WorldWideScience

Sample records for naming contest privacy

  1. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy

    Science.gov (United States)

    Koopman, Colin; Doty, Nick

    2016-01-01

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy’s essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy’s multiple uses across multiple contexts. This article is part of the themed issue ‘The ethical impact of data science’. PMID:28336797

  2. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2017-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  3. Issues and challenges of information fusion in contested environments: panel results

    Science.gov (United States)

    Blasch, Erik; Kadar, Ivan; Chong, Chee; Jones, Eric K.; Tierno, Jorge E.; Fenstermacher, Laurie; Gorman, John D.; Levchuk, Georgiy

    2015-05-01

    With the plethora of information, there are many aspects to contested environments such as the protection of information, network privacy, and restricted observational and entry access. In this paper, we review and contrast the perspectives of challenges and opportunities for future developments in contested environments. The ability to operate in a contested environment would aid societal operations for highly congested areas with limited bandwidth such as transportation, the lack of communication and observations after a natural disaster, or planning for situations in which freedom of movement is restricted. Different perspectives were presented, but common themes included (1) Domain: targets and sensors, (2) network: communications, control, and social networks, and (3) user: human interaction and analytics. The paper serves as a summary and organization of the panel discussion as towards future concerns for research needs in contested environments.

  4. Contest ``LET your School GO Into - Space Baptism 2007

    Science.gov (United States)

    Sánchez, G.

    2009-05-01

    The contest ``Space Baptism 2007'' was organized with the cooperation of the Mirador de la Ciencia, a science museum associated with the local zoo in Barquisimeto, Venezuela, and in collaboration with the Asociación Larense de Astronomía, a local astronomy amateur group. This contest was aimed at students of primary schools and had as a final award the chance to give a proper name to an asteroid. The ultimate goal of the contest was to promote basic and space sciences to children and the young through activities that involved the creation of stories related to astronomy, enforcing creativity and originality, and encouraging group work and solidarity. As a result, the asteroid (12758) 1993 SM3 will be known from now on as (12758) Kabudarí. The success of this initiative is demonstrated by stories about the contest that appeared in several publications in local newspapers and magazines about the school and the students who won the contest. We are currently developing plans for repetitions of the contest to name two more asteroids.

  5. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  6. The 2016 interferometric imaging beauty contest

    Science.gov (United States)

    Sanchez-Bermudez, J.; Thiébaut, E.; Hofmann, K.-H.; Heininger, M.; Schertl, D.; Weigelt, G.; Millour, F.; Schutz, A.; Ferrari, A.; Vannier, M.; Mary, D.; Young, J.

    2016-08-01

    Image reconstruction in optical interferometry has gained considerable importance for astrophysical studies during the last decade. This has been mainly due to improvements in the imaging capabilities of existing interferometers and the expectation of new facilities in the coming years. However, despite the advances made so far, image synthesis in optical interferometry is still an open field of research. Since 2004, the community has organized a biennial contest to formally test the different methods and algorithms for image reconstruction. In 2016, we celebrated the 7th edition of the "Interferometric Imaging Beauty Contest". This initiative represented an open call to participate in the reconstruction of a selected set of simulated targets with a wavelength-dependent morphology as they could be observed by the 2nd generation of VLTI instruments. This contest represents a unique opportunity to benchmark, in a systematic way, the current advances and limitations in the field, as well as to discuss possible future approaches. In this contribution, we summarize: (a) the rules of the 2016 contest; (b) the different data sets used and the selection procedure; (c) the methods and results obtained by each one of the participants; and (d) the metric used to select the best reconstructed images. Finally, we named Karl-Heinz Hofmann and the group of the Max-Planck-Institut fur Radioastronomie as winners of this edition of the contest.

  7. Contest experience and body size affect different types of contest decisions.

    Science.gov (United States)

    Chen, Yu-Ju; Hsu, Yuying

    2016-11-01

    This study examined the relative importance of contest experience and size differences to behavioral decisions over the course of contests. Using a mangrove rivulus fish, Kryptolebias marmoratus, we showed that although contest experience and size differences jointly determined contest outcomes, they affected contestants' interactions at different stages of contests. Contest experience affected behavioral decisions at earlier stages of contests, including the tendency and latency to launch attacks, the tendency to escalate contests into mutual attacks and the outcome of non-escalated contests. Once contests were escalated into mutual attacks, the degree of size difference affected the fish's persistence in escalation and chance of winning, but contest experience did not. These results support the hypothesis that contest experience modifies individuals' estimation of their fighting ability rather than their actual strength. Furthermore, (1) in contests between two naïve contestants, more than 60 % of fish that were 2-3 mm smaller than their opponent escalated the contest to physical fights, even though their larger opponents eventually won 92 % of escalated fights and (2) fish with a losing experience were very likely to retreat in the face of an opponent 2-3 mm smaller than them without escalating. The result that a 2-3 mm size advantage could not offset the influence of a losing experience on the tendency to escalate suggests that, as well as depending on body size, the fish's physical strength is influenced by other factors which require further investigation.

  8. Tales from the dark side: Privacy dark strategies and privacy dark patterns

    DEFF Research Database (Denmark)

    Bösch, Christoph; Erb, Benjamin; Kargl, Frank

    2016-01-01

    Privacy strategies and privacy patterns are fundamental concepts of the privacy-by-design engineering approach. While they support a privacy-aware development process for IT systems, the concepts used by malicious, privacy-threatening parties are generally less understood and known. We argue...... that understanding the “dark side”, namely how personal data is abused, is of equal importance. In this paper, we introduce the concept of privacy dark strategies and privacy dark patterns and present a framework that collects, documents, and analyzes such malicious concepts. In addition, we investigate from...... a psychological perspective why privacy dark strategies are effective. The resulting framework allows for a better understanding of these dark concepts, fosters awareness, and supports the development of countermeasures. We aim to contribute to an easier detection and successive removal of such approaches from...

  9. The 2014 interferometric imaging beauty contest

    Science.gov (United States)

    Monnier, John D.; Berger, Jean-Philippe; Le Bouquin, Jean-Baptiste; Tuthill, Peter G.; Wittkowski, Markus; Grellmann, Rebekka; Müller, André; Renganswany, Sridhar; Hummel, Christian; Hofmann, Karl-Heinz; Schertl, Dieter; Weigelt, Gerd; Young, John; Buscher, David; Sanchez-Bermudez, Joel; Alberdi, Antxon; Schoedel, Rainer; Köhler, Rainer; Soulez, Ferréol; Thiébaut, Éric; Kluska, Jacques; Malbet, Fabien; Duvert, Gilles; Kraus, Stefan; Kloppenborg, Brian K.; Baron, Fabien; de Wit, Willem-Jan; Rivinius, Thomas; Merand, Antoine

    2014-07-01

    Here we present the results of the 6th biennial optical interferometry imaging beauty contest. Taking advantage of a unique opportunity, the red supergiant VY CMa and the Mira variable R Car were observed in the astronomical H-band with three 4-telescope configurations of the VLTI-AT array using the PIONIER instrument. The community was invited to participate in the subsequent image reconstruction and interpretation phases of the project. Ten groups submitted entries to the beauty contest, and we found reasonable consistency between images obtained from independent workers using quite different algorithms. We also found that significant differences existed between the submitted images, much greater than in past beauty contests that were all based on simulated data. A novel crowd-sourcing" method allowed consensus median images to be constructed, filtering likely artifacts and retaining real features." We definitively detect strong spots on the surfaces of both stars as well as distinct circumstellar shells of emission (likely water/CO) around R Car. In a close contest, Joel Sanchez (IAA-CSIC/Spain) was named the winner of the 2014 interferometric imaging beauty contest. This process has shown that new comers" can use publicly-available imaging software to interpret VLTI/PIONIER imaging data, as long as sufficient observations are taken to have complete uv coverage { a luxury that is often missing. We urge proposers to request adequate observing nights to collect sufficient data for imaging and for time allocation committees to recognise the importance of uv coverage for reliable interpretation of interferometric data. We believe that the result of the proposed broad international project will contribute to inspiring trust in the image reconstruction processes in optical interferometry.

  10. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  11. Centralized vs decentralized contests

    OpenAIRE

    Beviá, Carmen; Corchón, Luis C.

    2015-01-01

    We compare two contests, decentralized in which there are several independent contests with non overlapping contestants and centralized in which all contestants fight for a unique prize which is the sum of all prizes in the small contests. We study the relationship between payoffs and efforts between these two contests. The first author acknowledges financial support from ECO2008-04756 (Grupo Consolidado-C), SGR2014-515 and PROMETEO/2013/037. The second author acknowledges financial suppor...

  12. The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model

    OpenAIRE

    Noora Sami Al-Saqer; Mohamed E. Seliaman

    2016-01-01

    This research paper investigates Saudi users’ awareness levels about privacy policies in Social Networking Sites (SNSs), their privacy concerns and their privacy protection measures. For this purpose, a research model that consists of five main constructs namely information privacy concern, awareness level of privacy policies of social networking sites, perceived vulnerability to privacy risks, perceived response efficacy, and privacy protecting behavior was developed. An online survey questi...

  13. Navy Ship Names: Background for Congress

    Science.gov (United States)

    2016-09-14

    Secretary considers these nominations , along with others he receives as well as his own thoughts in this matter. At appropriate times, he selects names...Research Service 16 “ nomination ” process is often fiercely contested as differing groups make the case that “their” ship name is the most fitting...and practices of the Navy for naming vessels of the Navy, and an explanation for such variances;  Assesses the feasibility and advisability of

  14. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  15. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques.

    Science.gov (United States)

    Bergquist, Magnus; Nilsson, Andreas; Hansla, André

    2017-01-01

    Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants ( n = 347) were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1) and higher personal norms for non-targeted pro-environmental behaviors (Study 2). These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal.

  16. Contests versus Norms: Implications of Contest-Based and Norm-Based Intervention Techniques

    Directory of Open Access Journals (Sweden)

    Magnus Bergquist

    2017-11-01

    Full Text Available Interventions using either contests or norms can promote environmental behavioral change. Yet research on the implications of contest-based and norm-based interventions is lacking. Based on Goal-framing theory, we suggest that a contest-based intervention frames a gain goal promoting intensive but instrumental behavioral engagement. In contrast, the norm-based intervention was expected to frame a normative goal activating normative obligations for targeted and non-targeted behavior and motivation to engage in pro-environmental behaviors in the future. In two studies participants (n = 347 were randomly assigned to either a contest- or a norm-based intervention technique. Participants in the contest showed more intensive engagement in both studies. Participants in the norm-based intervention tended to report higher intentions for future energy conservation (Study 1 and higher personal norms for non-targeted pro-environmental behaviors (Study 2. These findings suggest that contest-based intervention technique frames a gain goal, while norm-based intervention frames a normative goal.

  17. Preliminary Analysis of Google+'s Privacy

    OpenAIRE

    Mahmood, Shah; Desmedt, Yvo

    2011-01-01

    In this paper we provide a preliminary analysis of Google+ privacy. We identified that Google+ shares photo metadata with users who can access the photograph and discuss its potential impact on privacy. We also identified that Google+ encourages the provision of other names including maiden name, which may help criminals performing identity theft. We show that Facebook lists are a superset of Google+ circles, both functionally and logically, even though Google+ provides a better user interfac...

  18. Contested Categories

    DEFF Research Database (Denmark)

    Drawing on social science perspectives, Contested Categories presents a series of empirical studies that engage with the often shifting and day-to-day realities of life sciences categories. In doing so, it shows how such categories remain contested and dynamic, and that the boundaries they create...

  19. Contested Rivers

    DEFF Research Database (Denmark)

    Gorm Hansen, Louise Lyngfeldt

    In recent years, hydropower and the sustainability of large hydropower projects has become a contested field. While for example hydropower companies maintain that hydropower is a renewable and sustainable source of electricity, a number of NGOs sharply question this assumption. The paper explores...... policy making, decision drivers and framing of large hydropower projects in China. Hydropower is a complex and interesting field to explore as the consequences go beyond the immediate locality and interacts with local as well as the global contexts. Inspired by Tsing (2003) and Zhan (2008) the paper...... and natural scientists and Chinese hydropower companies (to name a few). The paper maps different actors’ framing of the issue to gain a deeper understanding of the complexities of hydropower policymaking in China, as well as map the local consequences of global policymaking about large hydropower...

  20. Analysis of Privacy on Social Networks

    OpenAIRE

    Tomandl, Luboš

    2015-01-01

    This thesis deals with a question of privacy in a context of social networks. The main substance of these services is the users' option to share an information about their lives. This alone can be a problem for privacy. In the first part of this thesis concentrates on the meaning of privacy as well as its value for both individuals and the society. In the next part the privacy threats on social networks, namely Facebook, are discussed. These threats are disclosed on four levels according to f...

  1. Bridging the transatlantic divide in privacy

    Directory of Open Access Journals (Sweden)

    Paula Kift

    2013-08-01

    Full Text Available In the context of the US National Security Agency surveillance scandal, the transatlantic privacy divide has come back to the fore. In the United States, the right to privacy is primarily understood as a right to physical privacy, thus the protection from unwarranted government searches and seizures. In Germany on the other hand, it is also understood as a right to spiritual privacy, thus the right of citizens to develop into autonomous moral agents. The following article will discuss the different constitutional assumptions that underlie American and German attitudes towards privacy, namely privacy as an aspect of liberty or as an aspect of dignity. As data flows defy jurisdictional boundaries, however, policymakers across the Atlantic are faced with a conundrum: how can German and American privacy cultures be reconciled?

  2. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  3. 78 FR 44931 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-25

    ...), as amended. This system will provide DLA installations with the ability to rapidly and effectively... Defense Privacy and Civil Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/dla/index...: First name, last name, work email, work phone number, mobile phone number, short message service (SMS...

  4. HGSA DNA day essay contest winner 60 years on: still coding for cutting-edge science.

    Science.gov (United States)

    Yates, Patrick

    2013-08-01

    MESSAGE FROM THE EDUCATION COMMITTEE: In 2013, the Education Committee of the Human Genetics Society of Australasia (HGSA) established the DNA Day Essay Contest in Australia and New Zealand. The contest was first established by the American Society of Human Genetics in 2005 and the HGSA DNA Day Essay Contest is adapted from this contest via a collaborative partnership. The aim of the contest is to engage high school students with important concepts in genetics through literature research and reflection. As 2013 marks the 60th anniversary of the discovery of the double helix of DNA by James Watson and Francis Crick and the 10th anniversary of the first sequencing of the human genome, the essay topic was to choose either of these breakthroughs and explain its broader impact on biotechnology, human health and disease, or our understanding of basic genetics, such as genetic variation or gene expression. The contest attracted 87 entrants in 2013, with the winning essay authored by Patrick Yates, a Year 12 student from Melbourne High School. Further details about the contest including the names and schools of the other finalists can be found at http://www.hgsa-essay.net.au/. The Education Committee would like to thank all the 2013 applicants and encourage students to enter in 2014.

  5. Do Privacy Concerns Matter for Millennials?

    DEFF Research Database (Denmark)

    Fodor, Mark; Brem, Alexander

    2015-01-01

    data have raised the question, if location data are considered as sensitive data by users. Thus, we use two privacy concern models, namely Concern for Information Privacy (CFIP) and Internet Users’ Information Privacy Concerns (IUIPC) to find out. Our sample comprises of 235 individuals between 18...... and 34 years (Generation C) from Germany. The results of this study indicate that the second-order factor IUIPC showed better fit for the underlying data than CFIP did. Overall privacy concerns have been found to have an impact on behavioral intentions of users for LBS adoption. Furthermore, other risk...

  6. Patents, Inducement Prizes, and Contestant Strategy

    DEFF Research Database (Denmark)

    Davis, Jerome; Davis, Lee N.

    2006-01-01

    Debate over the merits of patents versus inducement prizes has tended to ignore the signaling roles of patents, and totally ignores the impact of patent signaling on prize contests. This paper asks: How does patent signaling affect the strategic choices of firms considering entering prize contests......? First, we consider contests that do not allow patenting, then contests that do. If patenting is not allowed, we argue, patent-holders, both internal and external to the contest, can adversely impact prize contests by claiming prize winner violation of their patents, and suing for damages. The likelihood...... of such challenges being made can deter entry, particularly in contests requiring large sunk costs. Furthermore, the firm's decisionmaking process will discriminate against entering prize contests and favor R&D projects with patentable outcomes. Together, these problems may circumscribe any future wider role...

  7. Rhetoric and Essentially Contested Arguments

    Science.gov (United States)

    Garver, Eugene

    1978-01-01

    Draws a connection between Gallie's essentially contested concepts and Aristotle's account of rhetorical argument by presenting a definition of Essentially Contested Argument which is used as the connecting term between rhetoric and essentially contested concepts and by demonstrating the value of making this connection. (JF)

  8. European Space Agency announces contest to "Name the Cluster Quartet"

    Science.gov (United States)

    2000-02-01

    1. Contest rules The European Space Agency (ESA) is launching a public competition to find the most suitable names for its four Cluster II space weather satellites. The quartet, which are currently known as flight models 5, 6, 7 and 8, are scheduled for launch from Baikonur Space Centre in Kazakhstan in June and July 2000. Professor Roger Bonnet, ESA Director of Science Programme, announced the competition for the first time to the European Delegations on the occasion of the Science Programme Committee (SPC) meeting held in Paris on 21-22 February 2000. The competition is open to people of all the ESA member states (*). Each entry should include a set of FOUR names (places, people, or things from history, mythology, or fiction, but NOT living persons). Contestants should also describe in a few sentences why their chosen names would be appropriate for the four Cluster II satellites. The winners will be those which are considered most suitable and relevant for the Cluster II mission. The names must not have been used before on space missions by ESA, other space organizations or individual countries. One winning entry per country will be selected to go to the Finals of the competition. The prize for each national winner will be an invitation to attend the first Cluster II launch event in mid-June 2000 with their family (4 persons) in a 3-day trip (including excursions to tourist sites) to one of these ESA establishments: ESRIN (near Rome, Italy): winners from France, Ireland, United Kingdom, Belgium. VILSPA (near Madrid, Spain): winners from The Netherlands, Norway, Sweden, Finland. ESTEC (near Amsterdam, The Netherlands): winners from Germany, Denmark, Switzerland, Austria. ESOC (in the Rhine Valley, Germany): winners from Italy, Spain , Portugal. During the first Cluster II launch event (June 2000) the chosen four names for the spacecraft will be announced. The grand prize will be: * a trip for the winner and family (4 people) to Paris where ESA's headquarters are

  9. Reward and punishment in a team contest

    NARCIS (Netherlands)

    Heine, F.A.; Strobel, M.

    2015-01-01

    A team contest entails both public good situations within the teams as well as a contest across teams. In an experimental study, we analyse behaviour in such a team contest when allowing to punish or to reward other group members. Moreover, we compare two types of contest environment: One in which

  10. 77 FR 38363 - Office of Privacy, Records, and Disclosure; Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-06-27

    ... delinquencies; final determinations of appeals; name/ title of officials responsible for denial of records; and... FOIA and the Privacy Act. Also used to produce statistical reports; and as a data source for management...

  11. Physics Contests for High School Students.

    Science.gov (United States)

    Fox, Doug; Nelson, Jim

    1983-01-01

    Describes how the Ontario Section of the American Association of Physics Teachers started a "Grade Eleven Prize Physics Contest" to generate interest in physics and recognize outstanding students. Also describes outcomes of contests, adaptation of the contest by Southeastern Pennsylvania Section, and suggestions for others wanting to…

  12. 29 CFR 2200.38 - Employee contests.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Employee contests. 2200.38 Section 2200.38 Labor... Pleadings and Motions § 2200.38 Employee contests. (a) Secretary's statement of reasons. Where an affected employee or authorized employee representative files a notice of contest with respect to the abatement...

  13. 76 FR 52320 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-22

    ... & Privacy, and DoD Information Assurance Regulations. Auditing: Audit trail records from all available.../JS Privacy Office, Freedom of Information Directorate, Washington Headquarters Services, 1155 Defense... Defense. DHA 23 System name: Pharmacy Data Transaction Service (PDTS). System location: Primary: Emdeon...

  14. Hybrid All-Pay and Winner-Pay Contests

    DEFF Research Database (Denmark)

    Lagerlöf, Johan

    2017-01-01

    In many contests in economic and political life, both all-pay and winner-pay expenditures matter for winning. This paper studies such hybrid contests under symmetry and asymmetry. The symmetric model is very general but still yields a simple closed-form solution. More contestants tend to lead to ...... expenditures. An endogenous bias that maximizes total expenditures disfavors the high-valuation contestant but still makes her the more likely one to win....

  15. Interpretation and Analysis of Privacy Policies of Websites in India

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2016-01-01

    the conditions specified in the policy document. So, ideally the privacy policies should be readable and provide sufficient information to empower users to make knowledgeable decisions. Thus, we have examined more than 50 privacy policies and discussed the content analysis in this paper. We discovered...... on information collection methods, purpose, sharing entities names and data transit. In this study, the 11 % privacy policies are compliance with privacy standards which denotes other privacy policies are less committed to support transparency, choice, and accountability in the process of information collection...... that the policies are not only unstructured but also described in complicated language. Our analysis shows that the user data security measures are nonspecific and unsatisfactory in 57% privacy policies. In spite of huge amount of information collection, the privacy policies does not have clear description...

  16. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  17. 78 FR 73511 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-12-06

    ... DEPARTMENT OF DEFENSE [Docket ID: USN-2013-0046] Privacy Act of 1974; System of Records AGENCY... Privacy Act of 1974, as amended. The system being deleted is N01500-8, System Name: Personnel and Training... Internet at http://www.regulations.gov as they are received without change, including any personal...

  18. Self-sacrifice in 'desperado' contests between relatives

    Directory of Open Access Journals (Sweden)

    Monnin Thibaud

    2010-10-01

    Full Text Available Abstract Intra-specific competition occurs in all animal species and can lead to escalated conflict. Overt fighting entails the risk of injury or death, and is usually avoided through the use of conventions or pre-fight assessments. However, overt fighting can be expected when value of the contest outweighs the value of the future, as contestants have little or nothing to lose. In these situations, respect for conventions and asymmetries between contestants can break down, and overt fighting becomes more likely (the desperado effect. Such conditions can arise in contests between queens over colony ownership in social insects, because the value of inheriting a colony of potentially thousands of helpers is huge and queens may have very limited alternative reproductive options. However, in social species the balance of possible outcomes may be influenced by inclusive fitness, as contestants are often relatives. Here we present a simple model based on social insects, which demonstrates that not fighting can be selectively advantageous when there is a risk posed by fighting to inclusive fitness, even when not fighting is likely to result in death. If contestants are related, a loser can still gain indirect fitness through the winner, whereas fighting introduces a risk that both queens will die and thereby obtain zero inclusive fitness. When relatedness is high and fighting poses a risk of all contestants dying, it can be advantageous to cede the contest and be killed, rather than risk everything by fighting.

  19. Graph transformation tool contest 2008

    NARCIS (Netherlands)

    Rensink, Arend; van Gorp, Pieter

    This special section is the outcome of the graph transformation tool contest organised during the Graph-Based Tools (GraBaTs) 2008 workshop, which took place as a satellite event of the International Conference on Graph Transformation (ICGT) 2008. The contest involved two parts: three “off-line case

  20. Privacy and security in the digital age: Contemporary ethical challenges and future directions

    DEFF Research Database (Denmark)

    Hiranandani, Vanmala Sunder

    2011-01-01

    Privacy is at the core of civil rights from which all other human rights and freedoms flow. Since the twentieth century, and particularly since 9/11, rapid deployment of information and surveillance technologies in the name of national security has grave implications for individual privacy...... and human rights. This article reviews major strands in contemporary privacy-security debate, while critiquing existing conceptualisations of privacy that are inadequate in the context of multifaceted and ubiquitous surveillance technologies post 9/11. Further, this paper contends most privacy...

  1. 76 FR 67155 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-31

    ... inventory of record systems subject to the Privacy Act of 1974 (5 U.S.C. 552a), as amended. DATES: The... Federal Register Liaison Officer, Department of Defense. N05000-1 System name: OPNAV Headquarters Web... DEPARTMENT OF DEFENSE Department of the Navy [Docket ID USN-2011-0015] Privacy Act of 1974; System...

  2. Rising to the challenge : A model of contest performance

    OpenAIRE

    DesAutels, Philip; Berthon, Pierre; Salehi-Sangari, Esmail

    2011-01-01

    Contests are a ubiquitous form of promotion widely adopted by financial services advertisers, yet, paradoxically, academic research on them is conspicuous in its absence. This work addresses this gap by developing a model of contest engagement and performance. Using motivation theory, factors that drive participant engagement are modeled, and engagement's effect on experience and marketing success of the contest specified. Measures of contest performance, in-contest engagement and post-contes...

