTIAL POLICY MEASURES." IIUM Law Journal 30, no. 1 (July 7, 2022): 33–74. http://dx.doi.org/10.31436/iiumlj.v30i1.655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Privacy is one of the most desired human rights in this ubiquitous computing era - when a vast majority of our work is done online using personal data. Numerous actors are continually monitoring our activities, and consequently, user privacy came under tremendous threats. In response, various legal and policy measures have been adopted at national, regional, and international levels. The citizens of Bangladesh are also experiencing diverse privacy threats, and hence, they deserve to have adequate legal protections. This context requires a study to search for answers to the question - whether there are any legal protections for privacy in the existing legal regime of Bangladesh comparable with international data protection standards. This study aims to fill the gap using doctrinal legal research methodology. The findings of this study reveal that although there is no privacy or comprehensive data protection law in Bangladesh, privacy is conditionally recognised in the Constitution. There are numerous isolated privacy provisions in some other subsidiary legislation and references to privacy in several case laws as well. The results of this study will enlighten all stakeholders regarding privacy issues and facilitate them to map and design future policy strategies. This eventually contributes to establishing a safer online ecosystem in Bangladesh.
24

Wang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The legal effect of Internet privacy policies is self-evident in protecting users’ personal privacy. However, in practical applications, the implementation of privacy policies faces many challenges. First, conflicts between commercial interests and privacy protection often arise, and network service providers may infringe on user privacy in pursuit of commercial interests. Secondly, considerations of national security and social stability may also conflict with the protection of personal privacy. Network service providers may need to cooperate with the investigation and regulatory requirements of government departments, thus causing certain infringements on users' privacy rights. In addition, imperfect laws and regulations on personal privacy protection also limit the legal effectiveness of Internet privacy policies. In order to respond to these challenges, this article clarifies the legal status and scope of validity of Internet privacy policies, strengthens the legal supervision and enforcement of Internet privacy policies, strengthens users’ participation in Internet privacy policies and the protection of rights and interests, establishes a self-regulatory mechanism for network service providers, and Targeted suggestions were put forward in terms of industry standardization mechanisms and other aspects, hoping to improve the legal effectiveness of Internet privacy policies, solve problems and challenges in practical applications, further protect users' privacy rights, and maintain national security and social stability.
25

Kumar, Krishan, Mukesh Kumar Gupta, Nishant Saxena, and Vivek Jaglan. "Homomorphic Encryption Based Privacy Protection for Personalised Web Search." Indian Journal of Science and Technology 15, no. 8 (February 27, 2022): 318–25. http://dx.doi.org/10.17485/ijst/v15i8.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as expressed in Dean Prosser's work Privacy was created. Dean Prosser continued (or expanded) upon the concepts formulated by Warren and Brandeis, particularly in emphasizing the role of common law in protecting privacy. These works, while influential in their time, do not account for paradigm shifts in technology, or, perhaps more importantly, changes in how people live their lives. The unending advance of technology and changes in societal norms fundamentally dictate that privacy theory must change over time, or it will lose its relevance. Indeed, in today ' Web 2.0 world where many people instantly share very private aspects of their lives, one can hardly imagine a privacy concept more foreign than the right to be let alone. The question confronting modern-day privacy scholars is this: Can a common law based theory adequately address the shifting societal norms and rapid technological changes of today's Web 2.0 world where legislatures and government agencies, not courts, are more proactive on privacy protections? This Article argues that the answer is no and instead argues that the overarching principle of privacy of today should not be the right to be let alone, but rather the principle of proportionality. This is Privacy 3. 0.
27

