Добірка наукової літератури з теми "Privacy evaluation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Privacy evaluation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Privacy evaluation"
Sohail, Syeda Amna, Faiza Allah Bukhsh, and Maurice van Keulen. "Multilevel Privacy Assurance Evaluation of Healthcare Metadata." Applied Sciences 11, no. 22 (November 12, 2021): 10686. http://dx.doi.org/10.3390/app112210686.
Повний текст джерелаvan Aaken, Dominik, and Andreas Ostermaier. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Academy of Management Proceedings 2013, no. 1 (January 2013): 15830. http://dx.doi.org/10.5465/ambpp.2013.131.
Повний текст джерелаvan Aaken, Dominik, Andreas Ostermaier, and Arnold Picot. "Privacy and Freedom: An Economic (Re-)Evaluation of Privacy." Kyklos 67, no. 2 (April 10, 2014): 133–55. http://dx.doi.org/10.1111/kykl.12047.
Повний текст джерелаPetrakos, Nikolaos, Stefanos Monachos, Emmanouil Magkos, and Panayiotis Kotzanikolaou. "Design and Implementation of an Anonymous and Secure Online Evaluation Protocol." Electronics 9, no. 9 (September 1, 2020): 1415. http://dx.doi.org/10.3390/electronics9091415.
Повний текст джерелаMamakou, Xenia J., Dimitris K. Kardaras, and Eleutherios A. Papathanassiou. "Evaluation of websites’ compliance to legal and ethical guidelines: A fuzzy logic–based methodology." Journal of Information Science 44, no. 4 (March 1, 2017): 425–42. http://dx.doi.org/10.1177/0165551517697610.
Повний текст джерелаCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Повний текст джерелаAsad, Muhammad, Ahmed Moustafa, and Chao Yu. "A Critical Evaluation of Privacy and Security Threats in Federated Learning." Sensors 20, no. 24 (December 15, 2020): 7182. http://dx.doi.org/10.3390/s20247182.
Повний текст джерелаBabaghayou, Messaoud, Nabila Labraoui, and Ado Adamou Abba Ari. "Location-Privacy Evaluation Within the Extreme Points Privacy (EPP) Scheme for VANET Users." International Journal of Strategic Information Technology and Applications 10, no. 2 (April 2019): 44–58. http://dx.doi.org/10.4018/ijsita.2019040103.
Повний текст джерелаAKIYAMA, Ken, Tomofumi HIRAYAMA, Yoshiki NAKAMURA, and Masao INUI. "PRIVACY AND COMMUNICATION IN OFFICE ENVIRONMENT EVALUATION." Journal of Architecture and Planning (Transactions of AIJ) 61, no. 484 (1996): 97–104. http://dx.doi.org/10.3130/aija.61.97_3.
Повний текст джерелаYan, Zheng, Wenxiu Ding, Valtteri Niemi, and Athanasios V. Vasilakos. "Two Schemes of Privacy-Preserving Trust Evaluation." Future Generation Computer Systems 62 (September 2016): 175–89. http://dx.doi.org/10.1016/j.future.2015.11.006.
Повний текст джерелаДисертації з теми "Privacy evaluation"
Jensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.
Повний текст джерелаLundgren, Tony, and Wenjia Xu. "Evaluation of Privacy-Preserving Methods for Smart Grids." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200607.
Повний текст джерелаMood, Benjamin, and Benjamin Mood. "Optimizing Secure Function Evaluation on Mobile Devices." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12505.
Повний текст джерелаO'REILLY, JOSEPH MATTHEW. "LEGAL PRIVACY AND PSYCHOLOGICAL PRIVACY: AN EVALUATION OF COURT ORDERED DESIGN STANDARDS (ENVIRONMENTAL, PSYCHIATRIC HOSPITALS, ARCHITECTURE)." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187916.
Повний текст джерелаCvach, Marek, Menal Sanna Kahsay, and Micaela Shamoun. "Privacy online: Exploring consumers’ evaluation of privacy issues in relation to personalised advertisement when buying online." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-40054.
Повний текст джерелаMajeed, Salman. "Evaluation of Collaborative Reputation System against Privacy-Invasive Software." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4338.
Повний текст джерелаRohunen, A. (Anna). "Advancing information privacy concerns evaluation in personal data intensive services." Doctoral thesis, Oulun yliopisto, 2019. http://urn.fi/urn:isbn:9789526224688.