  3. 75 FR 56079 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-09-15

    .... Bryman, Alternate OSD Federal Register Liaison Officer, Department of Defense. GNSA 24 System name: NSA..., Classified National Security Information; and NSA/CSS Policy 1-30, Review of NSA/CSS Information for Public... entry and replace with ``The NSA/CSS rules for contesting contents and appealing initial determinations...

  4. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  5. Contest Physics.

    Science.gov (United States)

    Moehnke, Randy

    1994-01-01

    Discusses the use of contests to keep physics interesting and exciting for the students. Includes: balloon car, egg drop, tennis ball catapult, bridge building, mousetrap vehicle, musical instrument, slide photo, electric junk dissection, windmill generator, and solar heater. (MVL)

  6. Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns

    OpenAIRE

    Siegel, David A.

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to con...

  7. Bribing potential entrants in a rent-seeking contest

    NARCIS (Netherlands)

    Schoonbeek, L.

    We consider a two-stage model of a Tullock rent-seeking contest where one new potential entrant makes his appearance. In the first stage each other player can contribute to bribe this new player to commit not to enter the contest. In the second stage we have the actual contest either with or without

  8. 78 FR 43258 - Privacy Act; System of Records: Human Resources Records, State-31

    Science.gov (United States)

    2013-07-19

    ... DEPARTMENT OF STATE [Public Notice 8384] Privacy Act; System of Records: Human Resources Records... system of records, Human Resources Records, State- 31, pursuant to the provisions of the Privacy Act of... State proposes that the current system will retain the name ``Human Resources Records'' (previously...

  9. Contesting Citizenship

    DEFF Research Database (Denmark)

    The new book shows how citizenship, its meaning and form, have become a vital site of contestation. While many minority groups struggle to redefine the rights of citizenship in more pluralized forms, the responsivbilities of citizenship are being reaffirmed by democratic governments concerned to ...

  10. Contested collaboration

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1995-01-01

    . The model describes design phases, roles, themes, and intergroup communication networks as they evolve throughout the design process and characterizes design as a process of "contested collaboration". It is a first step towards a predictive design model that suggests strategies which may help participants...

  11. Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing

    Directory of Open Access Journals (Sweden)

    Daisuke Mashima

    2018-03-01

    Full Text Available Thanks to the roll-out of smart meters, availability of fine-grained electricity usage data has rapidly grown. Such data has enabled utility companies to perform robust and efficient grid operations. However, at the same time, privacy concerns associated with sharing and disclosure of such data have been raised. In this paper, we first demonstrate the feasibility of estimating privacy-sensitive household attributes based solely on the energy usage data of residential customers. We then discuss a framework to measure privacy gain and evaluate the effectiveness of customer-centric privacy-protection schemes, namely redaction of data irrelevant to services and addition of bounded artificial noise. Keywords: Privacy, Smart meter data, Quantitative evaluation

  12. The National Solo and Ensemble Contest 1929-1937

    Science.gov (United States)

    Meyers, Brian D.

    2012-01-01

    This study is the first investigation of the nine-year history of the National Solo and Ensemble Contests, held in the United States in conjunction with the National School Band and Orchestra Contests of the late 1920s and early to mid-1930s. Primary sources used include letters from those involved with the planning of the contests, meeting…

  13. Innovation contests to promote sexual health in China: a qualitative evaluation.

    Science.gov (United States)

    Zhang, Wei; Schaffer, David; Tso, Lai Sze; Tang, Songyuan; Tang, Weiming; Huang, Shujie; Yang, Bin; Tucker, Joseph D

    2017-01-14

    Innovation contests call on non-experts to help solve problems. While these contests have been used extensively in the private sector to increase engagement between organizations and clients, there is little data on the role of innovation contests to promote health campaigns. We implemented an innovation contest in China to increase sexual health awareness among youth and evaluated community engagement in the contest. The sexual health image contest consisted of an open call for sexual health images, contest promotion activities, judging of entries, and celebrating contributions. Contest promotion activities included in-person and social media feedback, classroom didactics, and community-driven activities. We conducted 19 semi-structured interviews with a purposive sample to ensure a range of participant scores, experts and non-expert participants, submitters and non-submitters. Transcripts of each interview were coded with Atlas.ti and evaluated by three reviewers. We identified stages of community engagement in the contest which contributed to public health impact. Community engagement progressed across a continuum from passive, moderate, active, and finally strong engagement. Engagement was a dynamic process that appeared to have little relationship with formally submitting an image to the contest. Among non-expert participants, contest engagement increased knowledge, healthy attitudes, and empowered participants to share ideas about safe sex with others outside of the contest. Among experts who helped organize the contest, the process of implementing the contest fostered multi-sectoral collaboration and re-oriented public health leadership towards more patient-centered public health campaigns. The results of this study suggest that innovation contests may be a useful tool for public health promotion by enhancing community engagement and re-orienting health campaigns to make them more patient-centered.

  14. GAIN RATIO BASED FEATURE SELECTION METHOD FOR PRIVACY PRESERVATION

    Directory of Open Access Journals (Sweden)

    R. Praveena Priyadarsini

    2011-04-01

    Full Text Available Privacy-preservation is a step in data mining that tries to safeguard sensitive information from unsanctioned disclosure and hence protecting individual data records and their privacy. There are various privacy preservation techniques like k-anonymity, l-diversity and t-closeness and data perturbation. In this paper k-anonymity privacy protection technique is applied to high dimensional datasets like adult and census. since, both the data sets are high dimensional, feature subset selection method like Gain Ratio is applied and the attributes of the datasets are ranked and low ranking attributes are filtered to form new reduced data subsets. K-anonymization privacy preservation technique is then applied on reduced datasets. The accuracy of the privacy preserved reduced datasets and the original datasets are compared for their accuracy on the two functionalities of data mining namely classification and clustering using naïve Bayesian and k-means algorithm respectively. Experimental results show that classification and clustering accuracy are comparatively the same for reduced k-anonym zed datasets and the original data sets.

  15. Payoff Shares in Two-Player Contests

    Directory of Open Access Journals (Sweden)

    Samuel Häfner

    2016-09-01

    Full Text Available In imperfectly discriminating contests with symmetric valuations, equilibrium payoffs are positive shares of the value of the prize. In contrast to a bargaining situation, players’ shares sum to less than one because a residual share of the value is lost due to rent dissipation. In this paper, we consider contests with two players and investigate the relationship between these equilibrium shares and the parameters of a class of asymmetric Tullock contest success functions. Our main finding is that any players’ shares that sum up to less than one can arise as the unique outcome of a pure-strategy Nash equilibrium for appropriate parameters.

  16. Innovation contests to promote sexual health in china: a qualitative evaluation

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2017-01-01

    Full Text Available Abstract Background Innovation contests call on non-experts to help solve problems. While these contests have been used extensively in the private sector to increase engagement between organizations and clients, there is little data on the role of innovation contests to promote health campaigns. We implemented an innovation contest in China to increase sexual health awareness among youth and evaluated community engagement in the contest. Methods The sexual health image contest consisted of an open call for sexual health images, contest promotion activities, judging of entries, and celebrating contributions. Contest promotion activities included in-person and social media feedback, classroom didactics, and community-driven activities. We conducted 19 semi-structured interviews with a purposive sample to ensure a range of participant scores, experts and non-expert participants, submitters and non-submitters. Transcripts of each interview were coded with Atlas.ti and evaluated by three reviewers. Results We identified stages of community engagement in the contest which contributed to public health impact. Community engagement progressed across a continuum from passive, moderate, active, and finally strong engagement. Engagement was a dynamic process that appeared to have little relationship with formally submitting an image to the contest. Among non-expert participants, contest engagement increased knowledge, healthy attitudes, and empowered participants to share ideas about safe sex with others outside of the contest. Among experts who helped organize the contest, the process of implementing the contest fostered multi-sectoral collaboration and re-oriented public health leadership towards more patient-centered public health campaigns. Conclusion The results of this study suggest that innovation contests may be a useful tool for public health promotion by enhancing community engagement and re-orienting health campaigns to make them more patient-centered.

  17. 78 FR 52117 - DoD Privacy Program

    Science.gov (United States)

    2013-08-22

    ... how the action will meet that need. An individual's privacy is a fundamental legal right that must be... and place of birth, mother's maiden name, biometric records, home phone numbers, other demographic... a photograph. (y) Risk assessment. An analysis considering information sensitivity, vulnerabilities...

  18. Social Identity and Group Contests

    OpenAIRE

    Zaunbrecher, Henrik; Riedl, Arno

    2016-01-01

    Social identity has been shown to successfully enhance cooperation and effort in cooperation and coordination games. Little is known about the causal effect of social identity on the propensity to engage in group conflict. In this paper we explore theoretically and experimentally whether social identity increases investments in group contests. We show theoretically that increased social identity with the own group implies higher investments in Tullock contests. Empirically we find that induce...

  19. Learning Reproducibility with a Yearly Networking Contest

    KAUST Repository

    Canini, Marco; Crowcroft, Jon

    2017-01-01

    fostered by organizing a yearly international contest. We argue that holding a contest undertaken by a plurality of students will have benefits that are two-fold. First, it will promote hands-on learning of skills that are helpful in producing artifacts

  20. Sporting contests: seeing red? Putting sportswear in context.

    Science.gov (United States)

    Rowe, Candy; Harris, Julie M; Roberts, S Craig

    2005-10-27

    The shirt colour worn by sportsmen can affect the behaviour of the competitors, but Hill and Barton show that it may also influence the outcome of contests. By analysing the results of men's combat sports from the Athens 2004 Olympics, they found that more matches were won by fighters wearing red outfits than by those wearing blue; they suggest that red might confer success because it is a sign of dominance in many animal species and could signal aggression in human contests. Here we use another data set from the 2004 Olympics to show that similar winning biases occur in contests in which neither contestant wears red, indicating that a different mechanism may be responsible for these effects.

  1. Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.

    Science.gov (United States)

    King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia

    2012-04-01

    The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related

  2. Contested Property Claims

    DEFF Research Database (Denmark)

    Property relations are such a common feature of social life that we can sometimes forget the immense complexity of the web of laws, practices, and ideas that allow a property regime to function smoothly. But we are quickly reminded of this complexity when social conflict over property erupts. When...... social actors confront a property regime – for example by squatting – they enact what can be called ‘contested property claims’. These confrontations raise crucial issues of social justice and show the ways in which property conflicts often reflect wider social conflicts. Through a series of case studies...... from across the globe, this multidisciplinary anthology exploring contested property claims brings together works from anthropologists, legal scholars, and geographers, who show how disagreements give us a privileged window onto how property regimes function and illustrates the many ways...

  3. Contested Property Claims

    DEFF Research Database (Denmark)

    Property relations are such a common feature of social life that the complexity of the web of laws, practices, and ideas that allow a property regime to function smoothly are often forgotten. But we are quickly reminded of this complexity when conflict over property erupts. When social actors...... confront a property regime – for example by squatting – they enact what can be called ‘contested property claims’. As this book demonstrates, these confrontations raise crucial issues of social justice and show the ways in which property conflicts often reflect wider social conflicts. Through a series...... of case studies from across the globe, this multidisciplinary anthology brings together works from anthropologists, legal scholars, and geographers, who show how exploring contested property claims offers a privileged window onto how property regimes function, as well as an illustration of the many ways...

  4. 27 CFR 10.24 - Sales promotion contests.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Sales promotion contests. 10.24 Section 10.24 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS COMMERCIAL BRIBERY Commercial Bribery § 10.24 Sales promotion contests...

  5. A secure data privacy preservation for on-demand

    Directory of Open Access Journals (Sweden)

    Dhasarathan Chandramohan

    2017-04-01

    Full Text Available This paper spotlights privacy and its obfuscation issues of intellectual, confidential information owned by insurance and finance sectors. Privacy risk in business era if authoritarians misuse secret information. Software interruptions in steeling digital data in the name of third party services. Liability in digital secrecy for the business continuity isolation, mishandling causing privacy breaching the vicinity and its preventive phenomenon is scrupulous in the cloud, where a huge amount of data is stored and maintained enormously. In this developing IT-world toward cloud, users privacy protection is becoming a big question , albeit cloud computing made changes in the computing field by increasing its effectiveness, efficiency and optimization of the service environment etc, cloud users data and their identity, reliability, maintainability and privacy may vary for different CPs (cloud providers. CP ensures that the user’s proprietary information is maintained more secretly with current technologies. More remarkable occurrence is even the cloud provider does not have suggestions regarding the information and the digital data stored and maintained globally anywhere in the cloud. The proposed system is one of the obligatory research issues in cloud computing. We came forward by proposing the Privacy Preserving Model to Prevent Digital Data Loss in the Cloud (PPM–DDLC. This proposal helps the CR (cloud requester/users to trust their proprietary information and data stored in the cloud.

  6. Contestable Licensing

    OpenAIRE

    Zvika Neeman; Gerhard O. Orosel

    2000-01-01

    We analyze a model of repeated franchise bidding for natural monopoly with contestable licensing - a franchisee halds an (exclusive) license to operate a franchise until another rm offers to pay more for it. In a world where quality is observable but not veri able, the simple regulatory scheme we describe combines market-like incentives with regulatory oversight to generate efficient outcomes.

  7. Campaigning and Contestation

    DEFF Research Database (Denmark)

    Schwartz, Sander Andreas

    2015-01-01

    This article is a critical study of the Facebook pages of politicians as public spheres using Dahlberg’s notion of contestation. A method is implemented inspired by qualitative content analysis and including focus groups in order to study citizen comments on eight main political candidates...

  8. Will you accept the government's friend request? Social networks and privacy concerns.

    Science.gov (United States)

    Siegel, David A

    2013-01-01

    Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  9. The HepTestContest: a global innovation contest to identify approaches to hepatitis B and C testing.

    Science.gov (United States)

    Tucker, Joseph D; Meyers, Kathrine; Best, John; Kaplan, Karyn; Pendse, Razia; Fenton, Kevin A; Andrieux-Meyer, Isabelle; Figueroa, Carmen; Goicochea, Pedro; Gore, Charles; Ishizaki, Azumi; Khwairakpam, Giten; Miller, Veronica; Mozalevskis, Antons; Ninburg, Michael; Ocama, Ponsiano; Peeling, Rosanna; Walsh, Nick; Colombo, Massimo G; Easterbrook, Philippa

    2017-11-01

    Innovation contests are a novel approach to elicit good ideas and innovative practices in various areas of public health. There remains limited published literature on approaches to deliver hepatitis testing. The purpose of this innovation contest was to identify examples of different hepatitis B and C approaches to support countries in their scale-up of hepatitis testing and to supplement development of formal recommendations on service delivery in the 2017 World Health Organization hepatitis B and C testing guidelines. This contest involved four steps: 1) establishment of a multisectoral steering committee to coordinate a call for contest entries; 2) dissemination of the call for entries through diverse media (Facebook, Twitter, YouTube, email listservs, academic journals); 3) independent ranking of submissions by a panel of judges according to pre-specified criteria (clarity of testing model, innovation, effectiveness, next steps) using a 1-10 scale; 4) recognition of highly ranked entries through presentation at international conferences, commendation certificate, and inclusion as a case study in the WHO 2017 testing guidelines. The innovation contest received 64 entries from 27 countries and took a total of 4 months to complete. Sixteen entries were directly included in the WHO testing guidelines. The entries covered testing in different populations, including primary care patients (n = 5), people who inject drugs (PWID) (n = 4), pregnant women (n = 4), general populations (n = 4), high-risk groups (n = 3), relatives of people living with hepatitis B and C (n = 2), migrants (n = 2), incarcerated individuals (n = 2), workers (n = 2), and emergency department patients (n = 2). A variety of different testing delivery approaches were employed, including integrated HIV-hepatitis testing (n = 12); integrated testing with harm reduction and addiction services (n = 9); use of electronic medical records to support targeted testing (n = 8

  10. Locking it down: The privacy and security of mobile medication apps.

    Science.gov (United States)

    Grindrod, Kelly; Boersema, Jonathan; Waked, Khrystine; Smith, Vivian; Yang, Jilan; Gebotys, Catherine

    2017-01-01

    To explore the privacy and security of free medication applications (apps) available to Canadian consumers. The authors searched the Canadian iTunes store for iOS apps and the Canadian Google Play store for Android apps related to medication use and management. Using an Apple iPad Air 2 and a Google Nexus 7 tablet, 2 reviewers generated a list of apps that met the following inclusion criteria: free, available in English, intended for consumer use and related to medication management. Using a standard data collection form, 2 reviewers independently coded each app for the presence/absence of passwords, the storage of personal health information, a privacy statement, encryption, remote wipe and third-party sharing. A Cohen's Kappa statistic was used to measure interrater agreement. Of the 184 apps evaluated, 70.1% had no password protection or sign-in system. Personal information, including name, date of birth and gender, was requested by 41.8% (77/184) of apps. Contact information, such as address, phone number and email, was requested by 25% (46/184) of apps. Finally, personal health information, other than medication name, was requested by 89.1% (164/184) of apps. Only 34.2% (63/184) of apps had a privacy policy in place. Most free medication apps offer very limited authentication and privacy protocols. As a result, the onus currently falls on patients to input information in these apps selectively and to be aware of the potential privacy issues. Until more secure systems are built, health care practitioners cannot fully support patients wanting to use such apps.

  11. 76 FR 53421 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-08-26

    ..., Air Force Privacy Act Office, Office of Warfighting Integration and Chief Information Officer, ATTN...: Name, signatures, personal contact information, individual's employer and institutional, organizational..., Historical Products, Services, and Requirements; Air Force Instruction 84-105, Organizational Lineage, Honors...

  12. Designing Successful Science Contests for K-12

    Science.gov (United States)

    Schwerin, T.; Colleton, N.

    2006-12-01

    Contests can engage, motivate, instruct and inspire students of all grade levels and interests. What are the ingredients necessary for a successful science contest? The Institute for Global Environmental Strategies (IGES) has recommendations for designing science-based competitions that are both fun and educational for for elementary and secondary students. These recommendations were developed as a result of IGES' experience gained through two annual student competitions that focus on Earth science topics: An annual art contest, for grades 2-4, challenges U.S. students to explore a specific Earth science topic. For example, past themes have included Polar Explorations: Going to Extremes (2006); Connect-4: Air, Land, Water, and Life (2005); and Picture Me: What Kind of Earth Explorer Would I Be? (2004). The contest supports national science education standards for grades K-4, and includes suggested classroom activities, books, and movies. The Thacher Scholarship was founded in 2000 by IGES in honor of the late Peter S. Thacher, a former IGES board member and leader in promoting the use of satellite remote sensing. The $4,000 scholarship is awarded to exceptional high school students displaying the best use of satellite remote sensing in understanding our changing planet.

  13. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    Science.gov (United States)

    Nouskalis, G

    2011-03-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  14. One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data

    Science.gov (United States)

    Simmons, Sean; Berger, Bonnie

    2017-01-01

    Even in the aggregate, genomic data can reveal sensitive information about individuals. We present a new model-based measure, PrivMAF, that provides provable privacy guarantees for aggregate data (namely minor allele frequencies) obtained from genomic studies. Unlike many previous measures that have been designed to measure the total privacy lost by all participants in a study, PrivMAF gives an individual privacy measure for each participant in the study, not just an average measure. These individual measures can then be combined to measure the worst case privacy loss in the study. Our measure also allows us to quantify the privacy gains achieved by perturbing the data, either by adding noise or binning. Our findings demonstrate that both perturbation approaches offer significant privacy gains. Moreover, we see that these privacy gains can be achieved while minimizing perturbation (and thus maximizing the utility) relative to stricter notions of privacy, such as differential privacy. We test PrivMAF using genotype data from the Wellcome Trust Case Control Consortium, providing a more nuanced understanding of the privacy risks involved in an actual genome-wide association studies. Interestingly, our analysis demonstrates that the privacy implications of releasing MAFs from a study can differ greatly from individual to individual. An implementation of our method is available at http://privmaf.csail.mit.edu. PMID:29202050

  15. Rethinking Eurovision Song Contest as a Clash of Cultures

    Directory of Open Access Journals (Sweden)

    Zeynep Merve ŞIVGIN

    2015-12-01

    Full Text Available Modern era’s understanding of culture overlooked culture, as a social and cultural analysis category as well as a way of life. This point of view has lost its validity and culture gained significance as an area where rulership and power struggle exists. Especially the privileged existence of popular culture; having an interdependence attachment to power relations in addition to an allowing structure for alternative discourses other than the official discourse is a cruicial asset. This article examines Eurovision Song Contest with its over 50 years of traditionaled history, as a noteworthy television program of popular culture. Despite often being considered as “kitsch”, the contest refers more than of an ordinary song competition. The artists who participate in the contest compete for the country they represent rather than an individual race which takes “national identity” more on stage. In this respect the contest has a stimulus effect on national consciousness. This alerted effect can clearly be seen on public debates just before, during and after the contest. It is claimed in this study that Turkey’s position in Eurovision Song Contest offers a view of the “cultural struggle” towards Western civilization since the beginning of the modernization process. In this framework this study primarily focuses on the relationship between identity and culture, followed by the role of popular culture in the construction of cultural identity. Afterwards the study tries to discover how does this contest became a tool of cultural struggle in Turkish society by analyzing the news and the discource of the news that took place in national print media.

  16. A Taxonomy of Privacy Constructs for Privacy-Sensitive Robotics

    OpenAIRE

    Rueben, Matthew; Grimm, Cindy M.; Bernieri, Frank J.; Smart, William D.

    2017-01-01

    The introduction of robots into our society will also introduce new concerns about personal privacy. In order to study these concerns, we must do human-subject experiments that involve measuring privacy-relevant constructs. This paper presents a taxonomy of privacy constructs based on a review of the privacy literature. Future work in operationalizing privacy constructs for HRI studies is also discussed.

  17. Blue Marble Space Institute essay contest

    Science.gov (United States)

    Wendel, JoAnna

    2014-04-01

    The Blue Marble Space Institute of Science, based in Seattle, Wash., is inviting college students to participate in its essay contest. Essays need to address the question, "In the next 100 years, how can human civilization prepare for the long-term changes to the Earth system that will occur over the coming millennium?" According to the institute, the purpose of the contest is "to stimulate creative thinking relating to space exploration and global issues by exploring how changes in the Earth system will affect humanity's future."

  18. Will you accept the government's friend request? Social networks and privacy concerns.

    Directory of Open Access Journals (Sweden)

    David A Siegel

    Full Text Available Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.

  19. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often

  20. The role of male contest competition over mates in speciation

    Directory of Open Access Journals (Sweden)

    Anna QVARNSTRÖM, Niclas VALLIN, Andreas RUDH

    2012-06-01

    Full Text Available Research on the role of sexual selection in the speciation process largely focuses on the diversifying role of mate choice. In particular, much attention has been drawn to the fact that population divergence in mate choice and in the male traits subject to choice directly can lead to assortative mating. However, male contest competition over mates also constitutes an important mechanism of sexual selection. We review recent empirical studies and argue that sexual selection through male contest competition can affect speciation in ways other than mate choice. For example, biases in aggression towards similar competitors can lead to disruptive and negative frequency-dependent selection on the traits used in contest competition in a similar way as competition for other types of limited resources. Moreover, male contest abilities often trade-off against other abilities such as parasite resistance, protection against predators and general stress tolerance. Populations experiencing different ecological conditions should therefore quickly diverge non-randomly in a number of traits including male contest abilities. In resource based breeding systems, a feedback loop between competitive ability and habitat use may lead to further population divergence. We discuss how population divergence in traits used in male contest competition can lead to the build up of reproductive isolation through a number of different pathways. Our main conclusion is that the role of male contest competition in speciation remains largely scientifically unexplored [Current Zoology 58 (3: 490–506, 2012].

  1. Privacy Bridges: EU and US Privacy Experts In Search of Transatlantic Privacy Solutions

    NARCIS (Netherlands)

    Abramatic, J.-F.; Bellamy, B.; Callahan, M.E.; Cate, F.; van Eecke, P.; van Eijk, N.; Guild, E.; de Hert, P.; Hustinx, P.; Kuner, C.; Mulligan, D.; O'Connor, N.; Reidenberg, J.; Rubinstein, I.; Schaar, P.; Shadbolt, N.; Spiekermann, S.; Vladeck, D.; Weitzner, D.J.; Zuiderveen Borgesius, F.; Hagenauw, D.; Hijmans, H.