Qiu, Ke. "A secure system for electric vehicle battery swap stations using blockchain." Applied and Computational Engineering 16, no. 1 (October 23, 2023): 13–26. http://dx.doi.org/10.54254/2755-2721/16/20230851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As electric vehicles become more popular, battery swap stations are gaining attention as a new type of charging facility. However, the charging process for electric vehicles involves privacy information such as user location and charging mode, which can be easily stolen or leaked, posing security risks and personal privacy concerns for users. Therefore, protecting the privacy of electric vehicle battery swap station users has become an important issue. This paper aims to study a privacy protection system for electric vehicle battery swap stations using blockchain technology. First, the basic principles and application scenarios of blockchain technology are introduced. Second, potential privacy leaks in electric vehicle battery swap stations are analysed, and a privacy protection scheme based on blockchain is proposed, including anonymous identity authentication, zero-knowledge proof, and encrypted communication. Third, a blockchain-based privacy protection system for electric vehicle battery swap stations is designed and implemented, and its performance is experimentally evaluated and compared with traditional privacy protection schemes in terms of security and efficiency. This paper demonstrates that the blockchain-based privacy protection scheme for electric vehicle battery swap stations possesses high levels of security and reliability, effectively safeguarding users' privacy information. Furthermore, this scheme exhibits promising application prospects and potential for widespread adoption. With the continuous development and utilization of blockchain technology, the privacy protection scheme for electric vehicle battery swap stations using blockchain is expected to provide users with more secure, reliable, and convenient charging services.
28

Hao, Li Ping, and Yi Hui Chen. "Research on the Cloud Computing Storage Privacy Preserving Based on MB-Tree Dynamic Access Model." Applied Mechanics and Materials 513-517 (February 2014): 2350–54. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2350.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cloud computing is the most anticipated revolution in the computer field. It has the ability to distribute the resource dynamically. According to the needs of the client service, with the lowest cost to solve the computer information processing, it creates hope for the computer technology innovation. But cloud computing has certain vulnerabilities for privacy in the network environment. Because the resource is allocated dynamically, privacy information is easy to be stolen. This paper improves MB-Tree model, gives the ability of protecting customer privacy information dynamically, and establishes the mathematical model and algorithm of dynamic MB-Tree. In order to verify the algorithm, finally we verify the algorithm of MB-Tree model, in which dynamic protection effect of privacy information with different time is up to 98%, protection effect of different data is up to 96%. The privacy information of cloud computing is got better protecting effect.
29

Yan, Liang, Lei Li, Xuejiao Mu, Hao Wang, Xian Chen, and Hyoseop Shin. "Differential Privacy Preservation for Location Semantics." Sensors 23, no. 4 (February 13, 2023): 2121. http://dx.doi.org/10.3390/s23042121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of intelligent mobile terminals and communication technologies, location-based services (LBSs) have become an essential part of users’ lives. LBS providers upload and share the collected users’ location data. The more commonly used methods for location privacy protection are differential privacy and its extensions. However, the semantic information about location, which is an integral part of the location data, often contains sensitive user information. Most existing research methods have failed to pay enough attention to protecting the semantic information in the location data. To remedy this problem, two different scenarios for location semantic privacy protection methods are proposed in this paper to address single-point and continuous location queries. Simulation experiments on real social location check-in datasets, and comparison of three different privacy protection mechanisms, show that our solution demonstrates good service quality and privacy protection considering location semantics.
30

Grandison, Tyrone, and Rafae Bhatti. "Regulatory Compliance and the Correlation to Privacy Protection in Healthcare." International Journal of Computational Models and Algorithms in Medicine 1, no. 2 (April 2010): 37–52. http://dx.doi.org/10.4018/jcmam.2010040103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Recent government-led efforts and industry-sponsored privacy initiatives in the healthcare sector have received heightened publicity. The current set of privacy legislation mandates that all parties involved in the delivery of care specify and publish privacy policies regarding the use and disclosure of personal health information. The authors’ study of actual healthcare privacy policies indicates that the vague representations in published privacy policies are not strongly correlated with adequate privacy protection for the patient. This phenomenon is not due to a lack of available technology to enforce privacy policies, but rather to the will of the healthcare entities to enforce strong privacy protections and their interpretation of minimum compliance obligations. Using available information systems and data mining techniques, this article describes an infrastructure for privacy protection based on the idea of policy refinement to allow the transition from the current state of perceived to be privacy-preserving systems to actually privacy-preserving systems.
31