Повний текст джерелаTiivistelmä Kun henkilötietoja kerätään ja hyödynnetään dataintensiivisten palveluiden tuottamiseen, palveluiden käyttäjien tietosuoja saattaa heikentyä. Käyttäjien tietosuojahuolet voivat hidastaa uusien palveluiden ja teknologioiden käyttöönottoa sekä vaikuttaa kerättävän tiedon laatuun ja kattavuuteen. Tämä hankaloittaa palveluiden täysimittaista hyödyntämistä. Tietosuojahuolten arviointi mahdollistaa niiden huomioimisen henkilötietoperusteisten palveluiden suunnittelussa ja kehittämisessä. Tässä tutkimuksessa selvitettiin, kuinka tietosuojahuolten arviointia tulisi kehittää muuttuvissa tiedonkeruuympäristöissä. Kaksivaiheisessa tutkimuksessa toteutettiin aluksi empiirinen monimenetelmällinen tutkimus ja tämän jälkeen systemaattinen kirjallisuustutkimus. Ensimmäisessä vaiheessa tehtiin kaksi empiiristä tutkimusta monimenetelmällisen tutkimuksen tutkivan peräkkäisen asetelman mukaisesti. Näissä tutkimuksissa selvitettiin ensin laadullisin menetelmin tietosuojakäyttäytymistä ja tietosuojahuolia liikkumisen dataa kerättäessä. Laadullisten tulosten pohjalta kehitettiin kvantitatiiviset instrumentit tulosten yleistettävyyden tutkimiseksi. Tutkimuksen toisessa vaiheessa toteutettiin kaksi katsaustyyppistä tutkimusta, jotta saataisiin kattava käsitys tietosuojakäyttäytymisestä sekä mahdollisuuksista kehittää tietosuojahuolten arviointia uusissa tiedonkeruuympäristöissä. Nämä tutkimukset olivat systemaattinen kirjallisuuskatsaus tietosuojakäyttäytymisen malleista sekä katsaus EU:n tietosuojalainsäädännön muutoksista. Tutkimuksen tulokset osoittavat, että kehittyvissä tiedonkeruuympäristöissä tietosuojakäyttäytyminen ja tietosuojahuolet poikkeavat aikaisemmista ympäristöistä. Näissä ympäristöissä esiintyy niille ominaisia tietosuojahuolia ja huolten monitahoisuus korostuu. Koska tietosuojahuolet ovat kytköksissä muihin tietosuojakäyttäytymistä ennustaviin muuttujiin, arviointeihin voi olla aiheellista sisällyttää myös näitä muuttujia. Olemassa olevia tietosuojahuolten arviointi-instrumentteja on perusteltua käyttää arvioinnin lähtökohtana myös kehittyvissä tiedonkeruuympäristöissä, mutta niitä on mukautettava uusiin ympäristöihin soveltuviksi. Arvioinnin kehittäminen voi olla haasteellista, sillä aikaisempi tietosuojatutkimus on epäyhtenäistä. Jotta sitä voidaan soveltaa asianmukaisesti arviointien kehittämisessä, tutkimusta on vietävä kokonaisvaltaisempaan suuntaan
Abril, Castellano Daniel. "Privacy protection methods for documents and risk evaluation for microdata." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/285353.
Повний текст джерелаThe capability to collect and store digital information by statistical agencies, governments or individuals has created huge opportunities to analyze and build knowledge-based models. With the rise of Internet many services and companies have exploited these opportunities collecting huge amounts of data, which most of the cases are considered confidential. This causes the need to develop methods that allow the dissemination of confidential data for data mining purposes while preserving individuals' private information. Thus, personal data could be collected, transferred or sold to third parties ensuring the individuals' confidentiality, but still being statistically useful. Internet is full of unstructured textual data like posts or documents with a large content of information that can be extracted and analyzed. Documents are especially difficult to protect due to their lack of structure. In this thesis we distinguish two different models to protect documents. On the one hand, we consider the protection of a collection of documents, so this set of documents can be analyzed by means of text mining and machine learning techniques. On the other hand, we consider the protection of single documents by means of the documents' sanitization. This is the process of detecting and removing the parts of the text considered sensitive. When dealing with governmental classified information, sanitization attempts to reduce the sensitiveness of the document, possibly yielding a non-classified document. In this way, governments show they uphold the freedom of information while the national security is not jeopardised. This thesis presents a set of different methods and experiments for the protection of unstructured textual data protection and besides, it introduces an advanced method to evaluate the security of microdata protection methods. The main contributions are: * The development of a new semi-automatic method to assist documents' declassification. * The definition of two specific metrics for evaluating the information loss and disclosure risk of sanitized documents. * The development of two cluster-based approaches based on the k-anonymity principle to anonymize vector space models. One exploits the sparsity and the other exploits the possible semantic relations of those vectors. * The study of advanced methods to evaluate the disclosure risk of microdata protection methods. In particular, we have developed a general supervised metric learning approach for distance-based record linkage. Moreover, we have reviewed the suitability of a set of parameterized distance functions that can be used together with the supervised approach.