    2015-01-01

    The EU and US share a common commitment to privacy protection as a cornerstone of democracy. Following the Treaty of Lisbon, data privacy is a fundamental right that the European Union must proactively guarantee. In the United States, data privacy derives from constitutional protections in the

  2. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  3. A Hybrid Location Privacy Solution for Mobile LBS

    Directory of Open Access Journals (Sweden)

    Ruchika Gupta

    2017-01-01

    Full Text Available The prevalent usage of location based services, where getting any service is solely based on the user’s current location, has raised an extreme concern over location privacy of the user. Generalized approaches dealing with location privacy, referred to as cloaking and obfuscation, are mainly based on a trusted third party, in which all the data remain available at a central server and thus complete knowledge of the query exists at the central node. This is the major limitation of such approaches; on the other hand, in trusted third-party-free framework clients collaborate with each other and freely communicate with the service provider without any third-party involvement. Measuring and evaluating trust among peers is a crucial aspect in trusted third-party-free framework. This paper exploits the merits and mitigating the shortcomings of both of these approaches. We propose a hybrid solution, HYB, to achieve location privacy for the mobile users who use location services frequently. The proposed HYB scheme is based on the collaborative preprocessing of location data and utilizes the benefits of homomorphic encryption technique. Location privacy is achieved at two levels, namely, at the proximity level and at distant level. The proposed HYB solution preserves the user’s location privacy effectively under specific, pull-based, sporadic query scenario.

  4. Contestation of citizenship ’from below’

    DEFF Research Database (Denmark)

    Brändle, Verena Katharina

    -up’ approach to citizenship contestation according to people’s views of their relationship with political authorities as well as concerning questions of how to organise just social interaction among each other. Here, the thesis argues that online media allow people to constitute themselves as political...... citizenship, the thesis conducts an inductive comments analysis and compares them across German and Danish online news sites. Regarding EU mobiles’ citizenship contestation, it draws from two online surveys distributed in Facebook groups and analyses and compares semi-structured interviews with EU mobiles...

  5. Experience affects the outcome of agonistic contests without affecting the selective advantage of size.

    Science.gov (United States)

    Kasumovic, Michael M; Elias, Damian O; Punzalan, David; Mason, Andrew C; Andrade, Maydianne C B

    2009-06-01

    In the field, phenotypic determinants of competitive success are not always absolute. For example, contest experience may alter future competitive performance. As future contests are not determined solely on phenotypic attributes, prior experience could also potentially alter phenotype-fitness associations. In this study, we examined the influence of single and multiple experiences on contest outcomes in the jumping spider Phidippus clarus. We also examined whether phenotype-fitness associations altered as individuals gained more experience. Using both size-matched contests and a tournament design, we found that both winning and losing experience affected future contest success; males with prior winning experience were more likely to win subsequent contests. Although experience was a significant determinant of success in future contests, male weight was approximately 1.3 times more important than experience in predicting contest outcomes. Despite the importance of experience in determining contest outcomes, patterns of selection did not change between rounds. Overall, our results show that experience can be an important determinant in contest outcomes, even in short-lived invertebrates, and that experience alone is unlikely to alter phenotype-fitness associations.

  6. The HepTestContest: a global innovation contest to identify approaches to hepatitis B and C testing

    Directory of Open Access Journals (Sweden)

    Joseph D. Tucker

    2017-11-01

    Full Text Available Abstract Background Innovation contests are a novel approach to elicit good ideas and innovative practices in various areas of public health. There remains limited published literature on approaches to deliver hepatitis testing. The purpose of this innovation contest was to identify examples of different hepatitis B and C approaches to support countries in their scale-up of hepatitis testing and to supplement development of formal recommendations on service delivery in the 2017 World Health Organization hepatitis B and C testing guidelines. Methods This contest involved four steps: 1 establishment of a multisectoral steering committee to coordinate a call for contest entries; 2 dissemination of the call for entries through diverse media (Facebook, Twitter, YouTube, email listservs, academic journals; 3 independent ranking of submissions by a panel of judges according to pre-specified criteria (clarity of testing model, innovation, effectiveness, next steps using a 1-10 scale; 4 recognition of highly ranked entries through presentation at international conferences, commendation certificate, and inclusion as a case study in the WHO 2017 testing guidelines. Results The innovation contest received 64 entries from 27 countries and took a total of 4 months to complete. Sixteen entries were directly included in the WHO testing guidelines. The entries covered testing in different populations, including primary care patients (n = 5, people who inject drugs (PWID (n = 4, pregnant women (n = 4, general populations (n = 4, high-risk groups (n = 3, relatives of people living with hepatitis B and C (n = 2, migrants (n = 2, incarcerated individuals (n = 2, workers (n = 2, and emergency department patients (n = 2. A variety of different testing delivery approaches were employed, including integrated HIV-hepatitis testing (n = 12; integrated testing with harm reduction and addiction services (n = 9; use of electronic medical records to

  7. A national environmental design contest and capstone course for universities

    International Nuclear Information System (INIS)

    Bhada, Ron K.; Abbas Ghassemi; Deraid Morgan, J.

    1992-01-01

    The Waste-management Education and Research Consortium (WERC) of New Mexico has developed and implemented an environmental design contest for competition by universities throughout America. This is the first university environmental design contest anywhere in the world. WERC is a consortium of three universities, a community college, and two national laboratories sponsored by the DOE with the mission of generating resources to address issues associated with environmental management. The contest was structured to give university student groups from all over America an opportunity to exchange information via a national contest for design, development, and testing of an environmental control process. A practical environmental problem was presented to the competing teams. Each team prepared a total plant design for the solution of the environmental problem. They further prepared a working model to demonstrate each solution on a smaller scale. The design stressed not just the technical solution, but also such factors as economics, risk analysis, regulations, public policy and communications. The judging was preformed by experts from academia, industry and government agencies. The awards were based on the written plant design, the small demonstration, as well as presentations by the competing teams. All the criteria noted above(technical excellence, risk analysis, etc.) were weighted in the judging. Seven universities from throughout the United States competed in the first contest held in April 1991. The program fully accomplished its objective of providing a design challenge as well as providing a medium of exchanging information in the environmental area between various regions of the country. Over twenty universities have signed up to compete in next year's contest. In fact many have used the contest problem as part of their capstone design course. This paper presents the experiences of the first design contest and the topic for the second year. (author)

  8. 77 FR 48199 - Privacy Act; System of Records: State-35, Information Access Programs Records

    Science.gov (United States)

    2012-08-13

    ..., the Privacy Act, the Ethics in Government Act, the access provisions of Executive Order 13526 or a...; requester's name and requester's mailing and email address; Social Security number (if provided by the...: Hard copy and electronic media. RETRIEVABILITY: Individual name, case number. SAFEGUARDS: All users are...

  9. Contested Namesakes: East Berlin School Names under Communism and in Reunified Germany

    Science.gov (United States)

    Plum, Catherine

    2005-01-01

    In this article, the author discusses how the municipal authorities eliminate the names of all schools in eastern Berlin in 1990 to formalize the spontaneous purge of school identities. She added, that the renaming of primary and secondary schools at this historical juncture provides a unique vantage point for examining what the democratic turning…

  10. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  11. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... FEDERAL RESERVE SYSTEM 12 CFR Part 261a [Docket No. R-1313] Privacy Act of 1974; Privacy Act... implementing the Privacy Act of 1974 (Privacy Act). The primary changes concern the waiver of copying fees... records under the Privacy Act; the amendment of special procedures for the release of medical records to...

  12. Designing Privacy for You : A User Centric Approach For Privacy

    OpenAIRE

    Senarath, Awanthika; Arachchilage, Nalin A. G.; Slay, Jill

    2017-01-01

    Privacy directly concerns the user as the data owner (data- subject) and hence privacy in systems should be implemented in a manner which concerns the user (user-centered). There are many concepts and guidelines that support development of privacy and embedding privacy into systems. However, none of them approaches privacy in a user- centered manner. Through this research we propose a framework that would enable developers and designers to grasp privacy in a user-centered manner and implement...

  13. Healing speech, wandering names, contests of words : ideas about language in Euripides

    NARCIS (Netherlands)

    Caspers, Christiaan Leopold

    2011-01-01

    Ideas about language in Euripides include, among many others, the claim that “honourable speech is a medicine for man’s fear”; the observation that “no one can judge a case... before having learned both sides’ story”; and the notion that “a name may be in many places, but not a body”. It is among

  14. The Privacy Coach: Supporting customer privacy in the Internet of Things

    OpenAIRE

    Broenink, Gerben; Hoepman, Jaap-Henk; Hof, Christian van 't; van Kranenburg, Rob; Smits, David; Wisman, Tijmen

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the ...

  15. 75 FR 13575 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-03-22

    ..., proposes to modify the Accounting Systems for the Department of Justice, Justice/DOJ-001, to update the... the system description is set forth below. FOR FURTHER INFORMATION CONTACT: Robin Moss, Privacy... NAME: Accounting Systems for the Department of Justice (DOJ). * * * * * RECORD SOURCE CATEGORIES...

  16. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    Science.gov (United States)

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  17. Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR System

    Directory of Open Access Journals (Sweden)

    G. Nouskalis

    2011-01-01

    Full Text Available The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of “war” against the so-called unlawful combatants of the “enemy”. Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, “ECHR”. According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  18. The Digital, the Virtual and the Naming of Knowledge

    Directory of Open Access Journals (Sweden)

    Darren Jorgensen

    2007-01-01

    Full Text Available Amidst changing regimes of disciplinarity, the digital has become a term used to delineate a mode of knowledge and educational methodology. Its currency comes from the technologies that share its name, yet the territory that it marks is much greater than this, referring to the cultural, economic and social. The digital is too proximate to the technological to adequately account for this territory. Instead, I argue for radical interventions in the naming of knowledge in order to defamiliarise the digital. Different accounts of the virtual by Pierre Lévy, Katherine Hayles and David Summers suggest that this term establishes a greater range of enquiry and contestation. The virtual is but one alternative to the digital as a means by which new disciplines, methodologies and pedagogies might be constituted.

  19. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  20. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  1. Morgellons: contested illness, diagnostic compromise and medicalisation.

    Science.gov (United States)

    Fair, Brian

    2010-05-01

    The case of Morgellons illustrates how the emergence of a new medically contested illness intersected with and impacted on the diagnostic processes of an existing uncontested psychiatric condition, Delusional Parasitosis (DP). More specifically, the sociopolitical processes at play in the contested illness, Morgellons, dubiously reflect patient empowerment, as well the resilience and power of medical jurisdiction. This research offers insights into the contested illness and medicalisation literatures, and aims to bridge these two approaches towards the relationship between patient empowerment and medical authority, which I do through the notion of doctor-patient compromise. The data for this research come from a comprehensive qualitative analysis of Morgellons discourse through four key sources: the pro-Morgellons website Morgellons.org; the anti-Morgellons website Morgellonswatch.com; the popular media's portrayal of Morgellons; and the DP and Morgellons articles published in peer-reviewed medical journals, as made available on PubMed.

  2. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  3. Privacy Policy

    Science.gov (United States)

    ... Home → NLM Privacy Policy URL of this page: https://medlineplus.gov/privacy.html NLM Privacy Policy To ... out of cookies in the most popular browsers, http://www.usa.gov/optout_instructions.shtml. Please note ...

  4. Means of Evidence and Evidence Collection in Contested Procedure in Kosovo

    Directory of Open Access Journals (Sweden)

    Mr.Sc. Makfirete Krasniqi

    2015-12-01

    Full Text Available The purpose of this paper is to serve as a helpful tool for students, jurists, lawyers, judges and others, in the profesional and scientific aspect. In ruling a contested procedure in a professional manner, the court has to find the truth, so that the contested procedure is most efficient until reaching the final verdict. In my research, I intend to enrich the science with my knowledge in the field of contested procedure. In this study I have used analytical, comparative, synthesis, generalization and other methods. Those reading this paper will understand how evidence is the most important part in a fair trial, since failure to prove claims very often leads towards an incorrect situation; they will understand how difficult and painful would be forfeiting rights for the litigating party, which would lead to serious changes, such as losing property, losing a job, compensation of personal income, compensation for damage caused. The paper in itself contains deposited evidence, which maintain the level of estimation from the court in order to make a judgment in a contested procedure with a court verdict. In this paper I present the subject of: “Means of evidence and evidence collection in contested procedure”, where I have tried to research the theory but also the practice in contested proceedings, addressing the positive aspects, the deficiencies and novelties. In the legal provisions of the Law on Contested Procedure of theRepublicofKosovo, no. 03/L-006, of 30 June 2008, and Law no. 04/L-118, of 13 September 2012, on amendments to the Law on Contested Procedure, evidentiary means and evidence collection are included in chapter XXII.

  5. Winning the young men over through a contest.

    Science.gov (United States)

    Kweeken, F A

    1987-11-01

    5 years ago, the Family Planning Association of Liberia (FPAL) was perturbed by the very minimal youth participation in its programs. Male participation was also at its lowest. The president of the Association then hit upon an innovative idea: a Gentleman of the Year contest. The contestants are selected on the basis of the following criteria: they must be between the ages of 21 and 30 years, at least high school graduates, sportsmen, and possessed of good character and good health. They should also have some knowledge of family planning. The contestants appear before the judges 5 times. For their 1st appearance they don sportswear; for their 2nd, African attire; and for the 5th, a business suit. During their 3rd and 4th appearances they display a talent and go through an interview. As a result of the contest, the FPAL can now boast a viable National Youth Department. The FPAL considers the National Youth Department its most valuable program. A budgetary allocation for it has been included in the Association's 3 year plan to enable the Department to function even more effectively. Plans are also being made for a youth seminar.

  6. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  7. Most Physically Educated Contest

    Science.gov (United States)

    Mercier, Kevin; Howard, Thomas

    2018-01-01

    It is seldom that the accomplishments of secondary physical education students are celebrated. The Most Physically Educated Contest was developed to allow students from several school districts to gather for appropriate competition and to display the characteristics of physical literacy attained from participation in high-quality physical…

  8. 78 FR 45913 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-07-30

    ... at http://dpclo.defense.gov/privacy/SORNs/component/nsa/index.html . The proposed system report, as... Register Liaison Officer, Department of Defense. GNSA 14 System Name: NSA/CSS Library Patron File Control....'' Categories of individuals covered by the system: Delete entry and replace with ``NSA civilian employees...

  9. A Contest-Oriented Project for Learning Intelligent Mobile Robots

    Science.gov (United States)

    Huang, Hsin-Hsiung; Su, Juing-Huei; Lee, Chyi-Shyong

    2013-01-01

    A contest-oriented project for undergraduate students to learn implementation skills and theories related to intelligent mobile robots is presented in this paper. The project, related to Micromouse, Robotrace (Robotrace is the title of Taiwanese and Japanese robot races), and line-maze contests was developed by the embedded control system research…

  10. The Intra-Industry Effects of Proxy Contests

    OpenAIRE

    Fang Chen; Jian Huang; Han Yu

    2018-01-01

    This paper is the first study on the intra-industry effects of proxy contests. Using a sample of proxy contests from January 1988 through December 2008, we identify a striking cross-sectional difference in market reaction to the target companies. As much as 61% of the target firms have a significant positive cumulative abnormal return (CARs) in the period (‒10, +10) around the announcement day, while 39% of the target firms have the negative CARs in the same event window. Moreover, we find th...

  11. 76 FR 18145 - Privacy Act of 1974; New System of Records

    Science.gov (United States)

    2011-04-01

    ... to include final determinations; billing information to include payment delinquencies; case notes... delinquencies; and case notes. Information collected includes the individual's name, address, telephone number... outside USDA, and so have some impact on privacy of individuals, they are either necessary for carrying...

  12. “Terrorists or tags”? Contested identities in media portrayal of ...

    African Journals Online (AJOL)

    Contested identities in media portrayal of militants in Nigeria. ... that have been highly contested, along political, social and religious lines. ... This approach to CDA tends to link text analysis of news stories to media production processes and ...

  13. Privacy Policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy; Petkovic, M.; Jonker, W.; Jonker, Willem

    2007-01-01

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  14. 29 CFR 2700.21 - Effect of filing notice of contest of citation or order.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Effect of filing notice of contest of citation or order... REVIEW COMMISSION PROCEDURAL RULES Contests of Citations and Orders § 2700.21 Effect of filing notice of contest of citation or order. (a) The filing of a notice of contest of a citation or order issued under...

  15. Privacy policies

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, S.; Hartog, den J.I.; Petkovic, M.; Jonker, W.

    2007-01-01

    Privacy is a prime concern in today’s information society. To protect the privacy of individuals, enterprises must follow certain privacy practices while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website, processes

  16. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  17. Genetic privacy.

    Science.gov (United States)

    Sankar, Pamela

    2003-01-01

    During the past 10 years, the number of genetic tests performed more than tripled, and public concern about genetic privacy emerged. The majority of states and the U.S. government have passed regulations protecting genetic information. However, research has shown that concerns about genetic privacy are disproportionate to known instances of information misuse. Beliefs in genetic determinacy explain some of the heightened concern about genetic privacy. Discussion of the debate over genetic testing within families illustrates the most recent response to genetic privacy concerns.

  18. Multi-Agent Programming Contest 2011 - The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Ettienne, Mikko Berggren; Vester, Steen

    We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest.......We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest....

  19. Multi-Agent Programming Contest 2012 - The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Jensen, Andreas Schmidt; Ettienne, Mikko Berggren

    We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest.......We provide a brief description of the Python-DTU system, including the overall design, the tools and the algorithms that we plan to use in the agent contest....

  20. Animal personality as a cause and consequence of contest behaviour.

    Science.gov (United States)

    Briffa, Mark; Sneddon, Lynne U; Wilson, Alastair J

    2015-03-01

    We review the evidence for a link between consistent among-individual variation in behaviour (animal personality) and the ability to win contests over limited resources. Explorative and bold behaviours often covary with contest behaviour and outcome, although there is evidence that the structure of these 'behavioural syndromes' can change across situations. Aggression itself is typically repeatable, but also subject to high within-individual variation as a consequence of plastic responses to previous fight outcomes and opponent traits. Common proximate mechanisms (gene expression, endocrine control and metabolic rates) may underpin variation in both contest behaviour and general personality traits. Given the theoretical links between the evolution of fighting and of personality, we suggest that longitudinal studies of contest behaviour, combining behavioural and physiological data, would be a useful context for the study of animal personalities. © 2015 The Author(s) Published by the Royal Society. All rights reserved.

  1. Case study: Natural bodybuilding contest preparation.

    Science.gov (United States)

    Kistler, Brandon M; Fitschen, Peter J; Ranadive, Sushant M; Fernhall, Bo; Wilund, Kenneth R

    2014-12-01

    The purpose of this study was to document the physiological changes that occur in a natural bodybuilder during prolonged contest preparation for a proqualifying contest. During the 26-week preparation, the athlete undertook a calorically restrictive diet with 2 days of elevated carbohydrate intake per week, increased cardiovascular (CV) training, and attempted to maintain resistance-training load. The athlete was weighed twice a week and body composition was measured monthly by DXA. At baseline and every 2 weeks following CV structure and function was measured using a combination of ultrasound, applanation tonometry, and heart rate variability (HRV). Cardiorespiratory performance was measured by VO(2)peak at baseline, 13 weeks, and 26 weeks. Body weight (88.6 to 73.3 Kg, R(2) = .99) and percent body fat (17.5 to 7.4%) were reduced during preparation. CV measurements including blood pressure (128/61 to 113/54 mmHg), brachial pulse wave velocity (7.9 to 5.8m/s), and measures of wave reflection all improved. Indexed cardiac output was reduced (2.5 to 1.8L/m(2)) primarily due to a reduction in resting heart rate (71 to 44 bpm), and despite an increase in ejection faction (57.9 to 63.9%). Assessment of HRV found a shift in the ratio of low to high frequency (209.2 to 30.9%). Absolute VO2 was minimally reduced despite weight loss resulting in an increase in relative VO2 (41.9 to 47.7 ml/Kg). In general, this prolonged contest preparation technique helped the athlete to improve body composition and resulted in positive CV changes, suggesting that this method of contest preparation appears to be effective in natural male bodybuilders.

  2. 75 FR 47797 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-09

    ... Officer, Department of Defense. Deletion: S330.40 CAHS System name: Employee Assistance Program Records (August 27, 1999; 64 FR 46889). Reason: This collection is covered under the existing DHHS/FOH EAP Privacy notice 09-90-0010, entitled ``Employee Assistance Program (EAP) Records, HHS/OS/ASAM/OHR.'' [FR Doc. 2010...

  3. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  4. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    Science.gov (United States)

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  5. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  6. The Effect of Peer Pressure on Performance in Crowdsourcing Contests

    DEFF Research Database (Denmark)

    Heite, Jonas; Hoisl, Karin

    We investigate whether and why performance differences exist between contestants with the same abilities but who compete against more skilled or less skilled contestants. We analyze 1,677 unique coders competing in 38 software algorithm competitions with random assignment. Part of these coders co...

  7. HIV cure research community engagement in North Carolina: a mixed-methods evaluation of a crowdsourcing contest.

    Science.gov (United States)

    Mathews, Allison; Farley, Samantha; Blumberg, Meredith; Knight, Kimberley; Hightow-Weidman, Lisa; Muessig, Kate; Rennie, Stuart; Tucker, Joseph

    2017-10-01

    The purpose of this study was to evaluate the feasibility of using a crowdsourcing contest to promote HIV cure research community engagement. Crowdsourcing contests are open calls for community participation to achieve a task, in this case to engage local communities about HIV cure research. Our contest solicited images and videos of what HIV cure meant to people. Contestants submitted entries to IdeaScale, an encrypted online contest platform. We used a mixed-methods study design to evaluate the contest. Engagement was assessed through attendance at promotional events and social media user analytics. Google Analytics measured contest website user-engagement statistics. Text from contest video entries was transcribed, coded and analysed using MAXQDA. There were 144 attendees at three promotional events and 32 entries from 39 contestants. Most individuals who submitted entries were black ( n =31), had some college education ( n =18) and were aged 18-23 years ( n =23). Social media analytics showed 684 unique page followers, 2233 unique page visits, 585 unique video views and an overall reach of 80,624 unique users. Contest submissions covered themes related to the community's role in shaping the future of HIV cure through education, social justice, creativity and stigma reduction. Crowdsourcing contests are feasible for engaging community members in HIV cure research. Community contributions to crowdsourcing contests provide useful content for culturally relevant and locally responsive research engagement.

  8. Some Core Contested Concepts

    Science.gov (United States)

    Chomsky, Noam

    2015-01-01

    Core concepts of language are highly contested. In some cases this is legitimate: real empirical and conceptual issues arise. In other cases, it seems that controversies are based on misunderstanding. A number of crucial cases are reviewed, and an approach to language is outlined that appears to have strong conceptual and empirical motivation, and…

  9. Multi-Agent Programming Contest 2016 – The Python-DTU Team

    DEFF Research Database (Denmark)

    Villadsen, Jørgen; Halkjær From, Andreas; Jacobi, Salvador

    2018-01-01

    We provide a detailed description of the Python-DTU system, including the overall system design and the tools used in the agent contest.......We provide a detailed description of the Python-DTU system, including the overall system design and the tools used in the agent contest....

  10. Online videos to promote sun safety: results of a contest

    Directory of Open Access Journals (Sweden)

    Annelise Lorelei Dawson

    2011-06-01

    Full Text Available Seventy-percent of Americans search health information online, half of whom access medical content on social media websites.  In spite of this broad usage, the medical community underutilizes social media to distribute preventive health information.  This project aimed to highlight the promise of social media for delivering skin cancer prevention messaging by hosting and quantifying the impact of an online video contest. In 2010 and 2011, we solicited video submissions and searched existing YouTube videos.  Three finalists were selected and ranked. Winners were announced at national dermatology meetings and publicized via a contest website. Afterwards, YouTube view counts were monitored.  No increase in video viewing frequency was observed following the 2010 or 2011 contest.  This contest successfully identified exemplary online sun safety videos; however, increased viewership remains to be seen.  Social media offers a promising outlet for preventive health messaging. Future efforts must explore strategies for enhancing viewership of online content.