Wang, Yijing, Jingyi Zhang, and Lupeng Zhang. "Analysis of Users Balance Between Private and Public -- One Case from the TikTok." Communications in Humanities Research 12, no. 1 (November 20, 2023): 146–60. http://dx.doi.org/10.54254/2753-7064/12/20230070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Information privacy is of paramount importance to everyone, but there are many Internet users privacy leaks. But inevitably, internet users need to provide some information of their own to satisfy a better web experience. Therefore, it is necessary to study the balance between personal information sharing and personal privacy. The studys goal is to develop a mathematical model that quantifies the trade-offs between individuals and society regarding the disclosure of private information. In the process of research, researchers use targeted questionnaires to obtain first-hand raw data, analyze users choices between sharing personal data and protecting personal privacy, and obtain users preferences for privacy protection measures. Through multi-dimensional statistical analysis of the questionnaire results, this paper reflects the current users awareness of personal privacy protection and the publics attitude towards the current phenomenon of privacy acquisition on social media. Furthermore, based on the original data of the questionnaire, it provides effective suggestions for researchers to modify the privacy protection policies of media platforms.
32

Wang, Pingshui, Jianwen Zhu, and Qinjuan Ma. "Private Data Protection in Social Networks Based on Blockchain." International Journal of Advanced Networking and Applications 14, no. 04 (2023): 5549–55. http://dx.doi.org/10.35444/ijana.2023.14407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of big data and social networks, user data in social networks are facing huge risks of privacy leakage. It is urgent to establish a complete and effective method for protecting private data in social networks. Based on the problem of information leakage in social networks, classifies user privacy data, and constructs different privacy data protection schemes through blockchain time stamp recording data storage, hash function anonymous operation of data, asymmetric encryption and digital signature of sending information. The blockchain-based privacy data protection method in social networks can effectively solve the privacy leakage problem in social networks, and provide a reference for the research in the field of information security and social network security. This paper designs a new blockchain-based privacy data protection scheme for different privacy disclosure categories, which provides a new solution to the current privacy disclosure problem in social networks. However, the existing methods will consume a lot of computational power in the process of information interaction. The subsequent research will optimize the computational power of blockchain and try to build a better blockchain social network privacy data protection system.
33

Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.p183-190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this digital age, privacy has become a crucial issue due to the vast amount of personal information we share online. As a fundamental aspect of computer ethics, it concerns the appropriate use of information and communication technologies. This paper will discuss five key points related to privacy in computer ethics: the concept of privacy and its significance in the context of computer ethics; ethical considerations surrounding personal information in the digital space, including issues of consent, transparency, and data protection; the legal framework surrounding privacy in different jurisdictions, such as data protection laws and international standards; the role of technology in protecting privacy, including the use of encryption and other security measures; and finally, the challenges associated with protecting privacy in the digital age, such as the risk of data breaches, identity theft, and other forms of online exploitation. Through these five key points, this paper aims to provide a comprehensive understanding of privacy in computer ethics and emphasize the importance of promoting responsible and ethical use of technology.
34

Zostant, Maxwell, and Robin Chataut. "Privacy in computer ethics: Navigating the digital age." Computer Science and Information Technologies 4, no. 2 (July 1, 2023): 183–90. http://dx.doi.org/10.11591/csit.v4i2.pp183-190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this digital age, privacy has become a crucial issue due to the vast amount of personal information we share online. As a fundamental aspect of computer ethics, it concerns the appropriate use of information and communication technologies. This paper will discuss five key points related to privacy in computer ethics: the concept of privacy and its significance in the context of computer ethics; ethical considerations surrounding personal information in the digital space, including issues of consent, transparency, and data protection; the legal framework surrounding privacy in different jurisdictions, such as data protection laws and international standards; the role of technology in protecting privacy, including the use of encryption and other security measures; and finally, the challenges associated with protecting privacy in the digital age, such as the risk of data breaches, identity theft, and other forms of online exploitation. Through these five key points, this paper aims to provide a comprehensive understanding of privacy in computer ethics and emphasize the importance of promoting responsible and ethical use of technology.
35