Paananen, K. (Kimmo). "Evaluation of privacy, security and quality of Internet-based communication solutions." Master's thesis, University of Oulu, 2016. http://urn.fi/URN:NBN:fi:oulu-201605221866.
Повний текст джерелаEschricht, Johannes. "mHealth and the need of evaluation processes." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16442.
Повний текст джерелаКниги з теми "Privacy evaluation"
Peter, Fletcher, ed. Practical Web traffic analysis: Standards, privacy, techniques, results. Birmingham: Glasshaus, 2002.
Знайти повний текст джерелаComplete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.
Знайти повний текст джерелаPearson, Siani. Privacy and Security for Cloud Computing. London: Springer London, 2013.
Знайти повний текст джерелаCatalfamo, Holly A. Openness and privacy in Ontario: an evaluation of the implementation of FIPPA: (The Freedom of Information and Protection of Privacy Act, 1987, Chapter 25 and Ontario Regulation 532/87). St. Catharines, [Ont.]: Dept. of Politics, Brock University, 1993.
Знайти повний текст джерелаUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Знайти повний текст джерелаUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Знайти повний текст джерелаUnited States. General Accounting Office. Accounting and Information Management Division. Internet privacy: Comparison of federal agency practices with FTC's fair information principles. Washington, DC: The Office, 2000.
Знайти повний текст джерелаInstitute of Medicine (U.S.). Committee on the Role of Institutional Review Boards in Health Services Research Data Privacy Protection. Protecting data privacy in health services research. Washington, D.C: National Academy Press, 2000.
Знайти повний текст джерелаNo more rights without remedies: An impact evaluation of the National Crime Victim Law Institute's victims' rights clinics. Santa Monica, CA: RAND, 2012.
Знайти повний текст джерелаComplete guide to security and privacy metrics: Measuring regulatory compliance, operational resilience, and ROI. Boca Raton, FL: Auerbach Publications, 2006.
Знайти повний текст джерелаЧастини книг з теми "Privacy evaluation"
Ardagna, Claudio Agostino, Sabrina De Capitani di Vimercati, Eros Pedrini, and Pierangela Samarati. "Privacy-Aware Access Control System: Evaluation and Decision." In Digital Privacy, 377–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19050-6_14.
Повний текст джерелаPang, Bo, Long Chen, Xiong Fan, and Qiang Tang. "Multi-input Laconic Function Evaluation." In Information Security and Privacy, 369–88. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-55304-3_19.
Повний текст джерелаDe Marsico, Maria. "Biometric Systems Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–6. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1605-1.
Повний текст джерелаCastro, Jordi. "A Computational Evaluation of Optimization Solvers for CTA." In Privacy in Statistical Databases, 11–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33627-0_2.
Повний текст джерелаHu, Jingchen, Jerome P. Reiter, and Quanli Wang. "Disclosure Risk Evaluation for Fully Synthetic Categorical Data." In Privacy in Statistical Databases, 185–99. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11257-2_15.
Повний текст джерелаKitazawa, Shigeki, Masakazu Soshi, and Atsuko Miyaji. "Evaluation of Anonymity of Practical Anonymous Communication Networks." In Information Security and Privacy, 13–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45067-x_2.
Повний текст джерелаFörster, David. "Evaluation of Pseudonym Strategies." In Verifiable Privacy Protection for Vehicular Communication Systems, 27–54. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-18550-3_3.
Повний текст джерелаDe Marsico, Maria. "Biometric Spoofing and Its Evaluation." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1657-1.
Повний текст джерелаManzanares-Salor, Benet, David Sánchez, and Pierre Lison. "Automatic Evaluation of Disclosure Risks of Text Anonymization Methods." In Privacy in Statistical Databases, 157–71. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13945-1_12.
Повний текст джерелаLivraga, Giovanni. "Privacy in Microdata Release: Challenges, Techniques, and Approaches." In Data-Driven Policy Impact Evaluation, 67–83. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78461-8_5.
Повний текст джерелаТези доповідей конференцій з теми "Privacy evaluation"
Kunihiro, Noboru, Wen-Jie Lu, Takashi Nishide, and Jun Sakuma. "Outsourced Private Function Evaluation with Privacy Policy Enforcement." In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018. http://dx.doi.org/10.1109/trustcom/bigdatase.2018.00068.
Повний текст джерелаZhou, Liang, Xin Wei, Jingwu Cui, and Baoyu Zheng. "Privacy-Aware QoE Evaluation." In 2017 IEEE 85th Vehicular Technology Conference (VTC Spring). IEEE, 2017. http://dx.doi.org/10.1109/vtcspring.2017.8108550.