  11. Stress and strategic decision-making in the beauty contest game.

    Science.gov (United States)

    Leder, Johannes; Häusser, Jan Alexander; Mojzisch, Andreas

    2013-09-01

    Often, economic decisions do not only depend on one's own preferences, but also on the choices of others and therefore require strategizing (i.e., thinking about what others might think). In experimental economics, this has been modeled by the beauty contest game. Another typical feature of economic decisions is that they are often carried out under stress. Therefore, in the present study, we aimed to examine the influence of stress on decision-making in the beauty contest game. Participants were randomly assigned to either the Trier Social Stress Test for Groups (TSST-G) or a placebo version of the TSST-G (control condition). Then, participants played four rounds of a standard beauty contest game. As a biomarker of stress, salivary cortisol was measured. As predicted, participants under stress chose higher numbers in the beauty contest game than non-stressed participants, indicating less strategizing. This effect was mediated by the stress-induced increase in cortisol. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. 78 FR 41920 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Civil Liberties Office Web site at http://dpclo.defense.gov/privacy/SORNs/component/army/index.html... systems of records notices. Individual should provide full name, SSN and/or DoD ID number and military... penalty of perjury under the laws of the United States of America that the foregoing is true and correct...

  13. Holiday Door Decorating Contest Brings Cheer | Poster

    Science.gov (United States)

    By Carolynne Keenan, Contributing Writer Other than the time of year, what do the following have in common: the leg lamp from the movie “A Christmas Story,” a compilation of silly holiday jokes, a gingerbread house, and Santa on a motorcycle? All four were among the individual door winners for the Holiday Door Decorating Contest, held at NCI at Frederick in December. Employees dressed up their office doors, hallways, and even stairwells to participate. Entries for the contest included individual office doors as well as groups. Some employees even “decked the halls” of whole office buildings to participate.

  14. Contests with rank-order spillovers

    NARCIS (Netherlands)

    M.R. Baye (Michael); D. Kovenock (Dan); C.G. de Vries (Casper)

    2012-01-01

    textabstractThis paper presents a unified framework for characterizing symmetric equilibrium in simultaneous move, two-player, rank-order contests with complete information, in which each player's strategy generates direct or indirect affine "spillover" effects that depend on the rank-order of her

  15. Contesting danger

    DEFF Research Database (Denmark)

    Heathershaw, John; Megoran, Nick

    2011-01-01

    and subsequent considerations of the region in terms of the war on terror. It considers several examples of this discourse of danger including the popular US TV drama about presidential politics, The West Wing, the policy texts of ‘Washingtonian security analysis’ and accounts of danger, insecurity and urban...... of danger is contested within the region. The example of urban violence in Osh, Kyrgyzstan and Jalalabad, Afghanistan in 2010 demonstrates how opportunities to mitigate conflict may have been lost due to the distortions of this discourse of danger. It concludes by raising the challenge to policy...

  16. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... DEPARTMENT OF AGRICULTURE Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records... two Privacy Act Systems of Records entitled ``Information on Persons Disqualified from the...

  17. Using Soil and Water Conservation Contests for Extension: Experiences from the Bolivian Mountain Valleys

    NARCIS (Netherlands)

    Kessler, A.; Graaff, de J.

    2007-01-01

    Soil and water conservation (SWC) contests among farmer groups were organized in five rural villages in the Bolivian mountain valleys. The contests were aimed at quickly achieving widespread sustainable results. This article analyzes the effectiveness of these contests as an extension tool. Mixed

  18. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Each Federal agency is required by the Privacy Act of 1974 to publish...

  19. 78 FR 77503 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-23

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-149] Privacy Act of 1974; Privacy Act... proposed revisions to existing Privacy Act systems of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  20. Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency

    Science.gov (United States)

    Mohaisen, Abedelaziz; Jho, Nam-Su; Hong, Dowon; Nyang, Daehun

    Privacy preserving association rule mining algorithms have been designed for discovering the relations between variables in data while maintaining the data privacy. In this article we revise one of the recently introduced schemes for association rule mining using fake transactions (FS). In particular, our analysis shows that the FS scheme has exhaustive storage and high computation requirements for guaranteeing a reasonable level of privacy. We introduce a realistic definition of privacy that benefits from the average case privacy and motivates the study of a weakness in the structure of FS by fake transactions filtering. In order to overcome this problem, we improve the FS scheme by presenting a hybrid scheme that considers both privacy and resources as two concurrent guidelines. Analytical and empirical results show the efficiency and applicability of our proposed scheme.

  1. Wisdom of the Crowds: Crowd-Based Development of a Logo for a Conference Using a Crowdsourcing Contest.

    Science.gov (United States)

    Ong, Jason J; Bilardi, Jade E; Tucker, Joseph D

    2017-10-01

    Crowdsourcing methods have been widely used in business, but rarely in sexual health research. We evaluated a crowdsourced logo contest as part of an international human immunodeficiency virus conference. A logo crowdsourcing contest was conducted for the 20th International Acquired Immunodeficiency Syndrome Conference. Crowdsourcing has a group of individuals solve a task, often as part of an open contest. Semistructured interviews were conducted with key informants including contest organizers, contest contributors, and conference attendees. Interviews were transcribed verbatim and analysed using a content analysis approach. In total, 22 interviews were conducted with 3 contest organizers, 7 contest contributors, and 12 conference attendees. All individuals reported that the crowdsourced logo provided benefits beyond branding the conference, including creating a shared sense of purpose among diverse conference participants and explicitly demonstrating the strong community orientation of the conference. Conference organizers and attendees all reported deeper engagement because of the story of the Tanzanian artist who won the contest. Most conference attendees (11/12) preferred the crowdsourced logo compared with the previous company-organized logo, and all (22/22) supported the logo contest continuing. Implementing a logo contest was simple and relatively inexpensive. Stakeholders identified several ways to enhance crowdsourcing logo contest methods including wider promotion of the contest to encourage broader participation, greater transparency in the selection process, and a different prize structure which acknowledges the contribution of more contestants. We found that a crowdsourcing contest helped engage local and global communities in the lead-up before and during an international conference. Similar participatory events may be useful for sexual health conferences and research projects.

  2. Learning Reproducibility with a Yearly Networking Contest

    KAUST Repository

    Canini, Marco

    2017-08-10

    Better reproducibility of networking research results is currently a major goal that the academic community is striving towards. This position paper makes the case that improving the extent and pervasiveness of reproducible research can be greatly fostered by organizing a yearly international contest. We argue that holding a contest undertaken by a plurality of students will have benefits that are two-fold. First, it will promote hands-on learning of skills that are helpful in producing artifacts at the replicable-research level. Second, it will advance the best practices regarding environments, testbeds, and tools that will aid the tasks of reproducibility evaluation committees by and large.

  3. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  4. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-093)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  5. 77 FR 69898 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2012-11-21

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 12-100] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  6. Privacy and Innovation

    OpenAIRE

    Avi Goldfarb; Catherine Tucker

    2011-01-01

    Information and communication technology now enables firms to collect detailed and potentially intrusive data about their customers both easily and cheaply. This means that privacy concerns are no longer limited to government surveillance and public figures' private lives. The empirical literature on privacy regulation shows that privacy regulation may affect the extent and direction of data-based innovation. We also show that the impact of privacy regulation can be extremely heterogeneous. T...

  7. Reversing the AAPT Photo Contest: A Physics Teacher Education Activity

    Science.gov (United States)

    Hechter, Richard P.

    2016-01-01

    This year while awaiting the arrival of the AAPT High School Physics Photo Contest poster, I developed an idea for my physics teacher education course that used the photo contest in a new context. While using an external source like a photograph to learn physics is not new to physics education, this article describes how we used the foundational…

  8. Dark Side or Bright Light: Destructive and Constructive Deviant Content in Consumer Ideation Contests

    NARCIS (Netherlands)

    Gatzweiler, A.; Blazevic, V.; Piller, F.T.

    2017-01-01

    Firms use ideation contests to generate ideas from consumers. This type of collaboration provides access to new knowledge and reveals latent consumer needs. But it also is risky, as firms give up control to an unknown crowd. Some contestants use ideation contests to post content that is unintended

  9. Analysis of karate injuries sustained in 295 contests.

    Science.gov (United States)

    McLatchie, G R

    1976-11-01

    The injuries sustained in 295 karate contests were analysed. It was noted that in 25 per cent of the contests there was some sort of injury, and in 10 per cent the injury was severe enough to cause the withdrawal of the participant. Injury seemed to occur most commonly among lower-grade participants and more often in the first hour of each day's competition. Protective padding of the arms, legs, feet and hands, and the use of gumshields and protective boxes appeared to reduce the incidence and severity of injury.

  10. Introduction : Global Cultures of Contestation

    NARCIS (Netherlands)

    Peeren, E.; Celikates, R.; de Kloet, J.; Poell, T.; Peeren, E.; Celikates, R.; de Kloet, J.; Poell, T.

    2018-01-01

    From the popular uprisings in North Africa and the Middle East in early 2011, via the Spanish indignados and Occupy Wall Street to the Umbrella movement in Hong Kong, recent years have seen major instances of popular contestation across the world. Moving beyond positions that present a singularly

  11. UV-green iridescence predicts male quality during jumping spider contests.

    Science.gov (United States)

    Lim, Matthew L M; Li, Daiqin

    2013-01-01

    Animal colour signals used in intraspecies communications can generally be attributed to a composite effect of structural and pigmentary colours. Notably, the functional role of iridescent coloration that is 'purely' structural (i.e., absence of pigments) is poorly understood. Recent studies reveal that iridescent colorations can reliably indicate individual quality, but evidence of iridescence as a pure structural coloration indicative of male quality during contests and relating to an individual's resource-holding potential (RHP) is lacking. In age- and size-controlled pairwise male-male contests that escalate from visual displays of aggression to more costly physical fights, we demonstrate that the ultraviolet-green iridescence of Cosmophasis umbratica predicts individual persistence and relates to RHP. Contest initiating males exhibited significantly narrower carapace band separation (i.e., relative spectral positions of UV and green hues) than non-initiators. Asymmetries in carapace and abdomen brightness influenced overall contest duration and escalation. As losers retreated upon having reached their own persistence limits in contests that escalated to physical fights, losers with narrower carapace band separation were significantly more persistence. We propose that the carapace UV-green iridescence of C. umbratica predicts individual persistence and is indicative of a male's RHP. As the observed UV-green hues of C. umbratica are 'pure' optical products of a multilayer reflector system, we suggest that intrasexual variations in the optical properties of the scales' chitin-air-chitin microstructures are responsible for the observed differences in carapace band separations.

  12. UV-green iridescence predicts male quality during jumping spider contests.

    Directory of Open Access Journals (Sweden)

    Matthew L M Lim

    Full Text Available Animal colour signals used in intraspecies communications can generally be attributed to a composite effect of structural and pigmentary colours. Notably, the functional role of iridescent coloration that is 'purely' structural (i.e., absence of pigments is poorly understood. Recent studies reveal that iridescent colorations can reliably indicate individual quality, but evidence of iridescence as a pure structural coloration indicative of male quality during contests and relating to an individual's resource-holding potential (RHP is lacking. In age- and size-controlled pairwise male-male contests that escalate from visual displays of aggression to more costly physical fights, we demonstrate that the ultraviolet-green iridescence of Cosmophasis umbratica predicts individual persistence and relates to RHP. Contest initiating males exhibited significantly narrower carapace band separation (i.e., relative spectral positions of UV and green hues than non-initiators. Asymmetries in carapace and abdomen brightness influenced overall contest duration and escalation. As losers retreated upon having reached their own persistence limits in contests that escalated to physical fights, losers with narrower carapace band separation were significantly more persistence. We propose that the carapace UV-green iridescence of C. umbratica predicts individual persistence and is indicative of a male's RHP. As the observed UV-green hues of C. umbratica are 'pure' optical products of a multilayer reflector system, we suggest that intrasexual variations in the optical properties of the scales' chitin-air-chitin microstructures are responsible for the observed differences in carapace band separations.

  13. Optical Interference Coatings Design Contest 2007: triple bandpass filter and nonpolarizing beam splitter.

    Science.gov (United States)

    Tilsch, Markus; Hendrix, Karen

    2008-05-01

    A triple bandpass filter (28 solutions received) and a nonpolarizing beam splitter (23 solutions received) were the subjects of the design contest held in conjunction with the 2007 Optical Interference Coatings topical meeting of the Optical Society of America. Fifteen designers participated using a wide spectrum of design approaches and optimization strategies to create the submissions. The results differ significantly, but all meet the contest requirements. Fabien Lemarchand wins both contests by submitting the thinnest (6254 nm) triple bandpass design and the widest (61.7 nm) nonpolarizing beam-splitter design. Michael Trubetskov is in second place, followed by Vladimir Pervak in both contests. The submitted designs are described and evaluated.

  14. Privacy and confidentiality: perspectives of mental health consumers and carers in pharmacy settings.

    Science.gov (United States)

    Hattingh, Hendrika Laetitia; Knox, Kathy; Fejzic, Jasmina; McConnell, Denise; Fowler, Jane L; Mey, Amary; Kelly, Fiona; Wheeler, Amanda J

    2015-02-01

    The study aims to explore within the community pharmacy practice context the views of mental health stakeholders on: (1) current and past experiences of privacy, confidentiality and support; and (2) expectations and needs in relation to privacy and confidentiality. In-depth interviews and focus groups were conducted in three states in Australia, namely Queensland, the northern region of New South Wales and Western Australia, between December 2011 and March 2012. There were 98 participants consisting of consumers and carers (n = 74), health professionals (n = 13) and representatives from consumer organisations (n = 11). Participants highlighted a need for improved staff awareness. Consumers indicated a desire to receive information in a way that respects their privacy and confidentiality, in an appropriate space. Areas identified that require improved protection of privacy and confidentiality during pharmacy interactions were the number of staff having access to sensitive information, workflow models causing information exposure and pharmacies' layout not facilitating private discussions. Challenges experienced by carers created feelings of isolation which could impact on care. This study explored mental health stakeholders' experiences and expectations regarding privacy and confidentiality in the Australian community pharmacy context. A need for better pharmacy staff training about the importance of privacy and confidentiality and strategies to enhance compliance with national pharmacy practice requirements was identified. Findings provided insight into privacy and confidentiality needs and will assist in the development of pharmacy staff training material to better support consumers with sensitive conditions. © 2014 Royal Pharmaceutical Society.

  15. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  16. 75 FR 65457 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-25

    ... number.'' CONTESTING RECORD PROCEDURES: Delete entry and replace with ``The NSA/CSS rules for contesting...' published at the beginning of the NSA/CSS's compilation of record systems also apply to this record system... number. CONTESTING RECORD PROCEDURES: The NSA/CSS rules for contesting contents and appealing initial...

  17. Winner of video contest inspired by the LHC

    CERN Multimedia

    Laëtitia Pedroso

    2010-01-01

    A video contest was launched this year to mark the 10th anniversary of the Frederick Phineas and Sandra Priest Rose Centre for Earth and Space. Luke Cahill, a 27 year-old BFA graduate, has just won the contest with a movie about CERN.   Luke, who works in the film industry in Los Angeles and also takes physics classes, came across a video promoting the contest while he was browsing the American Natural History Museum website. "It seemed like a perfect opportunity to combine my passion for science with my craft of filmmaking", says Luke. Luke decided to make a video about the LHC. To him, CERN embodies the ideals of scientific progress and discovery, continually expanding the boundaries of our knowledge. "I have never actually been to CERN but it's high on the list of places I want to visit when I travel to Europe", says Luke. There is a lot of misleading information on the Internet about CERN – especially about the LHC. Luke wanted to clarify what the ...

  18. An Analysis of the Influence of Graph Theory When Preparing for Programming Contests

    Directory of Open Access Journals (Sweden)

    Cristina Jordán

    2017-01-01

    Full Text Available The subject known as Programming Contests in the Bachelor’s Degree in Computer Engineering course focuses on solving programming problems frequently met within contests such as the Southwest Europe Regional Contest (SWERC. In order to solve these problems one first needs to model the problem correctly, find the ideal solution, and then be able to program it without making any mistakes in a very short period of time. Leading multinationals such as Google, Apple, IBM, Facebook and Microsoft place a very high value on these abilities when selecting candidates for posts in their companies. In this communication we present some preliminary results of an analysis of the interaction between two optional subjects in the Computer Science Degree course: Programming Contests (PC and Graphs, Models and Applications (GMA. The results of this analysis enabled us to make changes to some of the contents in GMA in order to better prepare the students to deal with the challenges they have to face in programming contests.

  19. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-091)] Privacy Act of 1974; Privacy Act...: Revisions of NASA Appendices to Privacy Act System of Records. SUMMARY: Notice is hereby given that NASA is... Privacy Act of 1974. This notice publishes those amendments as set forth below under the caption...

  20. Financing bidders in takeover contests

    NARCIS (Netherlands)

    Vladimirov, V.

    2012-01-01

    The paper studies a takeover contests, in which cash-constrained bidders decide on the optimal way to finance their cash bid. For both bidders and the seller this decision is at least as important as deciding on whether the payment should be in cash or in securities. The main result is that the

  1. Ethical Concerns of and Risk Mitigation Strategies for Crowdsourcing Contests and Innovation Challenges: Scoping Review

    Science.gov (United States)

    Pan, Stephen W; Mathews, Allison; Stein, Gabriella; Bayus, Barry; Rennie, Stuart

    2018-01-01

    Background Crowdsourcing contests (also called innovation challenges, innovation contests, and inducement prize contests) can be used to solicit multisectoral feedback on health programs and design public health campaigns. They consist of organizing a steering committee, soliciting contributions, engaging the community, judging contributions, recognizing a subset of contributors, and sharing with the community. Objective This scoping review describes crowdsourcing contests by stage, examines ethical problems at each stage, and proposes potential ways of mitigating risk. Methods Our analysis was anchored in the specific example of a crowdsourcing contest that our team organized to solicit videos promoting condom use in China. The purpose of this contest was to create compelling 1-min videos to promote condom use. We used a scoping review to examine the existing ethical literature on crowdsourcing to help identify and frame ethical concerns at each stage. Results Crowdsourcing has a group of individuals solve a problem and then share the solution with the public. Crowdsourcing contests provide an opportunity for community engagement at each stage: organizing, soliciting, promoting, judging, recognizing, and sharing. Crowdsourcing poses several ethical concerns: organizing—potential for excluding community voices; soliciting—potential for overly narrow participation; promoting—potential for divulging confidential information; judging—potential for biased evaluation; recognizing—potential for insufficient recognition of the finalist; and sharing—potential for the solution to not be implemented or widely disseminated. Conclusions Crowdsourcing contests can be effective and engaging public health tools but also introduce potential ethical problems. We present methods for the responsible conduct of crowdsourcing contests. PMID:29523500

  2. Some core contested concepts.

    Science.gov (United States)

    Chomsky, Noam

    2015-02-01

    Core concepts of language are highly contested. In some cases this is legitimate: real empirical and conceptual issues arise. In other cases, it seems that controversies are based on misunderstanding. A number of crucial cases are reviewed, and an approach to language is outlined that appears to have strong conceptual and empirical motivation, and to lead to conclusions about a number of significant issues that differ from some conventional beliefs.

  3. The NASA Tournament Laboratory (NTL): Improving Data Access at PDS while Spreading Joy and Engaging Students through 16 Micro-Contests

    Science.gov (United States)

    LaMora, Andy; Raugh, A.; Erickson, K.; Grayzeck, E. J.; Knopf, W.; Morgan, T. H.

    2012-01-01

    NASA PDS hosts terabytes of valuable data from hundreds of data sources and spans decades of research. Data is stored on flat-file systems regulated through careful meta dictionaries. PDS's data is available to the public through its website which supports data searches through drill-down navigation. While the system returns data quickly, result sets in response to identical input differ depending on the drill-down path a user follows. To correct this Issue, to allow custom searching, and to improve general accessibility, PDS sought to create a new data structure and API, and to use them to build applications that are a joy to use and showcase the value of the data to students, teachers and citizens. PDS engaged TopCoder and Harvard Business School through the NTL to pursue these objectives in a pilot effort. Scope was limited to Small Bodies Node data. NTL analyzed data, proposed a solution, and implemented it through a series of micro-contests. Contest focused on different segments of the problem; conceptualization, architectural design, implementation, testing, etc. To demonstrate the utility of the completed solution, NTL developed web-based and mobile applications that can compare targets, regardless of mission. To further explore the potential of the solution NTL hosted "Mash-up" challenges that integrated the API with other publically available assets, to produce consumer and teaching applications, including an Augmented Reality iPad tool. Two contests were also posted to middle and high school students via the NoNameSite.com platform, and as a result of these contests, PDS/SBN has initiated a Facebook program. These contests defined and implemented a data warehouse with the necessary migration tools to transform legacy data, produced a public web interface for the new search, developed a public API, and produced four mobile applications that we expect to appeal to users both within and, without the academic community.

  4. Holiday Decorating Contest - A Way to Meet Fellow Employees | Poster

    Science.gov (United States)

    The trolls from “Frozen,” a North Pole tunnel, and a Christmas tree­–shaped periodic table of elements were just a few of the decorations on display during the second annual Holiday Decorating Contest in December. The contest, sponsored by the R&W Club Frederick, awarded prizes to three groups and two individuals whose decorations were judged based on visual impact,

  5. Observatory Sponsoring Astronomical Image Contest

    Science.gov (United States)

    2005-05-01

    Forget the headphones you saw in the Warner Brothers thriller Contact, as well as the guttural throbs emanating from loudspeakers at the Very Large Array in that 1997 movie. In real life, radio telescopes aren't used for "listening" to anything - just like visible-light telescopes, they are used primarily to make images of astronomical objects. Now, the National Radio Astronomy Observatory (NRAO) wants to encourage astronomers to use radio-telescope data to make truly compelling images, and is offering cash prizes to winners of a new image contest. Radio Galaxy Fornax A Radio Galaxy Fornax A Radio-optical composite image of giant elliptical galaxy NGC 1316, showing the galaxy (center), a smaller companion galaxy being cannibalized by NGC 1316, and the resulting "lobes" (orange) of radio emission caused by jets of particles spewed from the core of the giant galaxy Click on image for more detail and images CREDIT: Fomalont et al., NRAO/AUI/NSF "Astronomy is a very visual science, and our radio telescopes are capable of producing excellent images. We're sponsoring this contest to encourage astronomers to make the extra effort to turn good images into truly spectacular ones," said NRAO Director Fred K.Y. Lo. The contest, offering a grand prize of $1,000, was announced at the American Astronomical Society's meeting in Minneapolis, Minnesota. The image contest is part of a broader NRAO effort to make radio astronomical data and images easily accessible and widely available to scientists, students, teachers, the general public, news media and science-education professionals. That effort includes an expanded image gallery on the observatory's Web site. "We're not only adding new radio-astronomy images to our online gallery, but we're also improving the organization and accessibility of the images," said Mark Adams, head of education and public outreach (EPO) at NRAO. "Our long-term goal is to make the NRAO Image Gallery an international resource for radio astronomy imagery

  6. 76 FR 31350 - Public Workshop; Privacy Compliance Basics and 2011 Developments

    Science.gov (United States)

    2011-05-31

    ... Privacy Act of 1974, as amended, the E-Government Act of 2002, Office of Management and Budget memoranda... telephone 703-235-0780; by facsimile 703-235-0442; or by e-mail at [email protected] . SUPPLEMENTARY INFORMATION... send an e-mail to [email protected] , with ``PRIVComplianceWorkshop'' in the subject line, and your full name...

  7. Hospital cannot be held liable for breach of patient's privacy.

    Science.gov (United States)

    1997-04-04

    The Minnesota Court of Appeals ruled that a law guaranteeing the confidentiality of a patient's medical records did not create a private cause of actions for damages when the patient's HIV was revealed. The plaintiff, known as [name removed], requested that his stepbrother not be told his HIV status. A relative gained access to his medical file while working at a medical center and disclosed [name removed]'s HIV status to his stepbrother. [name removed] sued the relative and the hospital. The district court ruled that he did not have a cause of action against the hospital and the Court of Appeals agreed. The State does not recognize claims for an invasion of privacy under the Minnesota Patients Bill of Rights.

  8. STUDY CONTESTING TAX RULES ON SOCIAL SECURITY CONTRIBUTIONS BY TAXPAYERS FROM ROMANIA

    Directory of Open Access Journals (Sweden)

    Adrian Doru BÎGIOI

    2015-07-01

    Full Text Available The management bodies of companies must know and correctly apply tax law. There are, however, the practical situations, when, although they want to respect this, taxpayers are penalized by the tax authorities, because it did not comply with tax obligations. There are many factors that can determine this, among which: circumvent tax rules in order to avoid paying taxes and incorrect application of law. In this study was approached the second factor, namely: analysis of the most common situations in which both taxpayers as well fiscal authorities erroneously apply tax law. To achieve these results, was developed a study regarding the determination degree of contesting the tax rules, in area of social security contributions. Data subject research was extracted in the database officially published by competent insitutions tax. The research was conducted for the period January 1, 2004 and until February 28, 2015. In terms of research methodology, were used both quantitative methods and qualitative methods. Finally, data were centralized by type of articles, they are sorted according to the extent of contestation obtained. The final conclusion is that imprecise definition of the terms tax is one of the main causes which determines incorrect application of tax law. The results can be used especially by the subjects of tax legal relationship, to avoid situations the tax law is applied incorrectly, aspects that may lead to negative situations, both companies and the state institutions.