Ghorashi, Seyed Ramin, Tanveer Zia, Michael Bewong, and Yinhao Jiang. "An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing." Applied Sciences 13, no. 23 (November 27, 2023): 12727. http://dx.doi.org/10.3390/app132312727.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study examines the privacy protection challenges in data sharing between organisations and third-party entities, focusing on changing collaborations in the digital age. Utilising a mixed-method approach, we categorise data-sharing practices into three business models, each with unique privacy concerns. The research reviews legal regulations like the General Data Protection Regulation (GDPR), highlighting their emphasis on user privacy protection but noting a lack of specific technical guidance. In contrast, industrial privacy frameworks such as NIST and Five Safes are explored for their comprehensive procedural and technical guidance, bridging the gap between legal mandates and practical applications. A key component of this study is the analysis of the Facebook–Cambridge Analytica data breach, which illustrates the significant privacy violations and their wider implications. This case study demonstrates how the principles of the NIST and Five Safes frameworks can effectively mitigate privacy risks, enhancing transparency and accountability in data sharing. Our findings highlight the dynamic nature of data sharing and the vital role of both privacy regulations and industry-specific frameworks in protecting individual privacy rights. This study contributes insights into the development of robust privacy strategies, highlighting the necessity of integrating comprehensive privacy frameworks into organisational practices for improved decision making, operational efficiency, and privacy protection in collaborative data environments.
36

Altman, Micah, and Aloni Cohen. "Natural differential privacy—a perspective on protection guarantees." PeerJ Computer Science 9 (September 28, 2023): e1576. http://dx.doi.org/10.7717/peerj-cs.1576.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We introduce “Natural” differential privacy (NDP)—which utilizes features of existing hardware architecture to implement differentially private computations. We show that NDP both guarantees strong bounds on privacy loss and constitutes a practical exception to no-free-lunch theorems on privacy. We describe how NDP can be efficiently implemented and how it aligns with recognized privacy principles and frameworks. We discuss the importance of formal protection guarantees and the relationship between formal and substantive protections.
37

Li, Yijing, Ran Bi, Nan Jiang, Fengqiu Li, Mingsi Wang, and Xiangping Jing. "Methods and Challenges of Cryptography-Based Privacy-Protection Algorithms for Vehicular Networks." Electronics 13, no. 12 (June 17, 2024): 2372. http://dx.doi.org/10.3390/electronics13122372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of wireless communication technology, positioning technology, and modern smart devices, Internet of Vehicles (IoVs) smart vehicles have brought great convenience to human production and life. Meanwhile, privacy and security issues are becoming extremely serious, with serious consequences if sensitive data such as vehicle location and trip patterns are leaked. This paper focuses on the demands for vehicular network security, especially privacy protection and existing privacy-protection techniques, including common cryptography methods and cryptography-based advanced technologies. At the same time, this paper also analyzes the advantages and challenges of these technologies in protecting privacy and network security in the Internet of Vehicles, such as the challenges of computational resource requirements and security efficiency in the implementation process, as well as the complexity of realizing effective privacy protection in the interactions among different entities. Finally, this paper envisions the development of privacy-preserving application scenarios and the prospects for crypotography-based privacy-preserving technologies.
38

AllahRakha, Naeem. "Constitutional Safeguards for Digital Rights and Privacy." International Journal of Law and Policy 2, no. 4 (April 30, 2024): 31–43. http://dx.doi.org/10.59022/ijlp.172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The digital rights and privacy protections are emerging human rights concerns in the digital age. Uzbekistan's newly enacted constitution provides a general framework for civil liberties, but lacks specificity regarding digital contexts. This research examines the effectiveness of Uzbekistan's constitutional safeguards for digital rights and privacy, and identifies potential areas for improvement. The aim is to ensure robust protections aligned with international norms. A qualitative methodology analyzes constitutional provisions, legislation through doctrinal review and phenomenological approaches. Results reveal significant gaps in areas like data protection, consent requirements, and oversight of state surveillance compared to frameworks like the EU's GDPR. Recommendations include constitutional amendments explicitly guaranteeing digital rights, an independent data protection authority, enhanced enforcement mechanisms, and legal reforms codifying principles of data minimization and individual control over personal information. Implementing such measures is crucial for Uzbekistan to uphold digital rights, promote trust in the digital ecosystem, and contribute to preserving human dignity and autonomy in the digital era.
39