Повний текст джерелаLazzeretti, Riccardo, Jorge Guajardo, and Mauro Barni. "Privacy preserving ECG quality evaluation." In the. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2361407.2361435.
Повний текст джерелаBoyd, Kendrick, Eric Lantz, and David Page. "Differential Privacy for Classifier Evaluation." In CCS'15: The 22nd ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2808769.2808775.
Повний текст джерелаKorshunov, Pavel, and Touradj Ebrahimi. "PEViD: privacy evaluation video dataset." In SPIE Optical Engineering + Applications, edited by Andrew G. Tescher. SPIE, 2013. http://dx.doi.org/10.1117/12.2030974.
Повний текст джерелаMello, Victor, Tania Basso, and Regina Moraes. "A Test Process Model to Evaluate Performance Impact of Privacy Protection Solutions." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2014. http://dx.doi.org/10.5753/wtf.2014.22946.
Повний текст джерелаFarnan, Nicholas L., Adam J. Lee, and Ting Yu. "Investigating privacy-aware distributed query evaluation." In the 9th annual ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866919.1866926.
Повний текст джерелаHuang, Hsiao-Ying, and Masooda Bashir. "Privacy by region: Evaluation online users' privacy perceptions by geographical region." In 2016 Future Technologies Conference (FTC). IEEE, 2016. http://dx.doi.org/10.1109/ftc.2016.7821721.
Повний текст джерелаLicorish, Sherlock A., Stephen G. MacDonell, and Tony Clear. "Analyzing confidentiality and privacy concerns." In EASE '15: 19th International Conference on Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2745802.2745819.
Повний текст джерелаSun, Ruoxi, and Minhui Xue. "Quality Assessment of Online Automated Privacy Policy Generators." In EASE '20: Evaluation and Assessment in Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3383219.3383247.
Повний текст джерелаЗвіти організацій з теми "Privacy evaluation"
Vonk, Jaynie. Going Digital: Privacy and data security under GDPR for quantitative impact evaluation. Oxfam, October 2019. http://dx.doi.org/10.21201/2019.5211.
Повний текст джерелаRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, October 2021. http://dx.doi.org/10.21248/gups.63413.
Повний текст джерелаAgarwal, Smisha, Madhu Jalan, Holly C. Wilcox, Ritu Sharma, Rachel Hill, Emily Pantalone, Johannes Thrul, Jacob C. Rainey, and Karen A. Robinson. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), May 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Повний текст джерелаMichelitsch, Roland, Roni Szwedzki, José Ignacio Sembler, Ulrike Haarsager, José Carbajo, Juan Felipe Murcia, Raphael Seiwald, et al. Evaluation of Public-Private Partnerships in Infrastructure. Inter-American Development Bank, March 2017. http://dx.doi.org/10.18235/0000641.
Повний текст джерелаStrachan, Anna Louise. Potential Private Sector Involvement in Supporting Refugee Livelihoods and Self-reliance in Uganda: Annotated Bibliography. Institute of Development Studies (IDS), March 2021. http://dx.doi.org/10.19088/k4d.2021.072.
Повний текст джерелаPires, Jose Claudio Linhares, Gunnar Gotz, Regina Legarreta, Diego Del Pilar, Stefania De Santis, Melanie Putic, Ruben Lamdany, Kai Preugschat, and Nadia Ramírez. Corporate Evaluation: Evaluation of Guarantee Instruments at the IDB Group. Inter-American Development Bank, February 2022. http://dx.doi.org/10.18235/0004191.
Повний текст джерелаBrophy, Daniel. Evaluative styles of clinicians in private practice. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.5340.
Повний текст джерелаSzwedzki, Roni, Roland Michelitsch, Ulrike Haarsager, José Ignacio Sembler, María Cabrera, Rocío Funes Aguilera, Juan Felipe Murcia, et al. Approach Paper: Evaluation of Public-Private (PPPs) Partnerships in Infrastructure. Inter-American Development Bank, August 2016. http://dx.doi.org/10.18235/0000579.
Повний текст джерелаSembler, Jose Ignacio, Regina Legarreta, Ernesto Cuestas, Roni Szwedzki, Sumiko Andrade Sakaguchi, Damian Galinsky, Fernando Barbosa, et al. Approach Paper: Evaluation of IDB Invest. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004463.
Повний текст джерелаLinares, Ana Maria, Roland Michelitsch, Ulrike Haarsager, Jose Claudio Pires, Alejandro Soriano, Roni Szwedzki, Stephany Maqueda Gassos, et al. Approach Paper: Evaluation of the Implementation of the Private Sector Merge-out. Inter-American Development Bank, June 2017. http://dx.doi.org/10.18235/0000720.
Повний текст джерела