  9. Mobile location-based advertising: how information privacy concerns influence consumers' attitude and acceptance

    NARCIS (Netherlands)

    Limpf, N.; Voorveld, H.A.M.

    2015-01-01

    This study investigates the effect of information privacy concerns on consumers' attitude toward and acceptance of mobile location-based advertising (LBA), and the moderating role of the type of mobile LBA, namely push versus pull. Using an online experiment (N = 224), it was found that consumers'

  10. The Wildlife Habitat Education Program: Moving from Contest Participation to Implementation

    Science.gov (United States)

    Allen, Kevin; Elmore, R. Dwayne; Harper, Craig

    2013-01-01

    Do members participating in the Wildlife Habitat Education Program (WHEP) apply knowledge gained by implementing wildlife management practices at the local level? 4-H members who participated in the National WHEP Contest from 2003-2005 and 2007-2011 completed an evaluation at the end of each contest. The evaluation asked participants if they…

  11. Trajectory data privacy protection based on differential privacy mechanism

    Science.gov (United States)

    Gu, Ke; Yang, Lihao; Liu, Yongzhi; Liao, Niandong

    2018-05-01

    In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user’s trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are selected from the accessing point database, then the algorithm calculates the polygon centroids; finally, the noises are added to the polygon centroids by the differential privacy method, and the polygon centroids replace the protected points, and then the algorithm constructs and issues the new trajectory data. The experiments show that the running time of the proposed algorithms is fast, the privacy protection of the scheme is effective and the data usability of the scheme is higher.

  12. 77 FR 65049 - Privacy Act; System of Records: Translator and Interpreter Records, State-37

    Science.gov (United States)

    2012-10-24

    ... DEPARTMENT OF STATE [Public Notice 8066] Privacy Act; System of Records: Translator and... an existing system of records, Translator and Interpreter Records, State-37, pursuant to the... INFORMATION: The Department of State proposes that the current system will retain the name ``Translator and...

  13. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  14. Understanding Fear of Opportunism in Global Prize-Based Science Contests: Evidence for Gender and Age Differences.

    Science.gov (United States)

    Acar, Oguz Ali; van den Ende, Jan

    2015-01-01

    Global prize-based science contests have great potential for tapping into diverse knowledge on a global scale and overcoming important scientific challenges. A necessary step for knowledge to be utilized in these contests is for that knowledge to be disclosed. Knowledge disclosure, however, is paradoxical in nature: in order for the value of knowledge to be assessed, inventors must disclose their knowledge, but then the person who receives that knowledge does so at no cost and may use it opportunistically. This risk of potential opportunistic behavior in turn makes the inventor fearful of disclosing knowledge, and this is a major psychological barrier to knowledge disclosure. In this project, we investigated this fear of opportunism in global prize-based science contests by surveying 630 contest participants in the InnoCentive online platform for science contests. We found that participants in these science contests experience fear of opportunism to varying degrees, and that women and older participants have significantly less fear of disclosing their scientific knowledge. Our findings highlight the importance of taking differences in such fears into account when designing global prize-based contests so that the potential of the contests for reaching solutions to important and challenging problems can be used more effectively.

  15. Understanding Fear of Opportunism in Global Prize-Based Science Contests: Evidence for Gender and Age Differences.

    Directory of Open Access Journals (Sweden)

    Oguz Ali Acar

    Full Text Available Global prize-based science contests have great potential for tapping into diverse knowledge on a global scale and overcoming important scientific challenges. A necessary step for knowledge to be utilized in these contests is for that knowledge to be disclosed. Knowledge disclosure, however, is paradoxical in nature: in order for the value of knowledge to be assessed, inventors must disclose their knowledge, but then the person who receives that knowledge does so at no cost and may use it opportunistically. This risk of potential opportunistic behavior in turn makes the inventor fearful of disclosing knowledge, and this is a major psychological barrier to knowledge disclosure. In this project, we investigated this fear of opportunism in global prize-based science contests by surveying 630 contest participants in the InnoCentive online platform for science contests. We found that participants in these science contests experience fear of opportunism to varying degrees, and that women and older participants have significantly less fear of disclosing their scientific knowledge. Our findings highlight the importance of taking differences in such fears into account when designing global prize-based contests so that the potential of the contests for reaching solutions to important and challenging problems can be used more effectively.

  16. A Privacy-Preserving NFC Mobile Pass for Transport Systems

    Directory of Open Access Journals (Sweden)

    Ghada Arfaoui

    2014-12-01

    Full Text Available The emergence of the NFC (Near Field Communication technology brings new capacities to the next generation of smartphones, but also new security and privacy challenges. Indeed through its contactless interactions with external entities, the smartphone of an individual will become an essential authentication tool for service providers such as transport operators. However, from the point of view of the user, carrying a part of the service through his smartphone could be a threat for his privacy. Indeed, an external attacker or the service provider himself could be tempted to track the actions of the user. In this paper, we propose a privacy-preserving contactless mobile service, in which a user’s identity cannot be linked to his actions when using the transport system. The security of our proposition relies on the combination of a secure element in the smartphone and on a privacy-enhancing cryptographic protocol based on a variant of group signatures. In addition, although a user should remain anonymous and his actions unlinkable in his daily journeys, we designed a technique for lifting his anonymity in extreme circumstances. In order to guarantee the usability of our solution, we implemented a prototype demonstrating that our solution meets the major functional requirements for real transport systems: namely that the mobile pass can be validated at a gate in less than 300 ms, and this even if the battery of the smartphone is exhausted.

  17. Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds

    Directory of Open Access Journals (Sweden)

    Xiaolong Xu

    2017-01-01

    Full Text Available Nowadays, a large number of groups choose to deploy their applications to cloud platforms, especially for the big data era. Currently, the hybrid cloud is one of the most popular computing paradigms for holding the privacy-aware applications driven by the requirements of privacy protection and cost saving. However, it is still a challenge to realize data placement considering both the energy consumption in private cloud and the cost for renting the public cloud services. In view of this challenge, a cost and energy aware data placement method, named CEDP, for privacy-aware applications over big data in hybrid cloud is proposed. Technically, formalized analysis of cost, access time, and energy consumption is conducted in the hybrid cloud environment. Then a corresponding data placement method is designed to accomplish the cost saving for renting the public cloud services and energy savings for task execution within the private cloud platforms. Experimental evaluations validate the efficiency and effectiveness of our proposed method.

  18. The differing privacy concerns regarding exchanging electronic medical records of internet users in Taiwan.

    Science.gov (United States)

    Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng

    2012-12-01

    This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.

  19. Robots in Action - Professional Contest 2016

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2016-06-01

    Full Text Available The organizers of the 9th edition of the Professional Contest "ROBOTS IN ACTION" were, as usual, the Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, together with the Robotics Society of Romania, Targoviste subsidiary and the Students League.

  20. Neuroethics and Brain Privacy

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2017-01-01

    An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology.......An introduction is presented in which editor discusses various articles within the issue on topics including ethical challenges with importance of privacy for well-being, impact of brain-reading on mind privacy and neurotechnology....

  1. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  2. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  3. The NASA Tournament Laboratory (“NTL”): Improving Data Access at PDS while Spreading Joy and Engaging Students through 16 Micro-Contests

    Science.gov (United States)

    LaMora, Andy; Raugh, A.; Erickson, K.; Grayzeck, E. J.; Knopf, W.; Lydon, M.; Lakhani, K.; Crusan, J.; Morgan, T. H.

    2012-10-01

    NASA PDS hosts terabytes of valuable data from hundreds of data sources and spans decades of research. Data is stored on flat-file systems regulated through careful meta dictionaries. PDS’s data is available to the public through its website which supports data searches through drill-down navigation. While the system returns data quickly, result sets in response to identical input differ depending on the drill-down path a user follows. To correct this issue, to allow custom searching, and to improve general accessibility, PDS sought to create a new data structure and API, and to use them to build applications that are a joy to use and showcase the value of the data to students, teachers and citizens. PDS engaged TopCoder and Harvard Business School through the NTL to pursue these objectives in a pilot effort. Scope was limited to Small Bodies Node data. NTL analyzed data, proposed a solution, and implemented it through a series of micro-contests. Contest focused on different segments of the problem; conceptualization, architectural design, implementation, testing, etc. To demonstrate the utility of the completed solution, NTL developed web-based and mobile applications that can compare targets, regardless of mission. To further explore the potential of the solution NTL hosted “Mash-up” challenges that integrated the API with other publically available assets, to produce consumer and teaching applications, including an Augmented Reality iPad tool. Two contests were also posted to middle and high school students via the NoNameSite.com platform, and as a result of these contests, PDS/SBN has initiated a Facebook program. These contests defined and implemented a data warehouse with the necessary migration tools to transform legacy data, produced a public web interface for the new search, developed a public API, and produced four mobile applications that we expect to appeal to users both within and without the academic community.

  4. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  5. Contestability of Container Liner Shipping Market in Alliance Era

    Directory of Open Access Journals (Sweden)

    Enna Hirata

    2017-03-01

    Full Text Available A cross section panel model is applied to estimate the effect that the Herfindahl-Hirschman Index (HHI has on container freight rates for a sample of six major container liner shipping routes during 2009 to 2011. The estimated coefficient of HHI is non-positive and statistically insignificant, indicating that higher concentration level does not lead to high price and the container liner shipping market is contestable for the period under consideration. The suggestion that efficiency can be achieved without actual competition in a contestable market is highly significant for policy makers.

  6. The War Against Terror and Transatlantic Information Sharing: Spillovers of Privacy or Spillovers of Security?

    Directory of Open Access Journals (Sweden)

    Maria Tzanou

    2015-02-01

    Full Text Available The EU-US Passenger Name Record (PNR agreement has been among the most controversial instruments in the fight against terrorism that the EU negotiated with the US after the 9/11 terrorist attacks. The agreement has been heavily criticised for its implications regarding fundamental rights, in particular the rights to privacy and data protection. Nevertheless, the EU has put forward plans to develop its own PNR programme. The present article aims to examine the new dynamics concerning privacy that arise from the transatlantic fight against terrorism. It argues that, while attempts for the development of a transatlantic privacy protection framework have been made, ‘spillovers’ of security, taking the form of internalisation of external counter-terrorism measures, are prevalent in the era of the war against terror.

  7. Disentangling privacy from property: toward a deeper understanding of genetic privacy.

    Science.gov (United States)

    Suter, Sonia M

    2004-04-01

    With the mapping of the human genome, genetic privacy has become a concern to many. People care about genetic privacy because genes play an important role in shaping us--our genetic information is about us, and it is deeply connected to our sense of ourselves. In addition, unwanted disclosure of our genetic information, like a great deal of other personal information, makes us vulnerable to unwanted exposure, stigmatization, and discrimination. One recent approach to protecting genetic privacy is to create property rights in genetic information. This Article argues against that approach. Privacy and property are fundamentally different concepts. At heart, the term "property" connotes control within the marketplace and over something that is disaggregated or alienable from the self. "Privacy," in contrast, connotes control over access to the self as well as things close to, intimately connected to, and about the self. Given these different meanings, a regime of property rights in genetic information would impoverish our understanding of that information, ourselves, and the relationships we hope will be built around and through its disclosure. This Article explores our interests in genetic information in order to deepen our understanding of the ongoing discourse about the distinction between property and privacy. It develops a conception of genetic privacy with a strong relational component. We ordinarily share genetic information in the context of relationships in which disclosure is important to the relationship--family, intimate, doctor-patient, researcher-participant, employer-employee, and insurer-insured relationships. Such disclosure makes us vulnerable to and dependent on the person to whom we disclose it. As a result, trust is essential to the integrity of these relationships and our sharing of genetic information. Genetic privacy can protect our vulnerability in these relationships and enhance the trust we hope to have in them. Property, in contrast, by

  8. Contested claims to gardens and land

    DEFF Research Database (Denmark)

    Obika, Julaina; Adol, Ben Otto; Babiiha, Sulayman Mpisi

    2018-01-01

    This chapter explores how, in a patrilineal and patriarchal society recovering from two decades of war, women and men frame arguments about entitlement. Here claims to gardens (plots of land for cultivation) become a contested conversation about women’s rights of belonging to family and community...

  9. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  10. Privacy Verification Using Ontologies

    NARCIS (Netherlands)

    Kost, Martin; Freytag, Johann-Christoph; Kargl, Frank; Kung, Antonio

    2011-01-01

    As information systems extensively exchange information between participants, privacy concerns may arise from its potential misuse. A Privacy by Design (PbD) approach considers privacy requirements of different stakeholders during the design and the implementation of a system. Currently, a

  11. Exploring Women's Understanding of Politics, Political Contestation ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Exploring Women's Understanding of Politics, Political Contestation and Gender ... First, researchers will explore women's political leadership and the extent to ... Sign up now for IDRC news and views sent directly to your inbox each month.

  12. Corporal punishment contestations, paradoxes and implications for ...

    African Journals Online (AJOL)

    Corporal punishment contestations, paradoxes and implications for school leadership: A case study of two South African high schools. ... South African Journal of Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current ...

  13. Identity management and privacy languages technologies: Improving user control of data privacy

    Science.gov (United States)

    García, José Enrique López; García, Carlos Alberto Gil; Pacheco, Álvaro Armenteros; Organero, Pedro Luis Muñoz

    The identity management solutions have the capability to bring confidence to internet services, but this confidence could be improved if user has more control over the privacy policy of its attributes. Privacy languages could help to this task due to its capability to define privacy policies for data in a very flexible way. So, an integration problem arises: making work together both identity management and privacy languages. Despite several proposals for accomplishing this have already been defined, this paper suggests some topics and improvements that could be considered.

  14. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  15. Regulation as a political contest: the probability of conservation of a renewable resource

    DEFF Research Database (Denmark)

    Brandt, Urs Steiner

    2017-01-01

    How do the levels of extreme positions of various interest groups influence the conservation policies in the context of a renewable resource conservation contest? To answer this question, a model is provided where conservation policy is determined as a contest between two opposing interest groups......: one in favor of conservation and another in favor of non-conservation. The levels of extreme positions for the conservationalists are determined by their demands about the severity of the conservation strategy that needs to be implemented. For the non-conservation group, the level of extreme position...... is determined by how large the current harvest of the resource should be. The main driver of the model is that resource conservation is realized only if the conservation group wins the contest, which again depends on the relative gain the two contenders receive when winning the contest. The paper derives...

  16. Local newspaper movie contests and the creation of the first movie fans

    Directory of Open Access Journals (Sweden)

    Jessica Leonora Whitehead

    2016-09-01

    Full Text Available This article explores the advent of local newspaper movie contests in the 1910s and how these contests helped to create active movie fans. Such contests increased the popularity of the new medium of film by engaging local audiences in the process of filmmaking, including fans as scriptwriters and even stars. They helped to transform film into a dominant cultural practice by creating local spaces for film patrons to become part of the national pastime of going to the show. They did so by appealing directly to female spectators, who both legitimized going to the movies and created dynamic film fan communities.

  17. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    Science.gov (United States)

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  18. Can the obstacles to privacy self-management be overcome? Exploring the consent intermediary approach

    Directory of Open Access Journals (Sweden)

    Tuukka Lehtiniemi

    2017-07-01

    Full Text Available In privacy self-management, people are expected to perform cost–benefit analysis on the use of their personal data, and only consent when their subjective benefits outweigh the costs. However, the ubiquitous collection of personal data and Big Data analytics present increasing challenges to successful privacy management. A number of services and research initiatives have proposed similar solutions to provide people with more control over their data by consolidating consent decisions under a single interface. We have named this the ‘ consent intermediary ’ approach. In this paper, we first identify the eight obstacles to privacy self-management which make cost–benefit analysis conceptually and practically challenging. We then analyse to which extent consent intermediaries can help overcome the obstacles. We argue that simply bringing consent decisions under one interface offers limited help, but that the potential of this approach lies in leveraging the intermediary position to provide aides for privacy management. We find that with suitable tools, some of the more practical obstacles indeed can become solvable, while others remain fundamentally insuperable within the individuated privacy self-management model. Attention should also be paid to how the consent intermediaries may take advantage of the power vested in the intermediary positions between users and other services.

  19. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  20. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  1. Privacy in domestic environments

    OpenAIRE

    Radics, Peter J; Gracanin, Denis

    2011-01-01

    non-peer-reviewed While there is a growing body of research on privacy,most of the work puts the focus on information privacy. Physical and psychological privacy issues receive little to no attention. However, the introduction of technology into our lives can cause problems with regard to these aspects of privacy. This is especially true when it comes to our homes, both as nodes of our social life and places for relaxation. This paper presents the results of a study intended to captu...

  2. Engaging Earth- and Environmental-Science Undergraduates Through Weather Discussions and an eLearning Weather Forecasting Contest

    Science.gov (United States)

    Schultz, David M.; Anderson, Stuart; Seo-Zindy, Ryo

    2013-06-01

    For students who major in meteorology, engaging in weather forecasting can motivate learning, develop critical-thinking skills, improve their written communication, and yield better forecasts. Whether such advances apply to students who are not meteorology majors has been less demonstrated. To test this idea, a weather discussion and an eLearning weather forecasting contest were devised for a meteorology course taken by third-year undergraduate earth- and environmental-science students. The discussion consisted of using the recent, present, and future weather to amplify the topics of the week's lectures. Then, students forecasted the next day's high temperature and the probability of precipitation for Woodford, the closest official observing site to Manchester, UK. The contest ran for 10 weeks, and the students received credit for participation. The top students at the end of the contest received bonus points on their final grade. A Web-based forecast contest application was developed to register the students, receive their forecasts, and calculate weekly standings. Students who were successful in the forecast contest were not necessarily those who achieved the highest scores on the tests, demonstrating that the contest was possibly testing different skills than traditional learning. Student evaluations indicate that the weather discussion and contest were reasonably successful in engaging students to learn about the weather outside of the classroom, synthesize their knowledge from the lectures, and improve their practical understanding of the weather. Therefore, students taking a meteorology class, but not majoring in meteorology, can derive academic benefits from weather discussions and forecast contests. Nevertheless, student evaluations also indicate that better integration of the lectures, weather discussions, and the forecasting contests is necessary.

  3. CONTESTED IDENTITIES IN MEDIA PORTRAYAL OF MILITANTS ...

    African Journals Online (AJOL)

    MR MATTHEW

    2017-02-02

    Feb 2, 2017 ... been highly contested, along political, social and religious lines. ... This approach to CDA tends to link text analysis of news ... opposition materials allows the militants' view of their identity to be contrasted and compared.

  4. Research protocol: a realist synthesis of contestability in community-based mental health markets.

    Science.gov (United States)

    Durham, Jo; Bains, Amara

    2015-03-25

    In most developed nations, there has been a shift from public services to a marketisation of public goods and services - representing a significant reform process aiming to transform the way in which community-based human services, such as health, are delivered and consumed. For services, this means developing the capacity to adapt and innovate in response to changing circumstances to achieve quality. The availability of rigorous research to demonstrate whether a market approach and contestability, in particular, is a coherent reform process is largely absent. Contestability operates on the premise that better procurement processes allow more providers to enter the market and compete for contracts. This is expected to create stimulus for greater efficiencies, innovation and improved service delivery to consumers. There is limited understanding, however, about how community-based providers morph and re-configure in response to the opportunities posed by contestability. This study focuses on the effect of a contestability policy on the community-managed mental health sector. A realist review will be undertaken to understand how and why the introduction of contestability into a previously incontestable market influences the ways in which community-based mental health providers respond to contestability. The review will investigate those circumstances that shape organisational response and generate outcomes through activating mechanisms. An early scoping has helped to formulate the initial program theory. A realist synthesis will be undertaken to identify relevant journal articles and grey literature. Data will be extracted in relation to the emerging contextual factors, mechanisms and outcomes and their configurations. The analysis will seek patterns and regularities in these configurations across the extracted data and will focus on addressing our theory-based questions. Increasingly, community-based mental health markets are moving to contestability models. Rigorous

  5. Technical paper contest for women 1992. Space challenges: Earth and beyond

    Science.gov (United States)

    Orans, Robin (Editor)

    1993-01-01

    Two of the major concerns of the NASA Ames Research Center (NASA ARC) Advisory Committee for Women (ACW) are that recruitment of women scientists, engineers, and technicians needs to increase and that barriers to advancement need to be removed for improved representation of women in middle and upper management and scientific positions. One strategy that addressed this concern was the ACW sponsorship of a Technical Paper Contest for Women at Ames Research Center. Other sponsors of the Contest were the Ames Equal Opportunity Council and the Ames Contractor Council. The Technical Paper Contest for Women greatly increased the visibility of both the civil service women and the women who work for contractors at Ames. The women had the opportunity to hone their written and oral presentation skills. Networking among Ames women increased.

  6. Towards Territorial Privacy in Smart Environments

    NARCIS (Netherlands)

    Könings, Bastian; Schaub, Florian; Weber, M.; Kargl, Frank

    Territorial privacy is an old concept for privacy of the personal space dating back to the 19th century. Despite its former relevance, territorial privacy has been neglected in recent years, while privacy research and legislation mainly focused on the issue of information privacy. However, with the

  7. Privacy and Library Records

    Science.gov (United States)

    Bowers, Stacey L.

    2006-01-01

    This paper summarizes the history of privacy as it relates to library records. It commences with a discussion of how the concept of privacy first originated through case law and follows the concept of privacy as it has affected library records through current day and the "USA PATRIOT Act."

  8. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  9. The Structure-Agency Dialectic in Contested Science Spaces: "Do Earthworms Eat Apples?"

    Science.gov (United States)

    Kane, Justine M.

    2015-01-01

    Focusing on a group of African American third graders who attend a high-poverty urban school, I explore the structure-agency dialectic within contested spaces situated in a dialogically oriented science classroom. Contested spaces entail the moments in which the students challenge each other's and their teacher's science ideas and, in the process,…

  10. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  11. Working Paper 172 - Political Economy of Service Delivery: Monitoring versus Contestation

    OpenAIRE

    Kjell Hausken; Mthuli Ncube

    2013-01-01

    Many communities suffer limited public goods provision due to civil servants (doctors, teachers, etc) supplementing their low income with moonlighting activities. Monitors of civil servants commonly also earn low salaries from monitoring and may prefer political contestation for power and prestige. We determine an internal equilibrium for how monitors strike a balance between monitoring and political contestation. We also determine a corner solution where an unresourceful monitor does not mon...

  12. A Mobile, Dynamic, and Privacy-Preserving Matching System for Car and Taxi Pools

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2014-01-01

    Full Text Available Recently, rates of vehicle ownership have risen globally, exacerbating problems including air pollution, lack of parking, and traffic congestion. While many solutions to these problems have been proposed, carpooling remains one of the most effective approaches. Recently, several carpooling platforms have been built on cloud computing systems, with originators posting online list of departure/arrival points and schedules from which participants can search for rides that match their needs. However, it can be difficult to make matches quickly and the systems are subject to privacy concerns in that they may disclose private information such as names, registration data, and departure/arrival schedules. This paper proposes a dynamic matching method for car/taxi pools for use in mobile devices via ad hoc Wi-Fi networks. The proposed method also preserves user privacy including names and departure/arrival schedules. Moreover, the system does not require the user to register any personal data, so such data cannot be leaked. The system was implemented on the Android mobile platform, allowing users to immediately and securely access the system via their smart phones.

  13. Robots in Action - Professional Contest 2017

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2017-06-01

    Full Text Available The Robotics Society of Romania, Targoviste subsidiary, together with the Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, held on May 30th 2017, starting from 11.00h, in the Rotonda of Engineering Faculties, the tenth edition of the professional students contest "ROBOTS IN ACTION".

  14. Jackpot for Insurgent in Louisiana Contest

    Science.gov (United States)

    Cavanagh, Sean

    2012-01-01

    Campaigns for state school board are typically quiet affairs, eliciting only modest interest from the public and even less from political donors. But the race last fall for the District 2 seat on Louisiana's board of elementary and secondary education was a remarkable exception. The contest attracted the attention of education activists and…

  15. Exploring Women's Understanding of Politics, Political Contestation ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Exploring Women's Understanding of Politics, Political Contestation and Gender Transformation in the Caribbean. IDRC's Democratic Governance, Women's Rights and Gender Equality initiative is supporting a body of comparative research on whether and how democratic processes and institutions are responding to ...