Bhandari, Vrinda, and Renuka Sane. "Protecting citizens from the state post Puttaswamy: Analysing the privacy implications of the Justice Shrikrishna Committee Report and the Data Protection Bill, 2018." Socio-Legal Review 14, no. 2 (January 2018): 143. http://dx.doi.org/10.55496/uuiz9934.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper we seek to conceptualise the right to privacy and its implications from the State and private actors, post the Puttaswamy judgment. We then examine the draft Personal Data Protection Bill, 2018 submitted by the Justice Srikrishna Committe and evaluate how it has fared in regulating the actions of the State relative to the private sector, with a broad focus on consent, surveillance, and the interaction between the State and private sector including the ability of the latter to deny data requests of the former. Finally, we emphasize the implementation challenges of a legislation given the weak state capacity in India, focusing on regulation making and enforcement, and highlight that both give substantial power to the State (as regulator) over its regulated entities. We argue that considering the privacy concerns against State action, the challenge to implementation in the area of personal data may only get exacerbated.
40

Chukwunonso Aloamaka, Patrick. "Effective Data Protection in Nigeria: Challenges." Commonwealth Law Review Journal 08 (2022): 656–62. http://dx.doi.org/10.55662/clrj.2022.811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The importance of protecting data and privacy cannot be overemphasized in this day of technological and digital breakthroughs. Nigeria, a developing nation, is prone to suffering from the shortcomings of conventional methods of data protection as well as from the cost of insufficient legislation to secure the data or the privacy of the data users. This has brought up a number of issues, including the applicability and responsiveness of current laws and how it tends to handle or manage violations. It is imperative to address these issues and challenges faced by data and privacy protection in Nigeria, given the complexity of the emerging data technology and the privacy challenges posed by the use and retention of data. The paper identified the lack of a comprehensive data protection legislation as well as their non-enforcement as the main barrier to effective data protection in the country. In order to solve some of the issues affecting effective data privacy in Nigeria, this paper proffers cogent and practical recommendations.
41

A. Razon, Arvin Kristopher. "Are Narco-Lists Covered by the Philippine Law on Privacy?: Exploring the Limits of the ‘Classic’ Right to Privacy and Applying a Constitutionally Grounded Data Protection Right." Global Privacy Law Review 2, Issue 1 (February 1, 2021): 44–58. http://dx.doi.org/10.54648/gplr2021006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article dissects the limits of the constitutionally recognized right to privacy and examines the constitutional underpinnings of the right to data protection, specifically applying the analysis in the context of narco-lists: ‘intelligence reports’, issued by Philippine President Rodrigo Duterte’s office, that contain names of public officials allegedly involved in the narcotics trade. Whether individuals named in the narco-lists would be successful in asserting the right to privacy against the release of the narco-lists is uncertain, because of their decreased expectation of privacy, their status as public figures, and the countervailing rights to be balanced. This article further conceptualizes the data protection right as a constitutional right: this right may be asserted by individuals named in the narco-lists; with this right, individuals should be able to either require the government to comply with its ex-ante protections or exercise their rights to reasonable access, to rectification, to erasure or blocking, and to damages. Privacy, Data Protection, Data Privacy, Narco-lists, Philippines Drug War
42