  16. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  17. Sex Difference in Testosterone Response to a Video Game Contest

    OpenAIRE

    Mazur, Allan; Susman, Elizabeth J.; Edelbrock, Sandy

    1997-01-01

    Testosterone (T) and cortisol (C) were assayed from saliva samples given by young men (n = 28) and women (n = 32) before, during, and after competing with a same-sex partner in a video game. The T response to the competition is different in each sex; the C response is the same. Male results confirm prior reports of a pre-contest rise in testosterone. Male results did not confirm previous findings that after a contest, the testosterone of winners is higher than that of losers, perhaps because ...

  18. Privacy information management for video surveillance

    Science.gov (United States)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  19. Multi-Agent Programming Contest 2013: The Teams and the Design of Their Systems

    DEFF Research Database (Denmark)

    Ahlbrecht, Tobias; Bender-Saebelkampf, Christian; Brito, Maiquel

    2013-01-01

    Five teams participated in the Multi-Agent Programming Contest in 2013: All of them gained experience in 2012 already. In order to better understand which paradigms they used, which techniques they considered important and how much work they invested, the organisers of the contest compiled together...

  20. Technical Privacy Metrics: a Systematic Survey

    OpenAIRE

    Wagner, Isabel; Eckhoff, David

    2018-01-01

    The file attached to this record is the author's final peer reviewed version The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature makes an informed choice of metrics challenging. As a result, instead of using existing metrics, n...

  1. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  2. A privacy protection model to support personal privacy in relational databases.

    OpenAIRE

    2008-01-01

    The individual of today incessantly insists on more protection of his/her personal privacy than a few years ago. During the last few years, rapid technological advances, especially in the field of information technology, directed most attention and energy to the privacy protection of the Internet user. Research was done and is still being done covering a vast area to protect the privacy of transactions performed on the Internet. However, it was established that almost no research has been don...

  3. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  4. Sunflower Beauty Contest : tsvetõ zimoi / Marina Poltavtseva

    Index Scriptorium Estoniae

    Poltavtseva, Marina

    2001-01-01

    Lillekleitide võistlusest Sunflower Beauty Contest Tallinna klubis Decolte. Konkursi idee on florist Tatjana Tridvornovalt. Esimese koha sai Viimsi lilleäri lilleseadjate Meri-Liis Kõivu ja Triinu Põlderi lillekleit "Talvepruut"

  5. Contested Boundaries: psychiatry, disease, and diagnosis.

    Science.gov (United States)

    Rosenberg, Charles E

    2015-01-01

    Since the 19th century, we have come to think of disease in terms of specific entities--entities defined and legitimated in terms of characteristic somatic mechanisms. Since the last third of that century, we have expanded would-be disease categories to include an ever-broader variety of emotional pain, idiosyncrasy, and culturally unsettling behaviors. Psychiatry has been the residuary legatee of these developments, developments that have always been contested at the ever-shifting boundary between disease and deviance, feeling and symptom, the random and the determined, the stigmatized and the value-free. Even in our era of reductionist hopes, psychopharmaceutical practice, and corporate strategies, the legitimacy of many putative disease categories will remain contested. The use of the specific disease entity model will always be a reductionist means to achieve necessarily holistic ends, both in terms of cultural norms and the needs of suffering individuals. Bureaucratic rigidities and stakeholder conflicts structure and intensify such boundary conflicts, as do the interests and activism of an interested lay public.

  6. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  7. Constructing and Contesting City of London Power

    DEFF Research Database (Denmark)

    Baker, Andrew; Wigan, Duncan

    2017-01-01

    Existing literature on the City of London has tended to focus on its ‘structural power’, while neglecting political and narrative agency. This paper acts as a corrective by presenting evidence to show that since the financial crash of 2008 the political terrain the City operates on has become more...... contested, crowded and noisier. The contribution develops a middle course between a positive assessment of the role of civil society in relation to global finance, and a more pessimistic reading. We demonstrate how macro-narratives and public story-telling both construct and contest City and financial...... sector power. In a new pattern since the financial crash, NGOs have moved from campaigns of limited duration and narrow focus, to a more sustained presence on macro-structural issues. Adopting a supply–demand framework for assessing governance and regulatory change, we look at the emergence of TheCity...

  8. Interaction location outweighs the competitive advantage of numerical superiority in Cebus capucinus intergroup contests.

    Science.gov (United States)

    Crofoot, Margaret C; Gilby, Ian C; Wikelski, Martin C; Kays, Roland W

    2008-01-15

    Numerical superiority confers a competitive advantage during contests among animal groups, shaping patterns of resource access, and, by extension, fitness. However, relative group size does not always determine the winner of intergroup contests. Smaller, presumably weaker social groups often defeat their larger neighbors, but how and when they are able to do so remains poorly understood. Models of competition between individuals suggest that location may influence contest outcome. However, because of the logistical difficulties of studying intergroup interactions, previous studies have been unable to determine how contest location and group size interact to shape relationships among groups. We address this question by using an automated radio telemetry system to study intergroup interactions among six capuchin monkey (Cebus capucinus) social groups of varying sizes. We find that the odds of winning increase with relative group size; one additional group member increases the odds of winning an interaction by 10%. However, this effect is not uniform across space; with each 100 m that a group moves away from the center of its home range, its odds of winning an interaction decrease by 31%. We demonstrate that contest outcome depends on an interaction between group size and location, such that small groups can defeat much larger groups near the center of their home range. The tendency of resident groups to win contests may help explain how small groups persist in areas with intense intergroup competition.

  9. 29 CFR 2700.20 - Notice of contest of a citation or order issued under section 104 of the Act.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Notice of contest of a citation or order issued under... MINE SAFETY AND HEALTH REVIEW COMMISSION PROCEDURAL RULES Contests of Citations and Orders § 2700.20 Notice of contest of a citation or order issued under section 104 of the Act. (a) Who may contest. (1) An...

  10. Cybersecurity and Privacy

    DEFF Research Database (Denmark)

    he huge potential in future connected services has as a precondition that privacy and security needs are dealt with in order for new services to be accepted. This issue is increasingly on the agenda both at the company and at individual level. Cybersecurity and Privacy – bridging the gap addresses...... two very complex fields of the digital world, i.e., Cybersecurity and Privacy. These multifaceted, multidisciplinary and complex issues are usually understood and valued differently by different individuals, data holders and legal bodies. But a change in one field immediately affects the others....... Policies, frameworks, strategies, laws, tools, techniques, and technologies – all of these are tightly interwoven when it comes to security and privacy. This book is another attempt to bridge the gap between the industry and academia. The book addresses the views from academia and industry on the subject...

  11. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  12. 76 FR 5603 - Privacy Act of 1974; Department of Homeland Security Office of Operations Coordination and...

    Science.gov (United States)

    2011-02-01

    ... on social media sites. However, OPS is permitted to establish user names and passwords to form profiles and follow relevant government, media, and subject matter experts on social media sites in order... Available Social Media Monitoring and Situational Awareness Initiative System of Records AGENCY: Privacy...

  13. The effects of residency and body size on contest initiation and outcome in the territorial dragon, Ctenophorus decresii.

    Directory of Open Access Journals (Sweden)

    Kate D L Umbers

    Full Text Available Empirical studies of the determinants of contests have been attempting to unravel the complexity of animal contest behaviour for decades. This complexity requires that experiments incorporate multiple determinants into studies to tease apart their relative effects. In this study we examined the complex contest behaviour of the tawny dragon (Ctenophorus decresii, a territorial agamid lizard, with the specific aim of defining the factors that determine contest outcome. We manipulated the relative size and residency status of lizards in contests to weight their importance in determining contest outcome. We found that size, residency and initiating a fight were all important in determining outcomes of fights. We also tested whether residency or size was important in predicting the status of lizard that initiated a fight. We found that residency was the most important factor in predicting fight initiation. We discuss the effects of size and residency status in context of previous studies on contests in tawny dragons and other animals. Our study provides manipulative behavioural data in support of the overriding effects of residency on initiation fights and winning them.

  14. The Effects of Residency and Body Size on Contest Initiation and Outcome in the Territorial Dragon, Ctenophorus decresii

    Science.gov (United States)

    Umbers, Kate D. L.; Osborne, Louise; Keogh, J. Scott

    2012-01-01

    Empirical studies of the determinants of contests have been attempting to unravel the complexity of animal contest behaviour for decades. This complexity requires that experiments incorporate multiple determinants into studies to tease apart their relative effects. In this study we examined the complex contest behaviour of the tawny dragon (Ctenophorus decresii), a territorial agamid lizard, with the specific aim of defining the factors that determine contest outcome. We manipulated the relative size and residency status of lizards in contests to weight their importance in determining contest outcome. We found that size, residency and initiating a fight were all important in determining outcomes of fights. We also tested whether residency or size was important in predicting the status of lizard that initiated a fight. We found that residency was the most important factor in predicting fight initiation. We discuss the effects of size and residency status in context of previous studies on contests in tawny dragons and other animals. Our study provides manipulative behavioural data in support of the overriding effects of residency on initiation fights and winning them. PMID:23077558

  15. "Rape Culture" language and the news media: contested versus non-contested cases

    Directory of Open Access Journals (Sweden)

    April COBOS

    2014-12-01

    Full Text Available The American news media has recently reported on several rape and sexual assault cases in various cultural settings, sparking public conversations about rape culture in different cultural contexts. The article is focused as a Critical Discourse Analysis that compares the language use in news articles from The New York Times and The Wall Street Journal over a six months period in order to more clearly understand the way the news media uses language in regards to gender and sexual assault and creates a spectrum of valid versus contested reports of sexual assault in different cultural settings.

  16. Developing Conceptions of Fair Contest Procedures and the Understanding of Skill and Luck.

    Science.gov (United States)

    Thorkildsen, Theresa A.; White-McNulty, Lisa

    2002-01-01

    Contrary to assumptions about aversive effects of competition on achievement motivation, in this study young people saw academic contests as fair. When participants completed structural interviews on fair ways to organize science contests and on differentiation of skill and luck, age-related trends in their conceptions of procedural justice were…

  17. Security of electronic medical information and patient privacy: what you need to know.

    Science.gov (United States)

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  18. Globalized conflicts, globalized responses. Changing manners of contestation among indigenous communities

    DEFF Research Database (Denmark)

    Benyei, Petra; Turreira Garcia, Nerea; Orta-Martínez, Martí

    2017-01-01

    In a globalized world, environmental conflicts affecting indigenous communities (including hunter-gatherer groups) have intensified and grown in their transnational character. These changes have affected the choice of manners of contestation of these groups, favouring in some cases the emergence...... activities and confront conflicts through a truly bottom-up approach. The chapter ends discussing how, despite the potential of such new manners of contestation, the power imbalances that currently underpin many indigenous conflicts are first to be addressed....

  19. Boundary Struggles : Contestations of Free Speech in the Norwegian Publis Sphere

    OpenAIRE

    2017-01-01

    Freedom of speech is a fundamental human right and a core value in liberal democracies. It is also, however, one of our time’s most contested issues, constantly claimed to be either too wide-ranging, at the peril of vulnerable minority groups, or too limited, restricting dissent and democratic deliberation. Employing a sociological lens on the dynamics of the public sphere, this book investigates how the boundaries of free speech are contested and negotiated through social processes which sil...

  20. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  1. Privacy and Data-Based Research

    OpenAIRE

    Ori Heffetz; Katrina Ligett

    2013-01-01

    What can we, as users of microdata, formally guarantee to the individuals (or firms) in our dataset, regarding their privacy? We retell a few stories, well-known in data-privacy circles, of failed anonymization attempts in publicly released datasets. We then provide a mostly informal introduction to several ideas from the literature on differential privacy, an active literature in computer science that studies formal approaches to preserving the privacy of individuals in statistical databases...

  2. Exploring the Effects of Contest Mechanisms on Idea Shortlisting in an Open Idea Competition

    DEFF Research Database (Denmark)

    Merz, Alexander Benedikt; Seeber, Isabella; Maier, Ronald

    2016-01-01

    Picking the most promising from a multitude of crowd-generated ideas challenges organizations that employ open idea competitions. Hence, hosts of such contests often filter submitted ideas into shortlists to help juries selecting the winning ideas. While contest communities and rewards have been...

  3. Cassini Scientist for a Day: an international contest in Greece

    Science.gov (United States)

    Solomonidou, Anezina; Moussas, Xenophon; Xystouris, Georgios; Coustenis, Athena; Lebreton, Jean-Pierre; Katsavrias, Christos; Bampasidis, Georgios; Kyriakopoulos, Konstantinos; Kouloumvakos, Athanasios; Patsou, Ioanna

    2013-04-01

    The Cassini Outreach Team of NASA's Jet Propulsion Laboratory is being organizing a brilliant school contest in Astronomy focusing in the Saturnian system. This essay contest provides school students all around the worlds with the opportunity to get involved in astronomy and astrophysics and planetary sciences in particular. From 2010 the 'Cassini Scientist for a Day' contest has being one of the most successful as well as important outreach activities of ESA and NASA in Greece with hundreds of participants all over Greece. The number of participants is growing rapidly every year. This type of school competition in Greece is particularly important since Astronomy and Astrophysics and Space Sciences, although very popular, are not included in the school curricula and thus students rarely have the opportunity to experience and participate actively in these subjects. For the years 2010 and 2011, the Space Physics Group of the Astronomy, Astrophysics and Mechanics section of the University of Athens in association with external colleagues has been selected as the co-ordinator of NASA for the competition in Greece. Under the guidance of Cassini Outreach team, the members of the Space Physics Group have informed, explained and spread the rules of the competition at primary, secondary and high schools all over Greece. In general, the students have the option to choose Cassini monitoring between three targets of the Saturnian system, which the participants show that will bring the best scientific result. Their arguments should be summarized in an essay of 500 words more or less. They also have the option to do team work through groups of maximum three students. The participation in the contest for 2010 was unexpectedly high and thoroughly satisfied. The winners awarded through a ceremony which was held in the largest amphitheater at the central building of the University of Athens, that was fully packed. The following year 2011 the participation increased up to 300% while

  4. 76 FR 59073 - Privacy Act

    Science.gov (United States)

    2011-09-23

    ... CENTRAL INTELLIGENCE AGENCY 32 CFR Part 1901 Privacy Act AGENCY: Central Intelligence Agency. ACTION: Proposed rule. SUMMARY: Consistent with the Privacy Act (PA), the Central Intelligence Agency...-1379. SUPPLEMENTARY INFORMATION: Consistent with the Privacy Act (PA), the CIA has undertaken and...

  5. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  6. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  7. Homeostatic study of the effects of sportswear color on the contest outcome

    Science.gov (United States)

    Yuan, Jian-Qin; Liu, Timon Cheng-Yi; Wu, Ren-Le; Ruan, Chang-Xiong; He, Li-Mei; Liu, Song-Hao

    2008-12-01

    There are effects of sportswear color on the contest outcome. It has been explained from the psychological and perceptual viewpoints, respectively. It was studied by integrating the homeostatic theory of exercise training and autonomic nervous model of color vision in this paper. It was found that the effects of sportswear color on the contest outcome depend on autonomic nervous homeostasis (ANH). Color can be classified into hot color such as red, orange and yellow and cold color such as green, blue and violet. If the athletes have been in ANH, there are no effects of sportswear color on the contest outcome. If the autonomic nervous system is far from ANH due to exercise induced fatigue, wearing cold color had no predominance for cold-hot matches, and wearing white had no predominance for white-color matches.

  8. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  9. Evidence for the influence of the mere-exposure effect on voting in the Eurovision Song Contest

    Directory of Open Access Journals (Sweden)

    Diarmuid B. Verrier

    2012-09-01

    Full Text Available The mere exposure, or familiarity, effect is the tendency for people to feel more positive about stimuli to which they have previously been exposed. The Eurovision Song Contest is a two-stage event, in which some contestants in the final will be more familiar to viewers than others. Thus, viewers' voting is likely to be influenced by this effect. Previous work attempting to demonstrate this effect in this context has been unable to control for contestant quality. The current study, which used a novel procedure to analyse the way in which contestant countries distributed their points (a function of how viewers voted in those countries between 2008 and 2011, showed that contestants did better if they previously appeared in a semifinal that was seen by voters. This is evidence that the mere exposure effect, alongside previously studied factors such as cultural and geographical closeness, influences the way viewers vote in the Eurovision.

  10. Toward Privacy-Preserving Personalized Recommendation Services

    Directory of Open Access Journals (Sweden)

    Cong Wang

    2018-02-01

    Full Text Available Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, books, ads, restaurants, and more. In addition, personalized recommendation services have become extremely effective revenue drivers for online business. Despite the great benefits, deploying personalized recommendation services typically requires the collection of users’ personal data for processing and analytics, which undesirably makes users susceptible to serious privacy violation issues. Therefore, it is of paramount importance to develop practical privacy-preserving techniques to maintain the intelligence of personalized recommendation services while respecting user privacy. In this paper, we provide a comprehensive survey of the literature related to personalized recommendation services with privacy protection. We present the general architecture of personalized recommendation systems, the privacy issues therein, and existing works that focus on privacy-preserving personalized recommendation services. We classify the existing works according to their underlying techniques for personalized recommendation and privacy protection, and thoroughly discuss and compare their merits and demerits, especially in terms of privacy and recommendation accuracy. We also identity some future research directions. Keywords: Privacy protection, Personalized recommendation services, Targeted delivery, Collaborative filtering, Machine learning

  11. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  12. Adding query privacy to robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2012-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity...

  13. Privacy in an Ambient World

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; den Hartog, Jeremy

    Privacy is a prime concern in today's information society. To protect the privacy of individuals, enterprises must follow certain privacy practices, while collecting or processing personal data. In this chapter we look at the setting where an enterprise collects private data on its website,

  14. Privacy preserving probabilistic record linkage (P3RL): a novel method for linking existing health-related data and maintaining participant confidentiality.

    Science.gov (United States)

    Schmidlin, Kurt; Clough-Gorr, Kerri M; Spoerri, Adrian

    2015-05-30

    Record linkage of existing individual health care data is an efficient way to answer important epidemiological research questions. Reuse of individual health-related data faces several problems: Either a unique personal identifier, like social security number, is not available or non-unique person identifiable information, like names, are privacy protected and cannot be accessed. A solution to protect privacy in probabilistic record linkages is to encrypt these sensitive information. Unfortunately, encrypted hash codes of two names differ completely if the plain names differ only by a single character. Therefore, standard encryption methods cannot be applied. To overcome these challenges, we developed the Privacy Preserving Probabilistic Record Linkage (P3RL) method. In this Privacy Preserving Probabilistic Record Linkage method we apply a three-party protocol, with two sites collecting individual data and an independent trusted linkage center as the third partner. Our method consists of three main steps: pre-processing, encryption and probabilistic record linkage. Data pre-processing and encryption are done at the sites by local personnel. To guarantee similar quality and format of variables and identical encryption procedure at each site, the linkage center generates semi-automated pre-processing and encryption templates. To retrieve information (i.e. data structure) for the creation of templates without ever accessing plain person identifiable information, we introduced a novel method of data masking. Sensitive string variables are encrypted using Bloom filters, which enables calculation of similarity coefficients. For date variables, we developed special encryption procedures to handle the most common date errors. The linkage center performs probabilistic record linkage with encrypted person identifiable information and plain non-sensitive variables. In this paper we describe step by step how to link existing health-related data using encryption methods to

  15. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  16. 1993 Technical Paper Contest for Women. Gear Up 2000: Women in Motion

    Science.gov (United States)

    Orans, Robin (Editor); Duckett, Sophie (Editor); White, Susan (Editor)

    1994-01-01

    The NASA Ames Research Center Advisory Committee for Women (ACW) sponsored the second ACW Technical paper Contest for Ames women in order to increase the visibility of, and to encourage writing for publication by Ames women scientists, engineers, and technicians. The topics of the contest paper mirrored in the topics of the 1993 Society for Women Engineers (SWE) National Convention, which included technological, workplace, global, and family issues.

  17. A Survey of Privacy on Data Integration

    OpenAIRE

    Do Son, Thanh

    2015-01-01

    This survey is an integrated view of other surveys on privacy preserving for data integration. First, we review the database context and challenges and research questions. Second, we formulate the privacy problems for schema matching and data matching. Next, we introduce the elements of privacy models. Then, we summarize the existing privacy techniques and the analysis (proofs) of privacy guarantees. Finally, we describe the privacy frameworks and their applications.

  18. Privacy in social networking sites

    OpenAIRE

    Λεονάρδος, Γεώργιος; Leonardos, Giorgos

    2016-01-01

    The purpose of this study is to explore the aspects of privacy over the use of social networks web sites. More specific, we will show the types of social networks, their privacy mechanisms that are different in each social network site, their privacy options that are offered to users. We will report some serious privacy violations incidents of the most popular social networks sites such as Facebook, Twitter, LinkedIn. Also, we will report some important surveys about social networks and pr...

  19. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  20. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  1. Re-Packaging FPIC: Contesting the Shape of Corporate Responsability,Sate Authority, and Indigenous Governance

    Directory of Open Access Journals (Sweden)

    David Szablowski

    2010-12-01

    Full Text Available In this paper, I propose to examine how rival global governmentalprojects are asserted and contested by decentralized networks thatlink actors operating at different scales. I argue that Tsing’s notionof «travelling packages» provides a useful way of conceptualizingthe means by which elements of these projects are diffused, translated,taken up, and adapted into different localities around theworld. I explore these dynamics in relation to the contestation of agovernance model based on the principle that the free, prior andinformed consent (FPIC of an indigenous people is required toauthorize actions that may affect upon indigenous territory or indigenousrights. Through the assertion of different versions of FPIC,networked actors are contesting the nature and shape of corporatesocial responsibility, the authority of the state, and the significanceof indigenous governance. I propose to explore the implicationsof different packaging strategies on the contestation between rivalgovernance models and on their propensity for uptake in local sites.

  2. PRIVACY AS A CULTURAL PHENOMENON

    Directory of Open Access Journals (Sweden)

    Garfield Benjamin

    2017-07-01

    Full Text Available Privacy remains both contentious and ever more pertinent in contemporary society. Yet it persists as an ill-defined term, not only within specific fields but in its various uses and implications between and across technical, legal and political contexts. This article offers a new critical review of the history of privacy in terms of two dominant strands of thinking: freedom and property. These two conceptions of privacy can be seen as successive historical epochs brought together under digital technologies, yielding increasingly complex socio-technical dilemmas. By simplifying the taxonomy to its socio-cultural function, the article provides a generalisable, interdisciplinary approach to privacy. Drawing on new technologies, historical trends, sociological studies and political philosophy, the article presents a discussion of the value of privacy as a term, before proposing a defense of the term cyber security as a mode of scalable cognitive privacy that integrates the relative needs of individuals, governments and corporations.

  3. 77 FR 31371 - Public Workshop: Privacy Compliance Workshop

    Science.gov (United States)

    2012-05-25

    ... presentations, including the privacy compliance fundamentals, privacy and data security, and the privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Privacy Compliance... Homeland Security Privacy Office will host a public workshop, ``Privacy Compliance Workshop.'' DATES: The...

  4. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  5. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  6. Contending with contest in academic literacy. | Murray ...

    African Journals Online (AJOL)

    Stellenbosch Papers in Linguistics Plus. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 29 (1996) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Contending with contest in academic literacy. H Murray ...

  7. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  8. Extending SQL to Support Privacy Policies

    Science.gov (United States)

    Ghazinour, Kambiz; Pun, Sampson; Majedi, Maryam; Chinaci, Amir H.; Barker, Ken

    Increasing concerns over Internet applications that violate user privacy by exploiting (back-end) database vulnerabilities must be addressed to protect both customer privacy and to ensure corporate strategic assets remain trustworthy. This chapter describes an extension onto database catalogues and Structured Query Language (SQL) for supporting privacy in Internet applications, such as in social networks, e-health, e-governmcnt, etc. The idea is to introduce new predicates to SQL commands to capture common privacy requirements, such as purpose, visibility, generalization, and retention for both mandatory and discretionary access control policies. The contribution is that corporations, when creating the underlying databases, will be able to define what their mandatory privacy policies arc with which all application users have to comply. Furthermore, each application user, when providing their own data, will be able to define their own privacy policies with which other users have to comply. The extension is supported with underlying catalogues and algorithms. The experiments demonstrate a very reasonable overhead for the extension. The result is a low-cost mechanism to create new systems that arc privacy aware and also to transform legacy databases to their privacy-preserving equivalents. Although the examples arc from social networks, one can apply the results to data security and user privacy of other enterprises as well.