Yang, Xuechao, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, and Joe Ryan. "Protecting Private Information for Two Classes of Aggregated Database Queries." Informatics 9, no. 3 (September 5, 2022): 66. http://dx.doi.org/10.3390/informatics9030066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
An important direction of informatics is devoted to the protection of privacy of confidential information while providing answers to aggregated queries that can be used for analysis of data. Protecting privacy is especially important when aggregated queries are used to combine personal information stored in several databases that belong to different owners or come from different sources. Malicious attackers may be able to infer confidential information even from aggregated numerical values returned as answers to queries over large collections of data. Formal proofs of security guarantees are important, because they can be used for implementing practical systems protecting privacy and providing answers to aggregated queries. The investigation of formal conditions which guarantee protection of private information against inference attacks originates from a fundamental result obtained by Chin and Ozsoyoglu in 1982 for linear queries. The present paper solves similar problems for two new classes of aggregated nonlinear queries. We obtain complete descriptions of conditions, which guarantee the protection of privacy of confidential information against certain possible inference attacks, if a collection of queries of this type are answered. Rigorous formal security proofs are given which guarantee that the conditions obtained ensure the preservation of privacy of confidential data. In addition, we give necessary and sufficient conditions for the protection of confidential information from special inference attacks aimed at achieving a group compromise.
43

Krishnamurthy, Vivek. "A Tale of Two Privacy Laws: The GDPR and the International Right to Privacy." AJIL Unbound 114 (2020): 26–30. http://dx.doi.org/10.1017/aju.2019.79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The European Union's General Data Protection Regulation (GDPR) is widely viewed as setting a new global standard for the protection of data privacy that is worthy of emulation, even though the relationship between the GDPR and existing international legal protections for the right to privacy remain unexplored. Correspondingly, this essay examines the relationship between these two bodies of law, and finds that the GDPR's provisions are neither necessary nor sufficient to protect the right to privacy as enshrined in Article 17 of the International Covenant on Civil and Political Rights (ICCPR). It argues that there are other equally valid and effective approaches that states can pursue to protect the right to privacy in an increasingly digital world, including the much-maligned American approach of regulating data privacy on a sectoral basis.
44

Panvelwala, Fatema, and Archana G. "Data Protection Guidelines for Protecting Privacy of Users on Social Media." International Journal of Computer Applications 182, no. 2 (July 16, 2018): 7–12. http://dx.doi.org/10.5120/ijca2018917449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kohl, Uta. "THE RIGHT TO BE FORGOTTEN IN DATA PROTECTION LAW AND TWO WESTERN CULTURES OF PRIVACY." International and Comparative Law Quarterly 72, no. 3 (July 2023): 737–69. http://dx.doi.org/10.1017/s0020589323000258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractData protection law has emerged as an important bulwark against online privacy intrusions, and yet its status within privacy law remains awkward. Its starting point of protecting ‘personal’ rather than ‘private’ information puts it at odds with privacy more generally. Indeed, in its very design, data protection law caters for the protection of public personal information, or personal information which has attained a degree of publicness through disclosure. Building on James Whitman's comparative privacy study, this article argues that data protection law is not the odd bedfellow of privacy law properly so called but may be understood as a manifestation of the Continental European culture of privacy. Its distinctiveness does not lie in its apparent technicality but in its robust openness to privacy in public—an idea that is alien to the Anglo-American culture of privacy. Whilst these two cultures of privacy have long ‘met’ in different jurisdictions, this article locates their enduring influence and antagonism within three contemporary privacy regimes. By taking the right to be forgotten, as an archetypal privacy-in-public right, in the testing context of spent criminal convictions, the article gauges the comparative openness to such claims, first, of the Court of Justice of the European Union as the authoritative voice on General Data Protection Regulation normativity; secondly, of the US judiciary as committed to the First and Fourth Amendment; and, thirdly, of the European Court of Human Rights on Article 8 of the European Convention on Human Rights and its fused Anglo-American and Continental European privacy jurisprudence. It is the latter jurisprudence in particular that highlights the tensions arising from trying to marry the two privacy traditions, or merge data protection and ‘privacy’ law. Yet, these tensions also offer insights and opportunities.
46