  9. Is Electronic Privacy Achievable?

    National Research Council Canada - National Science Library

    Irvine, Cynthia E; Levin, Timothy E

    2000-01-01

    ... individuals. The purpose of this panel was to focus on how new technologies are affecting privacy. Technologies that might adversely affect privacy were identified by Rein Turn at previous symposia...

  10. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...... of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....

  11. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao

    2017-03-21

    Privacy risks of recommender systems have caused increasing attention. Users’ private data is often collected by probably untrusted recommender system in order to provide high-quality recommendation. Meanwhile, malicious attackers may utilize recommendation results to make inferences about other users’ private data. Existing approaches focus either on keeping users’ private data protected during recommendation computation or on preventing the inference of any single user’s data from the recommendation result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP) with randomized perturbation (RP). We theoretically show the noise added by RP has limited effect on recommendation accuracy and the noise added by DP can be well controlled based on the sensitivity analysis of functions on the perturbed data. Extensive experiments on three large-scale real world datasets show that the hybrid approach generally provides more privacy protection with acceptable recommendation accuracy loss, and surprisingly sometimes achieves better privacy without sacrificing accuracy, thus validating its feasibility in practice.

  12. Are participants concerned about privacy and security when using short message service to report product adherence in a rectal microbicide trial?

    Science.gov (United States)

    Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex

    2018-04-01

    During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.

  13. Regulating Online Data Privacy

    OpenAIRE

    Paul Reid

    2004-01-01

    With existing data protection laws proving inadequate in the fight to protect online data privacy and with the offline law of privacy in a state of change and uncertainty, the search for an alternative solution to the important problem of online data privacy should commence. With the inherent problem of jurisdiction that the Internet presents, such a solution is best coming from a multi-national body with the power to approximate laws in as many jurisdictions as possible, with a recognised au...

  14. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  15. Contestation and Continuity in Educational Reform: A Critical Study of Innovations in Environmental Education.

    Science.gov (United States)

    Robottom, Ian Morris

    Contestation can be defined as a process in which self-interested individuals and groups in a social organization cooperate, compete, and negotiate in a complex interaction aimed at solving social problems. This dissertation explores the notion of contestation in the field of environmental education. In the first part of the document a framework…

  16. Contesting 'Patriotic History': Zimbabwe's liberation war history and ...

    African Journals Online (AJOL)

    Remarkably, the article observes that the exclusively women authored anthology on liberation war history offers an inventory of a gender based trajectory of memory, thus ... On the other hand, the sidelined demographic categories contest narrow 'patriotic history' by engineering counter discursive historical accounts.

  17. Hmong transnational identity: the gendering of contested discourses

    Directory of Open Access Journals (Sweden)

    Roberta Julian

    2005-01-01

    Full Text Available Hmong women throughout the diaspora are increasingly expressing ‘what it means to be Hmong’ and ‘what it means to be a Hmong woman’ in a variety of media that constitute western popular culture. At the same time, Hmong women residing in different nation-states live Hmong femininity differently. This paper explores the contested nature of Hmong identity through an exploration of discourses and practices at global and local levels, with a particular emphasis on their gendered dimensions. The paper argues that global narratives of Hmong identity are analytically distinct from, but empirically intertwined with, the constructions of Hmong identities across transnational social spaces. Through a focus on Hmong in Australia and the United States, the paper highlights the significance of place, generation, gender, religion, class and status as axes of contestation and debate in the construction of Hmong identities.

  18. Protection of the right to privacy in the practice of the European Court of Human Rights

    Directory of Open Access Journals (Sweden)

    Mladenov Marijana

    2013-01-01

    Full Text Available The right to privacy is a fundamental human right and an essential component of the protection of human autonomy and freedom. The development of science and information systems creates various opportunities for interferences with physical and moral integrity of a person. Therefore, it is necessary to determine the precise content of the right to privacy. The European Convention on Human Rights and Fundamental Freedoms guarantees this right under Article 8. The European Court of Human Rights did not precisely define the content of the right to privacy and thereby the applicants could bring different aspects of life into the scope of respect for private life. According to the Court, the concept of privacy and private life includes the following areas of human life: the right to establish and maintain relationships with other human beings, protection of the physical and moral integrity of persons, protection of personal data, change of personal name, various issues related to sexual orientation and transgender. The subject of this paper is referring to previously mentioned spheres of human life in the light of interpretation of Article 8 of the Convention.

  19. Robots in Action - Proffesional Contest 2014

    Directory of Open Access Journals (Sweden)

    Paul Ciprian Patic

    2014-06-01

    Full Text Available The Electrical Engineering, Electronics and Information Technology Faculty, "Valahia" University of Targoviste, together with the Robotics Society of Romania, Targoviste subsidiary and the Students League, held the 7th edition of the Professional Contest "ROBOTS IN ACTION" on June 5th 2014, starting from 12.00h, in the Faculty hall. Students and teams of students participated, exposing 10 practical applications in the fields of robotics and mechatronics.

  20. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme

    Directory of Open Access Journals (Sweden)

    Hui Zhu

    2016-02-01

    Full Text Available With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users’ personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users’ query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users’ queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  1. Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.

    Science.gov (United States)

    Zhu, Hui; Gao, Lijuan; Li, Hui

    2016-02-01

    With the development of body sensor networks and the pervasiveness of smart phones, different types of personal data can be collected in real time by body sensors, and the potential value of massive personal data has attracted considerable interest recently. However, the privacy issues of sensitive personal data are still challenging today. Aiming at these challenges, in this paper, we focus on the threats from telemetry interface and present a secure and privacy-preserving body sensor data collection and query scheme, named SPCQ, for outsourced computing. In the proposed SPCQ scheme, users' personal information is collected by body sensors in different types and converted into multi-dimension data, and each dimension is converted into the form of a number and uploaded to the cloud server, which provides a secure, efficient and accurate data query service, while the privacy of sensitive personal information and users' query data is guaranteed. Specifically, based on an improved homomorphic encryption technology over composite order group, we propose a special weighted Euclidean distance contrast algorithm (WEDC) for multi-dimension vectors over encrypted data. With the SPCQ scheme, the confidentiality of sensitive personal data, the privacy of data users' queries and accurate query service can be achieved in the cloud server. Detailed analysis shows that SPCQ can resist various security threats from telemetry interface. In addition, we also implement SPCQ on an embedded device, smart phone and laptop with a real medical database, and extensive simulation results demonstrate that our proposed SPCQ scheme is highly efficient in terms of computation and communication costs.

  2. What's in a name?

    DEFF Research Database (Denmark)

    Silverberg, J. I.; Thyssen, J. P.; Paller, A. S.

    2017-01-01

    Background: The ideal nomenclature of atopic dermatitis (AD) / atopic eczema (AE) has long been contested. However, it is becoming increasinglSy clear that the disparate nomenclature of this disease may have important deleterious ramifications for clinical care and research. Materials and Methods...

  3. Multitemporal Very High Resolution From Space: Outcome of the 2016 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Mou, L.; Zhu, X.; Vakalopoulou, M.; Karantzalos, K.; Paragios, N.; Saux, Le B.; Moser, G.; Tuia, D.

    2017-01-01

    In this paper, the scientific outcomes of the 2016 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society are discussed. The 2016 Contest was an open topic competition based on a multitemporal and multimodal dataset,

  4. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  5. Privacy-invading technologies : safeguarding privacy, liberty & security in the 21st century

    NARCIS (Netherlands)

    Klitou, Demetrius

    2012-01-01

    With a focus on the growing development and deployment of the latest technologies that threaten privacy, the PhD dissertation argues that the US and UK legal frameworks, in their present form, are inadequate to defend privacy and other civil liberties against the intrusive capabilities of body

  6. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  7. Corporate contestability and corporate expropriation

    Directory of Open Access Journals (Sweden)

    Abdul Hadi Zulkafli

    2016-12-01

    Full Text Available This paper presents evidence on the role of ownership in dealing with corporate expropriation of listed companies in Malaysia. From the perspective of expropriation, a single controlling shareholder is always associated with such behavior due to their power and control at the expense of minority shareholder. However, subsequent individual or coalition of large shareholders can be an important corporate governance tool by providing effective monitoring that would lessen the possibility of expropriation by the controlling shareholder. Relating to that, this study evaluates the role of controlling and large shareholders in dealing with corporate expropriation. It is found that there is a negative relationship between single controlling shareholders and dividend payout ratio indicating that firms with only controlling shareholder will pay a lower dividend due to possible expropriation through profit diversion by controlling shareholder. Using Herfindahl Index as a proxy for ownership contestability, the presence of large shareholders along with controlling shareholder has a positive relationship with dividend payout implying that increased contestability helps to curb the power of controlling shareholder to expropriate fund for their own benefit. In accordance with agency theory, the outcome suggests that large shareholders play a monitoring role in minimizing the Type II agency problem. It is also verifying the argument made based on the Catering Theory of Dividend that the presence of large shareholder brings benefit to all shareholders as they are able to reduce profit diversion by demanding for higher dividend

  8. SIED, a Data Privacy Engineering Framework

    OpenAIRE

    Mivule, Kato

    2013-01-01

    While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holist...

  9. Wireless smart meters and public acceptance: the environment, limited choices, and precautionary politics.

    Science.gov (United States)

    Hess, David J; Coley, Jonathan S

    2014-08-01

    Wireless smart meters (WSMs) promise numerous environmental benefits, but they have been installed without full consideration of public acceptance issues. Although societal-implications research and regulatory policy have focused on privacy, security, and accuracy issues, our research indicates that health concerns have played an important role in the public policy debates that have emerged in California. Regulatory bodies do not recognize non-thermal health effects for non-ionizing electromagnetic radiation, but both homeowners and counter-experts have contested the official assurances that WSMs pose no health risks. Similarities and differences with the existing social science literature on mobile phone masts are discussed, as are the broader political implications of framing an alternative policy based on an opt-out choice. The research suggests conditions under which health-oriented precautionary politics can be particularly effective, namely, if there is a mandatory technology, a network of counter-experts, and a broader context of democratic contestation.

  10. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  11. Olfactory signaling of aggressive intent in male-male contests of cave crickets (Troglophilus neglectus; Orthoptera: Rhaphidophoridae.

    Directory of Open Access Journals (Sweden)

    Nataša Stritih

    Full Text Available In animal contests, communicating aggressive motivation is most often mediated by visual or acoustic signals, while chemical signals are not expected to serve such a function since they are less able to be modulated by the sender during the changing behavioral context. We describe a rare example of ephemeral olfactory signals in terrestrial animals, signals that are emitted via protrusive scent glands in male cave crickets Troglophilus neglectus (Orthoptera, Rhaphidophoridae to reflect the state of the signaler's aggression. We correlate the intensity of behaviorally expressed aggression of the individuals in dyadic contests with the frequency and extent of their gland tissue protrusion, the latter serving as an indication of the amount of released odor. We detected large amounts of odor release during brief gland protrusions, and the absence of its release during gland retraction. Males protruded the glands during and after encountering a rival, with the degree of protrusion increasing with the intensity of the signalers' aggression. During the encounters, the degree of gland protrusion increased most strongly with the occurrence of the elevated body posture, directly preceding the attack. This degree was significantly higher in encounter winners than in losers displaying such posture, suggesting the highly important role of the released odor for contest resolution. After the encounters, glands were protruded almost exclusively by winners, apparently announcing victory. We tested for the function of the olfactory signals also directly, by preventing gland tissue protrusion in symmetric and asymmetric treatments of the contestants. Treating only the dominant individuals decreased the percentage of encounters they won by over 60%, while treating both contestants elicited a significant increase in the frequency and duration of fights. During contests, the olfactory signals of T. neglectus apparently function as a highly effective threat, which

  12. Comparison of two speech privacy measurements, articulation index (AI) and speech privacy noise isolation class (NIC'), in open workplaces

    Science.gov (United States)

    Yoon, Heakyung C.; Loftness, Vivian

    2002-05-01

    Lack of speech privacy has been reported to be the main dissatisfaction among occupants in open workplaces, according to workplace surveys. Two speech privacy measurements, Articulation Index (AI), standardized by the American National Standards Institute in 1969, and Speech Privacy Noise Isolation Class (NIC', Noise Isolation Class Prime), adapted from Noise Isolation Class (NIC) by U. S. General Services Administration (GSA) in 1979, have been claimed as objective tools to measure speech privacy in open offices. To evaluate which of them, normal privacy for AI or satisfied privacy for NIC', is a better tool in terms of speech privacy in a dynamic open office environment, measurements were taken in the field. AIs and NIC's in the different partition heights and workplace configurations have been measured following ASTM E1130 (Standard Test Method for Objective Measurement of Speech Privacy in Open Offices Using Articulation Index) and GSA test PBS-C.1 (Method for the Direct Measurement of Speech-Privacy Potential (SPP) Based on Subjective Judgments) and PBS-C.2 (Public Building Service Standard Method of Test Method for the Sufficient Verification of Speech-Privacy Potential (SPP) Based on Objective Measurements Including Methods for the Rating of Functional Interzone Attenuation and NC-Background), respectively.

  13. 76 FR 41274 - Privacy Act of 1974; Department of Homeland Security/ALL-033 Reasonable Accommodations Records...

    Science.gov (United States)

    2011-07-13

    ..., telecommuting, or reassignment to a vacant position; and/or (3) acquisition or modification of equipment or... the control of an agency for which information is retrieved by the name of an individual or by some... possession or under the control of DHS by complying with DHS Privacy Act regulations, 6 CFR Part 5. The...

  14. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  15. An Alternative View of Privacy on Facebook

    OpenAIRE

    Christian Fuchs

    2011-01-01

    The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy ...

  16. Effective online privacy mechanisms with persuasive communication

    OpenAIRE

    Coopamootoo, P L

    2016-01-01

    This thesis contributes to research by taking a social psychological perspective to managing privacy online. The thesis proposes to support the effort to form a mental model that is required to evaluate a context with regards to privacy attitudes or to ease the effort by biasing activation of privacy attitudes. Privacy being a behavioural concept, the human-computer interaction design plays a major role in supporting and contributing to end users’ ability to manage their privacy online. Howev...

  17. Law as a Second-Order Essentially Contested Concept

    NARCIS (Netherlands)

    W. van der Burg (Wibren)

    2016-01-01

    markdownabstractSince Gallie introduced the notion of essentially contested concepts, it has given rise to considerable debate and confusion. The aim of this paper is to bring clarity to these debates by offering a critical reconstruction of the notion of essential contestedness. I argue that we

  18. PriBots: Conversational Privacy with Chatbots

    OpenAIRE

    Harkous, Hamza; Fawaz, Kassem; Shin, Kang G.; Aberer, Karl

    2016-01-01

    Traditional mechanisms for delivering notice and enabling choice have so far failed to protect users’ privacy. Users are continuously frustrated by complex privacy policies, unreachable privacy settings, and a multitude of emerging standards. The miniaturization trend of smart devices and the emergence of the Internet of Things (IoTs) will exacerbate this problem further. In this paper, we propose Conversational Privacy Bots (PriBots) as a new way of delivering notice and choice through a two...

  19. Privacy Protection: Mandating New Arrangements to Implement and Assess Federal Privacy Policy and Practice

    National Research Council Canada - National Science Library

    Relyea, Harold C

    2004-01-01

    When Congress enacted the Privacy Act of 1974, it established a temporary national study commission to conduct a comprehensive assessment of privacy policy and practice in both the public and private...

  20. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  1. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  2. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  3. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  4. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user......’s identity and freedom. In normative ethical theory the need for an informational self-deterministic approach of privacy is stressed with greater emphasis on the control over personal data. However, scant attention has been paid on a virtue ethics approach of information privacy. Plotinus’ discussion of self......-determination is related to ethical virtue, human freedom and intellectual autonomy. The Plotinian virtue ethics approach of self-determination is not primarily related to the sphere of moral action, but to the quality of the self prior to moral practice. In this paper, it is argued that the problem of information privacy...

  5. Contested Norms in the Process of EU Enlargement: Non-Discrimination and Minority Rights

    OpenAIRE

    Antje Wiener; Guido Schwellnus

    2004-01-01

    This paper analyses the adoption of EU conditions regarding non-discrimination and minority protection in three applicant countries: Romania, Hungary and Poland. While non-discrimination is a well established EU norm, minority rights are a contested norm and not enshrined in the acquis communautaire. It is argued that contestation over norm meaning highlights the importance of norm resonance and domestic norm construction in processes of norm diffusion, and that the conceptual tension between...

  6. Older and Wiser? Facebook Use, Privacy Concern, and Privacy Protection in the Life Stages of Emerging, Young, and Middle Adulthood

    Directory of Open Access Journals (Sweden)

    Evert Van den Broeck

    2015-11-01

    Full Text Available A large part of research conducted on privacy concern and protection on social networking sites (SNSs concentrates on children and adolescents. Individuals in these developmental stages are often described as vulnerable Internet users. But how vulnerable are adults in terms of online informational privacy? This study applied a privacy boundary management approach and investigated Facebook use, privacy concern, and the application of privacy settings on Facebook by linking the results to Erikson’s three stages of adulthood: emerging, young, and middle adulthood. An online survey was distributed among 18- to 65-year-old Dutch-speaking adults ( N  = 508, 51.8% females. Analyses revealed clear differences between the three adult age groups in terms of privacy concern, Facebook use, and privacy protection. Results indicated that respondents in young adulthood and middle adulthood were more vulnerable in terms of privacy protection than emerging adults. Clear discrepancies were found between privacy concern and protection for these age groups. More particularly, the middle adulthood group was more concerned about their privacy in comparison to the emerging adulthood and young adulthood group. Yet, they reported to use privacy settings less frequently than the younger age groups. Emerging adults were found to be pragmatic and privacy conscious SNS users. Young adults occupied the intermediate position, suggesting a developmental shift. The impact of generational differences is discussed, as well as implications for education and governmental action.

  7. Writing Freedom: The Art of Contesting Incarceration | Maina ...

    African Journals Online (AJOL)

    Human existence and interaction is essentially characterized by a contest between individuals who at times have diametrically opposed social, political, and economic ideals. Due to the forceful nature of our idiosyncrasies, we always perceive our ideals infallible and hence as fit of being enforced on others. This attempt ...

  8. Evaluating the Operational Content of Contestable Market Theory.

    Science.gov (United States)

    1986-12-01

    Aurelius , Marcus , Meditations. Harmondsworth, England: Penguin Books, Ltd., 1964. Bailey, Elizabeth and John Panzar. "The Contestability of Airline...must have as its sole aim the service and harmony of all." ( Aurelius , Book 7, Verse 5) I also thank my reader, Dr. Dennis Quinn. Accession For %’A

  9. 49 CFR 10.13 - Privacy Officer.

    Science.gov (United States)

    2010-10-01

    ... INDIVIDUALS General § 10.13 Privacy Officer. (a) To assist with implementation, evaluation, and administration issues, the Chief Information Officer appoints a principal coordinating official with the title Privacy... 49 Transportation 1 2010-10-01 2010-10-01 false Privacy Officer. 10.13 Section 10.13...

  10. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  11. Understanding fear of opportunism in global prize-based science contests : Evidence for gender and age differences

    NARCIS (Netherlands)

    O.A. Acar (Oguz); J.C.M. van den Ende (Jan)

    2015-01-01

    textabstractGlobal prize-based science contests have great potential for tapping into diverse knowledge on a global scale and overcoming important scientific challenges. A necessary step for knowledge to be utilized in these contests is for that knowledge to be disclosed. Knowledge disclosure,

  12. 77 FR 33761 - Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, “Grievance...

    Science.gov (United States)

    2012-06-07

    ... of a data breach. (See also on HUD's privacy Web site, Appendix I for other ways that the Privacy Act... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5613-N-04] Privacy Act of 1974; Notification to Update an Existing Privacy Act System of Records, ``Grievance Records'' AGENCY: Office of the...

  13. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... of the companies have comprehensive privacy programs, although more than half of them voice moral or relational motives for addressing online privacy. The privacy measures they have taken are primarily compliance measures, while measures that stimulate a stakeholder dialogue are rare. Overall, a wide variety...

  14. Privacy-related context information for ubiquitous health.

    Science.gov (United States)

    Seppälä, Antto; Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-03-11

    Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how data can be processed or how components

  15. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, Willem

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM

  16. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  17. Privacy enhanced recommender system

    NARCIS (Netherlands)

    Erkin, Zekeriya; Erkin, Zekeriya; Beye, Michael; Veugen, Thijs; Lagendijk, Reginald L.

    2010-01-01

    Recommender systems are widely used in online applications since they enable personalized service to the users. The underlying collaborative filtering techniques work on user’s data which are mostly privacy sensitive and can be misused by the service provider. To protect the privacy of the users, we

  18. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for

  19. The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security

    Directory of Open Access Journals (Sweden)

    Elizabeth Fife

    2012-07-01

    Full Text Available A continuing stream of new mobile data services are being released that rely upon the collection of personal data to support a business model. New technologies including facial recognition, sensors and Near Field Communications (NFC will increasingly become a part of everyday services and applications that challenge traditional concepts of individual privacy. The average person as well as the “tech‐savvy” mobile phone user may not yet be fully aware of the extent to which their privacy and security are being affected through their mobile activities and how comparable this situation is to personal computer usage. We investigate perceptions and usage of mobile data services that appear to have specific privacy and security sensitivities, specifically social networking,\tbanking/payments\tand\thealth‐related activities. Our annual survey of smartphone users in the U.S. and Japan is presented from 2011. This nationally representative survey data is used to show demographic and cultural differences, and substantiate our hypotheses about the links between use and privacy concerns

  20. The first mathematical models of dynamic meteorology: The Berlin prize contest of 1746

    Energy Technology Data Exchange (ETDEWEB)

    Egger, J.; Pelkowski, J. [Muenchen Univ. (Germany). Meteorologisches Inst.

    2008-02-15

    The first models of dynamic meteorology were published in 1747 as a result of a prize contest of the Academy of Prussia. The topic of the contest concerned the determination of the winds 'if the Earth were surrounded everywhere by an ocean'. D'Alembert formulated a shallow water model for the first time in his prize-winning contribution and attempted to calculate tidal motions within the fluid layers. Daniel Bernoulli viewed the atmosphere as a boundary layer wherein the winds rotating with the earth at low elevations have to adjust their motion to a solar atmosphere at large heights. He is first in applying the principle of angular momentum conservation in continuum geophysics when calculating the zonal wind profile. An account of the historical background of the contest is given, as well as some later reactions to d'Alembert's solution. (orig.)

  1. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  2. Conservation narratives and contested protected areas in Zambia: a ...

    African Journals Online (AJOL)

    Conservation narratives and contested protected areas in Zambia: a political ecological analysis. ... Mgbakoigba: Journal of African Studies ... This paper uses a political ecological perspective to examine the link between environmental conservation narratives and resource conflicts and degradation in Zambia's protected ...

  3. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  4. Pre-Capture Privacy for Small Vision Sensors.

    Science.gov (United States)

    Pittaluga, Francesco; Koppal, Sanjeev Jagannatha

    2017-11-01

    The next wave of micro and nano devices will create a world with trillions of small networked cameras. This will lead to increased concerns about privacy and security. Most privacy preserving algorithms for computer vision are applied after image/video data has been captured. We propose to use privacy preserving optics that filter or block sensitive information directly from the incident light-field before sensor measurements are made, adding a new layer of privacy. In addition to balancing the privacy and utility of the captured data, we address trade-offs unique to miniature vision sensors, such as achieving high-quality field-of-view and resolution within the constraints of mass and volume. Our privacy preserving optics enable applications such as depth sensing, full-body motion tracking, people counting, blob detection and privacy preserving face recognition. While we demonstrate applications on macro-scale devices (smartphones, webcams, etc.) our theory has impact for smaller devices.

  5. Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.

    Science.gov (United States)

    Petersen, Carolyn

    2018-04-22

    Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.

  6. The privacy implications of Bluetooth

    OpenAIRE

    Kostakos, Vassilis

    2008-01-01

    A substantial amount of research, as well as media hype, has surrounded RFID technology and its privacy implications. Currently, researchers and the media focus on the privacy threats posed by RFID, while consumer groups choose to boycott products bearing RFID tags. At the same, however, a very similar technology has quietly become part of our everyday lives: Bluetooth. In this paper we highlight the fact that Bluetooth is a widespread technology that has real privacy implications. Furthermor...

  7. Big data privacy: The datafication of personal information

    DEFF Research Database (Denmark)

    Mai, Jens-Erik

    2016-01-01

    . This broadened approach will take our thinking beyond current preoccupation with whether or not individuals’ consent was secured for data collection to privacy issues arising from the development of new information on individuals' likely behavior through analysis of already collected data—this new information......In the age of big data we need to think differently about privacy. We need to shift our thinking from definitions of privacy (characteristics of privacy) to models of privacy (how privacy works). Moreover, in addition to the existing models of privacy—the surveillance model and capture model......—we need to also consider a new model: the datafication model presented in this article, wherein new personal information is deduced by employing predictive analytics on already-gathered data. These three models of privacy supplement each other; they are not competing understandings of privacy...