Zhang, Xiangfei, Feng Yang, Yu Guo, Hang Yu, Zhengxia Wang, and Qingchen Zhang. "Adaptive Differential Privacy Mechanism Based on Entropy Theory for Preserving Deep Neural Networks." Mathematics 11, no. 2 (January 8, 2023): 330. http://dx.doi.org/10.3390/math11020330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Recently, deep neural networks (DNNs) have achieved exciting things in many fields. However, the DNN models have been proven to divulge privacy, so it is imperative to protect the private information of the models. Differential privacy is a promising method to provide privacy protection for DNNs. However, existing DNN models based on differential privacy protection usually inject the same level of noise into parameters, which may lead to a balance between model performance and privacy protection. In this paper, we propose an adaptive differential privacy scheme based on entropy theory for training DNNs, with the aim of giving consideration to the model performance and protecting the private information in the training data. The proposed scheme perturbs the gradients according to the information gain of neurons during training, that is, in the process of back propagation, less noise is added to neurons with larger information gain, and vice-versa. Rigorous experiments conducted on two real datasets demonstrate that the proposed scheme is highly effective and outperforms existing solutions.
47

Zhou, Leming, and Bambang Parmanto. "User Preferences for Privacy Protection Methods in Mobile Health Apps: A Mixed-Methods Study." International Journal of Telerehabilitation 12, no. 2 (December 8, 2020): 13–26. http://dx.doi.org/10.5195/ijt.2020.6319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background: Mobile health (mHealth) apps have the potential to facilitate convenient health care delivery and self-management of health. However, many users have concerns about their privacy when they use mHealth apps. Different apps provide different solutions for protecting users’ privacy. Objective: The purpose of this study was to determine user preferences among the several privacy protection methods used in current mHealth apps and the reasons behind their preferences. Methods: Five privacy protection methods currently used in mHealth apps were presented to a group of study participants who had mild or moderate depression and expressed concerns about privacy of information when they used mental health apps. After a demonstration of the methods, study participants were asked to fill out a questionnaire and indicate their perceived privacy protection level (PPPL) of each method, their preference rating for each method, and the privacy protection methods they had used in the past. A brief interview was then conducted to collect study participants’ comments on these methods and elicit the reasons for their preference ratings. Statistical analysis was performed to determine the statistical significance of differences in participants’ preference ratings and in the PPPLs obtained for the five methods. Study participants’ comments on the privacy protection methods and suggestions were noted and summarized. Results: Forty (40) study participants were selected from a large candidate pool using the IRB approved selection criteria. All study participants viewed the app demonstration and understood the five privacy protection methods properly, which was indicated by their correct sorting of the PPPL of the five methods in their answers to the questionnaire. All study participants specified their preferences with respect to these methods and provided the rationale behind their selections on the questionnaire and during the brief interview. The results indicate that the users preferred privacy protection methods with customizable modules in multi-purpose apps because of their convenience and strong privacy protection, where the customization can be done either in the app or via a Web portal. Conclusions: This study identified user preferred privacy protection methods. These identified privacy protection methods may be used in many types of apps that perform sensitive health information management to better protect users’ privacy and encourage more users to adopt these mHealth apps.
48

Sundaram, Ranjany, and Snehal Shetty. "Privacy concerns and protection behavior during the Covid-19 pandemic." Problems and Perspectives in Management 20, no. 2 (April 20, 2022): 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper aims to analyze the protection behavior of employees while working remotely during the Covid-19 pandemic using online video chat software. This pandemic changed the way organizations work, managers meet with employees, and employees communicate. An e-mail-based survey among computer users who use video chat software for remote working is employed in this study. Using 306 responses, structural equation modeling explores the relationship between privacy concerns, protection behavior, and antecedents. The technological changes induced due to Covid-19 influence privacy concerns and protection behavior. Privacy efficacy increases privacy concerns and protection behavior. Perceived vulnerability increases privacy concerns. Perceived effectiveness of organization software affects privacy concerns but does not affect protection behavior. There is a positive relationship between privacy concerns and protection behavior; however, this positive relation is negatively moderated by a propensity to trust. A finding of threat severity measure using Covid-19 factors concludes that both privacy concerns and protection behavior increased for online video chat software users. The theoretical model explicates 75% of variances in privacy concerns and 57% of variances in protection behavior. Every one-unit increase in Covid-19 induced changes regarding the work environment increases the privacy concern by 35%, and every one-unit increase in perceived effectiveness of organization software increases privacy concern by 22%. Every one-unit increase in the privacy concern increases the protection behavior by 48%, and every one-unit increase in privacy efficacy increases protection behavior by 59%. AcknowledgmentThe assistance provided by Arun Thottath in reaching out to survey participants was greatly appreciated.
49

Kravchuk, V. "Foreign experience of personal data protection in social networks." Uzhhorod National University Herald. Series: Law 2, no. 78 (August 31, 2023): 49–53. http://dx.doi.org/10.24144/2307-3322.2023.78.2.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article analyzes the protection of personal data based on foreign experience. Social networking has been identified as one of the most prominent cultural phenomena to emerge in the Web 2.0 era. They keep users connected and facilitate the exchange of information between them. The European Union has adopted a new personal data protection system called the General Data Protection Regulation (GDPR). Its main goals include providing individuals with tools to control their personal data, implementing modern standards for the protection of personal information, developing the digital space of the European Union to safeguard personal data, ensuring strict compliance by all parties, and providing legal support for the international transfer of personal information. United States legislative documents related to aspects of data protection and privacy were analyzed, namely: California Consumer Privacy Act (CCPA); Children’s Online Privacy Protection Act (COPPA); Health Insurance Portability and Accountability Act (HIPAA); State data breach notification laws. It is noted that China has a comprehensive legal framework that regulates the protection of personal data, and includes the following legal acts: Personal Information Protection Law (PIPL) and Data Security Law (DSL). Conclusions were made that the urgency and importance of protecting personal data in social networks is due to rapid technological progress, the growth of cyber security threats and the spread of these platforms. By protecting personal data, people can maintain privacy, prevent abuse, maintain user trust, reduce risk, and comply with legal obligations. The issue of ensuring mobility and interoperability in social networks gives particular importance to the protection of personal data, as it relates to this particular data, and not just to technology, as it may be in the telecommunications sector. This requires additional thought and measures to ensure privacy and data security. Therefore, when developing legal protection mechanisms for online social networks, it is necessary to take into account and solve problems related to the protection of personal data.
50

Wang, Yanbing. "Privacy Protection of Public Figures in China—The Case of Yundi Li’s Prostitution." Studies in Law and Justice 2, no. 2 (June 2023): 109–17. http://dx.doi.org/10.56397/slj.2023.06.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Since the birth of the right to privacy, more and more attention has been paid to the protection of the right to privacy. In China, since the introduction of privacy rights from the West, the protection of privacy rights has been focused on civil law, while the protection of privacy rights in legislation and judicial practice in other branches of law has only been superficial but not in-depth. The effect of civil law on the protection of privacy rights is undeniable, especially after the introduction of the Civil Code, which provides more thorough and complete regulations on privacy rights in the field of civil law. However, with the development of society, relying on civil law alone to protect the right to privacy has become a challenge. The protection of the right to privacy of public figures is even more lacking. For example, the case of Li Yundi’s prostitution, which was publicly reported by the Beijing Chaoyang Public Security Bureau on 21 October 2021, reveals the loopholes in the protection of privacy and the privacy of public figures in China. Firstly, civil law in China has been effective in protecting the right to privacy, but in this case, the right of public security to disclose Li Yundi’s private life involves the infringement of citizens’ privacy by public power. Secondly, in China, public figures are often involved in the public interest, and it is the consensus of the academia and society as a whole that anyone in conflict with the public interest should give way to the public interest. However, in judicial practice, the author believes that it is unfair to treat public figures and ordinary citizens differently in terms of privacy rights when the public interest is not seriously endangered. Therefore, this article aims to analyse the current status and shortcomings of the legislation and judicial practice on the protection of the privacy of public figures in China on the basis of the right to privacy and the privacy of public figures, and to draw on the advanced experience of other countries in order to establish and improve the privacy protection mechanism of public figures in China.

To the bibliography