  8. Social Media Users’ Legal Consciousness About Privacy

    Directory of Open Access Journals (Sweden)

    Katharine Sarikakis

    2017-02-01

    Full Text Available This article explores the ways in which the concept of privacy is understood in the context of social media and with regard to users’ awareness of privacy policies and laws in the ‘Post-Snowden’ era. In the light of presumably increased public exposure to privacy debates, generated partly due to the European “Right to be Forgotten” ruling and the Snowden revelations on mass surveillance, this article explores users’ meaning-making of privacy as a matter of legal dimension in terms of its violations and threats online and users’ ways of negotiating their Internet use, in particular social networking sites. Drawing on the concept of legal consciousness, this article explores through focus group interviews the ways in which social media users negotiate privacy violations and what role their understanding of privacy laws (or lack thereof might play in their strategies of negotiation. The findings are threefold: first, privacy is understood almost universally as a matter of controlling one’s own data, including information disclosure even to friends, and is strongly connected to issues about personal autonomy; second, a form of resignation with respect to control over personal data appears to coexist with a recognized need to protect one’s private data, while respondents describe conscious attempts to circumvent systems of monitoring or violation of privacy, and third, despite widespread coverage of privacy legal issues in the press, respondents’ concerns about and engagement in “self-protecting” tactics derive largely from being personally affected by violations of law and privacy.

  9. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  10. CIP's Eighth Annual Educational Software Contest: The Winners.

    Science.gov (United States)

    Donnelly, Denis

    1997-01-01

    Announces the winners of an annual software contest for innovative software in physics education. Winning entries include an application to help students visualize the origin of energy bands in a solid, a package on the radioastronomy of pulsars, and a school-level science simulation program. Also includes student winners, honorable mentions,…

  11. Privacy-Related Context Information for Ubiquitous Health

    Science.gov (United States)

    Nykänen, Pirkko; Ruotsalainen, Pekka

    2014-01-01

    Background Ubiquitous health has been defined as a dynamic network of interconnected systems. A system is composed of one or more information systems, their stakeholders, and the environment. These systems offer health services to individuals and thus implement ubiquitous computing. Privacy is the key challenge for ubiquitous health because of autonomous processing, rich contextual metadata, lack of predefined trust among participants, and the business objectives. Additionally, regulations and policies of stakeholders may be unknown to the individual. Context-sensitive privacy policies are needed to regulate information processing. Objective Our goal was to analyze privacy-related context information and to define the corresponding components and their properties that support privacy management in ubiquitous health. These properties should describe the privacy issues of information processing. With components and their properties, individuals can define context-aware privacy policies and set their privacy preferences that can change in different information-processing situations. Methods Scenarios and user stories are used to analyze typical activities in ubiquitous health to identify main actors, goals, tasks, and stakeholders. Context arises from an activity and, therefore, we can determine different situations, services, and systems to identify properties for privacy-related context information in information-processing situations. Results Privacy-related context information components are situation, environment, individual, information technology system, service, and stakeholder. Combining our analyses and previously identified characteristics of ubiquitous health, more detailed properties for the components are defined. Properties define explicitly what context information for different components is needed to create context-aware privacy policies that can control, limit, and constrain information processing. With properties, we can define, for example, how

  12. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  13. Secure and privacy enhanced gait authentication on smart phone.

    Science.gov (United States)

    Hoang, Thang; Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  14. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    Directory of Open Access Journals (Sweden)

    Thang Hoang

    2014-01-01

    Full Text Available Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR and false rejection rate (FRR of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  15. A Novel, Privacy Preserving, Architecture for Online Social Networks

    Directory of Open Access Journals (Sweden)

    Zhe Wang

    2015-12-01

    Full Text Available The centralized nature of conventional OSNs poses serious risks to the privacy and security of information exchanged between their members. These risks prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host, providing access to it to other members according to its own access-control policy. Unfortunately all existing versions of DOSNs have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy—which is essential for many social communities. Moreover, the DOSN architecture is unable to support useful capabilities such as narrowcasting and profile based search. This paper describes a novel architecture of decentralized OSNs—called DOSC, for “online social community”. DOSC adopts the decentralization idea underlying DOSNs, but it is able to subject the membership of a DOSC-community, and the interaction between its members, to a wide range of policies, including privacy-preserving narrowcasting and profile-sensitive search.

  16. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  17. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    Science.gov (United States)

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  18. Predicting user concerns about online privacy in Hong Kong.

    Science.gov (United States)

    Yao, Mike Z; Zhang, Jinguang

    2008-12-01

    Empirical studies on people's online privacy concerns have largely been conducted in the West. The global threat of privacy violations on the Internet calls for similar studies to be done in non-Western regions. To fill this void, the current study develops a path model to investigate the influence of people's Internet use-related factors, their beliefs in the right to privacy, and psychological need for privacy on Hong Kong people's concerns about online privacy. Survey responses from 332 university students were analyzed. Results from this study show that people's belief in the right to privacy was the most important predictor of their online privacy concerns. It also significantly mediated the relationship between people's psychological need for privacy and their concerns with privacy violations online. Moreover, while frequent use of the Internet may increase concerns about online privacy issues, Internet use diversity may actually reduce such worries. The final model, well supported by the observed data, successfully explained 25% of the variability in user concerns about online privacy.

  19. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  20. Privacy Issues: Journalists Should Balance Need for Privacy with Need to Cover News.

    Science.gov (United States)

    Plopper, Bruce

    1998-01-01

    Notes that journalists have to balance their desire to print the news with personal rights to privacy. Argues that a working knowledge of ethics and law helps journalism students resolve such issues. Discusses ethical issues; legal aspects of privacy; and "training" administrators. Offers a list of questions to ask, six notable court…

  1. The Regulatory Framework for Privacy and Security

    Science.gov (United States)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  2. 5 CFR 890.1055 - Contesting a denial of reinstatement.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS (CONTINUED) FEDERAL EMPLOYEES HEALTH BENEFITS PROGRAM Administrative Sanctions Imposed Against... reconsideration of the initial decision. A provider may contest OPM's decision to deny a reinstatement application... present oral arguments to the debarring official. The provider may be accompanied by counsel when making a...

  3. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...... data is anonymized in the system using data cloaking and data swapping techniques. Finally, the paper empirically demonstrates that the proposed system is effective and feasible....

  4. Social licence, corporate social responsibility and coal seam gas: framing the new political dynamics of contestation

    International Nuclear Information System (INIS)

    Curran, Giorel

    2017-01-01

    This paper explores the contestation dynamics between the unconventional gas mining sector and its challengers through the prism of the social licence to operate. Social licence is a dominant narrative in the mining sector today and as a signifier of the sector's CSR credentials, the term is an influential one. Its capacity to confer project legitimacy, and hence avoid the risks of community opposition, helps explain why most companies seek to gain one. Today both gas proponents and opponents talk the language of social licence: the former to defend their projects, the latter to challenge them. Yet, beyond rhetoric, the precise meaning of social licence remains elusive. This paper uses a case study of community opposition to primarily coal seam gas projects in an eastern Australian region to explore how the absence of a precise meaning for social licence has created a strategic opportunity space for the industry's opponents to invest social licence with a potent democracy frame. This democracy framing has proved particularly effective as a contestation tool and helps explain the outcomes in this case. - Highlights: • Unconventional gas exploration and mining is becoming increasingly contested. • A key way of managing this contestation is through the social licence to operate. • Both proponents and opponents of gas mining use social licence strategically. • Social licence has become increasingly politicised. • A democratic frame assists the effectiveness of contestation.

  5. Data Security and Privacy in Apps for Dementia: An Analysis of Existing Privacy Policies.

    Science.gov (United States)

    Rosenfeld, Lisa; Torous, John; Vahia, Ipsit V

    2017-08-01

    Despite tremendous growth in the number of health applications (apps), little is known about how well these apps protect their users' health-related data. This gap in knowledge is of particular concern for apps targeting people with dementia, whose cognitive impairment puts them at increased risk of privacy breaches. In this article, we determine how many dementia apps have privacy policies and how well they protect user data. Our analysis included all iPhone apps that matched the search terms "medical + dementia" or "health & fitness + dementia" and collected user-generated content. We evaluated all available privacy policies for these apps based on criteria that systematically measure how individual user data is handled. Seventy-two apps met the above search teams and collected user data. Of these, only 33 (46%) had an available privacy policy. Nineteen of the 33 with policies (58%) were specific to the app in question, and 25 (76%) specified how individual-user as opposed to aggregate data would be handled. Among these, there was a preponderance of missing information, the majority acknowledged collecting individual data for internal purposes, and most admitted to instances in which they would share user data with outside parties. At present, the majority of health apps focused on dementia lack a privacy policy, and those that do exist lack clarity. Bolstering safeguards and improving communication about privacy protections will help facilitate consumer trust in apps, thereby enabling more widespread and meaningful use by people with dementia and those involved in their care. Copyright © 2017. Published by Elsevier Inc.

  6. Fuzzy Privacy Decision for Context-Aware Access Personal Information

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qingsheng; QI Yong; ZHAO Jizhong; HOU Di; NIU Yujie

    2007-01-01

    A context-aware privacy protection framework was designed for context-aware services and privacy control methods about access personal information in pervasive environment. In the process of user's privacy decision, it can produce fuzzy privacy decision as the change of personal information sensitivity and personal information receiver trust. The uncertain privacy decision model was proposed about personal information disclosure based on the change of personal information receiver trust and personal information sensitivity. A fuzzy privacy decision information system was designed according to this model. Personal privacy control policies can be extracted from this information system by using rough set theory. It also solves the problem about learning privacy control policies of personal information disclosure.

  7. Privacy concerns, dead or misunderstood? : The perceptions of privacy amongst the young and old

    NARCIS (Netherlands)

    Steijn, Wouter; Vedder, Anton

    2015-01-01

    The concept of ‘privacy’ has become an important topic for academics and policy-makers. Ubiquitous computing and internet access raise new questions in relation to privacy in the virtual world, including individuals’ appreciation of privacy and how this can be safeguarded. This article contributes

  8. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  9. Privacy in the Genomic Era.

    Science.gov (United States)

    Naveed, Muhammad; Ayday, Erman; Clayton, Ellen W; Fellay, Jacques; Gunter, Carl A; Hubaux, Jean-Pierre; Malin, Bradley A; Wang, Xiaofeng

    2015-09-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward.

  10. Comparative Approaches to Biobanks and Privacy.

    Science.gov (United States)

    Rothstein, Mark A; Knoppers, Bartha Maria; Harrell, Heather L

    2016-03-01

    Laws in the 20 jurisdictions studied for this project display many similar approaches to protecting privacy in biobank research. Although few have enacted biobank-specific legislation, many countries address biobanking within other laws. All provide for some oversight mechanisms for biobank research, even though the nature of that oversight varies between jurisdictions. Most have some sort of controlled access system in place for research with biobank specimens. While broad consent models facilitate biobanking, countries without national or federated biobanks have been slow to adopt broad consent. International guidelines have facilitated sharing and generally take a proportional risk approach, but many countries have provisions guiding international sharing and a few even limit international sharing. Although privacy laws may not prohibit international collaborations, the multi-prong approach to privacy unique to each jurisdiction can complicate international sharing. These symposium issues can serve as a resource for explaining the sometimes intricate privacy laws in each studied jurisdiction, outlining the key issues with regards to privacy and biobanking, and serving to describe a framework for the process of harmonization of privacy laws. © 2016 American Society of Law, Medicine & Ethics.

  11. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed for vari......This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach......, the model is established by first considering the social function of privacy in everyday life, which in turn lets us determine which different domains will be considered as private, and finally identify the different types of privacy invasion. This underlying model (function – domain – invasion) then serves...

  12. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    The Vision of the 5G enabled connected society is highly based on the evolution and implementation of Internet of Things. This involves, amongst others, a significant raise in devices, sensors and communication in pervasive interconnections as well as cooperation amongst devices and entities across...... the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  13. Privacy-preserving Kruskal-Wallis test.

    Science.gov (United States)

    Guo, Suxin; Zhong, Sheng; Zhang, Aidong

    2013-10-01

    Statistical tests are powerful tools for data analysis. Kruskal-Wallis test is a non-parametric statistical test that evaluates whether two or more samples are drawn from the same distribution. It is commonly used in various areas. But sometimes, the use of the method is impeded by privacy issues raised in fields such as biomedical research and clinical data analysis because of the confidential information contained in the data. In this work, we give a privacy-preserving solution for the Kruskal-Wallis test which enables two or more parties to coordinately perform the test on the union of their data without compromising their data privacy. To the best of our knowledge, this is the first work that solves the privacy issues in the use of the Kruskal-Wallis test on distributed data. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Negotiating privacy in surveillant welfare relations

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Lauritsen, Peter; Bøge, Ask Risom

    . However, while privacy is central to debates of surveillance, it has proven less productive as an analytical resource for studying surveillance in practice. Consequently, this paper reviews different conceptualisations of privacy in relation to welfare and surveillance and argues for strengthening...... the analytical capacity of the concept by rendering it a situated and relational concept. The argument is developed through a research and design project called Teledialogue meant to improve the relation between case managers and children placed at institutions or in foster families. Privacy in Teledialogue...... notion of privacy are discussed in relation to both research- and public debates on surveillance in a welfare setting....

  15. 78 FR 21180 - Announcement of the 2013 SBA-Visa Export Video Contest Under the America COMPETES Reauthorization...

    Science.gov (United States)

    2013-04-09

    ... submitted per business. Videos must not contain violence, profanity, sex, images of a prurient nature, or... SMALL BUSINESS ADMINISTRATION Announcement of the 2013 SBA-Visa Export Video Contest Under the... the ``Cosponsors'') announce a video contest for eligible small businesses to showcase the advantages...

  16. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  17. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... from a project on privacy issues, identifying and resolving the privacy risks, and approval by a... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy program terms and definitions. 701.101... DEPARTMENT OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.101 Privacy program terms and...

  18. An informational theory of privacy

    NARCIS (Netherlands)

    Schottmuller, C.; Jann, Ole

    2016-01-01

    We develop a theory that explains how and when privacy can increase welfare. Without privacy, some individuals misrepresent their preferences, because they will otherwise be statistically discriminated against. This "chilling effect" hurts them individually, and impairs information aggregation. The

  19. 78 FR 25489 - Privacy Act of 1974: New System of Records

    Science.gov (United States)

    2013-05-01

    ... will be stored in a locked file cabinet in a locked file room or in digital form in a password... 308. Contesting record procedures: Any individual who wants to contest the contents of a record should...

  20. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  1. SmartPrivacy for the smart grid : embedding privacy into the design of electricity conservation

    Energy Technology Data Exchange (ETDEWEB)

    Cavoukian, A. [Ontario Information and Privacy Commissioner, Toronto, ON (Canada); Polonetsky, J.; Wolf, C. [Future of Privacy Forum, Washington, DC (United States)

    2009-11-15

    Modernization efforts are underway to make the current electrical grid smarter. The future of the Smart Grid will be capable of informing consumers of their day-to-day energy use, curbing greenhouse gas emissions, and reducing consumers' energy bills. However, the Smart Grid also brings with it the possibility of collecting detailed information on individual energy consumption use and patterns within peoples' homes. This paper discussed the Smart Grid and its benefits, as well as the questions that should be examined regarding privacy. The paper also outlined the concept of SmartPrivacy and discussed its application to the Smart Grid scenario. Privacy by design foundational principles and Smart Grid components were also presented in an appendix. It was concluded that the information collected on a Smart Grid will form a library of personal information. The mishandling of this information could be extremely invasive of consumer privacy. 46 refs., 1 fig., 2 appendices.

  2. 16 CFR 313.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  3. Preserving differential privacy under finite-precision semantics.

    Directory of Open Access Journals (Sweden)

    Ivan Gazeau

    2013-06-01

    Full Text Available The approximation introduced by finite-precision representation of continuous data can induce arbitrarily large information leaks even when the computation using exact semantics is secure. Such leakage can thus undermine design efforts aimed at protecting sensitive information. We focus here on differential privacy, an approach to privacy that emerged from the area of statistical databases and is now widely applied also in other domains. In this approach, privacy is protected by the addition of noise to a true (private value. To date, this approach to privacy has been proved correct only in the ideal case in which computations are made using an idealized, infinite-precision semantics. In this paper, we analyze the situation at the implementation level, where the semantics is necessarily finite-precision, i.e. the representation of real numbers and the operations on them, are rounded according to some level of precision. We show that in general there are violations of the differential privacy property, and we study the conditions under which we can still guarantee a limited (but, arguably, totally acceptable variant of the property, under only a minor degradation of the privacy level. Finally, we illustrate our results on two cases of noise-generating distributions: the standard Laplacian mechanism commonly used in differential privacy, and a bivariate version of the Laplacian recently introduced in the setting of privacy-aware geolocation.

  4. Contest success function with the possibility of a draw: axiomatization

    Czech Academy of Sciences Publication Activity Database

    Blavatskyy, Pavlo R.

    -, č. 208 (2004), s. 1-21 ISSN 1424-0459 Institutional research plan: CEZ:AV0Z7085904 Keywords : contest success function * logit * irrelevant alternatives Subject RIV: AH - Economics http://www.iew.unizh.ch/wp/iewwp208.pdf

  5. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  6. 12 CFR 716.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  7. Does popularity matter in a TV song competition? Evidence from a national music contest

    OpenAIRE

    Budzinski, Oliver; Pannicke, Julia

    2017-01-01

    There is a considerable amount of literature analyzing factors of success in music contests, in particular those where the audience votes for the winner. However, one factor that is highlighted by the economic theory of stardom is generally neglected in the literature. In this paper, we tackle this research gap by focusing on a national music contest in Germany and investigating how popularity of the participating artists influences the final voting results. We employ two different concepts o...

  8. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    with any other entity, including the service provider. Such privacy concerns lead to trust issues between entities, which clearly damages the functioning of the service and even blocks cooperation between entities with similar data sets. To enable joint efforts with private data, we propose a protocol......, or in some cases, information from different databases is pooled to enrich the data so that the merged database can improve the clustering effort. However, in either case, the content of the database may be privacy sensitive and/or commercially valuable such that the owners may not want to share their data...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  9. Culture, Privacy Conception and Privacy Concern: Evidence from Europe before PRISM

    OpenAIRE

    Omrani, Nessrine; Soulié, Nicolas

    2017-01-01

    This article analyses individuals’ online privacy concerns between cultural country groups. We use a dataset of more than 14 000 Internet users collected by the European Union in 2010 in 26 EU countries. We use a probit model to examine the variables associated with the probability of being concerned about privacy, in order to draw policy and regulatory implications. The results show that women and poor people are more concerned than their counterparts. People who often use Internet are not p...

  10. Another Tale of Two Cities: Contestation of Globalization in Odia ...

    African Journals Online (AJOL)

    Another Tale of Two Cities: Contestation of Globalization in Odia Ofeimun's ... state, in all its social, economic and cultural aspirations, coupled with its trappings of ... as a result of such issues as capitalism, race, nationality, identity and nativity.

  11. Guaranteeing Privacy-Observing Data Exchange

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2016-01-01

    Privacy is a major concern in large of parts of the world when exchanging information. Ideally, we would like to be able to have fine-grained control about how information that we deem sensitive can be propagated and used. While privacy policy languages exist, it is not possible to control whether...... the entity that receives data is living up to its own policy specification. In this work we present our initial work on an approach that empowers data owners to specify their privacy preferences, and data consumers to specify their data needs. Using a static analysis of the two specifications, our approach...... then finds a communication scheme that complies with these preferences and needs. While applicable to online transactions, the same techniques can be used in development of IT systems dealing with sensitive data. To the best of our knowledge, no existing privacy policy languages supports negotiation...

  12. Unravelling the Contested Nature of Carbon Capture and Storage

    NARCIS (Netherlands)

    van Egmond, Sander

    2016-01-01

    Our climate is changing. Carbon Capture and Storage (CCS) has been identified as an important technology to reduce CO2 emissions in order to avoid dangerous climate change. The implementation of CCS is however slow and CCS is publicly contested. This thesis focuses on the debate on this technology.

  13. Privacy and policy for genetic research.

    Science.gov (United States)

    DeCew, Judith Wagner

    2004-01-01

    I begin with a discussion of the value of privacy and what we lose without it. I then turn to the difficulties of preserving privacy for genetic information and other medical records in the face of advanced information technology. I suggest three alternative public policy approaches to the problem of protecting individual privacy and also preserving databases for genetic research: (1) governmental guidelines and centralized databases, (2) corporate self-regulation, and (3) my hybrid approach. None of these are unproblematic; I discuss strengths and drawbacks of each, emphasizing the importance of protecting the privacy of sensitive medical and genetic information as well as letting information technology flourish to aid patient care, public health and scientific research.

  14. Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment

    Directory of Open Access Journals (Sweden)

    Yanwei Xu

    2017-01-01

    Full Text Available With the increasing volume of web services in the cloud environment, Collaborative Filtering- (CF- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to other cloud platforms due to privacy concerns, which decreases the feasibility of cross-cloud service recommendation severely. Second, the historical service usage data recorded in each cloud platform may update over time, which reduces the recommendation scalability significantly. In view of these two challenges, a novel privacy-preserving and scalable service recommendation approach based on SimHash, named SerRecSimHash, is proposed in this paper. Finally, through a set of experiments deployed on a real distributed service quality dataset WS-DREAM, we validate the feasibility of our proposal in terms of recommendation accuracy and efficiency while guaranteeing privacy-preservation.

  15. Mathematical Modeling in the People's Republic of China--Indicators of Participation and Performance on COMAP's Modeling Contest

    Science.gov (United States)

    Tian, Xiaoxi

    2014-01-01

    In recent years, Mainland Chinese teams have been the dominant participants in the two COMAP-sponsored mathematical modeling competitions: the Mathematical Contest in Modeling (MCM) and the Interdisciplinary Contest in Modeling (ICM). This study examines five factors that lead to the Chinese teams' dramatic increase in participation rate and…

  16. Positive Affect Relevant to Epistemic Curiosity to Reflect Continuance Intention to Join a Hands-On Making Contest

    Science.gov (United States)

    Hong, Jon-Chao; Hwang, Ming-Yueh; Szeto, Elson; Tai, Kai-Hsin; Tsai, Chi-Ruei

    2016-01-01

    Hands-on making (e.g., "Maker") has become prevalent in current educational settings. To understand the role that students' epistemic curiosity plays in hands-on making contests, this study explored its correlation to students' positive affect and continuance intention to participate in a hands-on making contest called…

  17. Open Data for Global Multimodal Land Use Classification: Outcome of the 2017 IEEE GRSS Data Fusion Contest

    NARCIS (Netherlands)

    Yokoya, Naoto; Ghamisi, Pedram; Xia, Junshi; Sukhanov, Sergey; Heremans, Roel; Tankoyeu, Ivan; Bechtel, Benjamin; Saux, Le Bertrand; Moser, Gabriele; Tuia, Devis

    2018-01-01

    In this paper, we present the scientific outcomes of the 2017 Data Fusion Contest organized by the Image Analysis and Data Fusion Technical Committee of the IEEE Geoscience and Remote Sensing Society. The 2017 Contest was aimed at addressing the problem of local climate zones classification based on

  18. Contesting “Iraq”: a social constructivist explanation | Bailie ...

    African Journals Online (AJOL)

    Using social constructivism as a theoretical lens of inquiry, sense is made of this migration. The empirical evidence that accompanies this theoretical work is drawn from the debate over the conflict in Iraq. This debate is used as a means by which to bring the contestation over the notion of “civil war” to the fore and reveal the ...

  19. Achieving Network Level Privacy in Wireless Sensor Networks†

    Science.gov (United States)

    Shaikh, Riaz Ahmed; Jameel, Hassan; d’Auriol, Brian J.; Lee, Heejo; Lee, Sungyoung; Song, Young-Jae

    2010-01-01

    Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power), sensor networks (e.g., mobility and topology) and QoS issues (e.g., packet reach-ability and timeliness). In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks. PMID:22294881

  20. FCJ-195 Privacy, Responsibility, and Human Rights Activism

    Directory of Open Access Journals (Sweden)

    Becky Kazansky

    2015-06-01

    Full Text Available In this article, we argue that many difficulties associated with the protection of digital privacy are rooted in the framing of privacy as a predominantly individual responsibility. We examine how models of privacy protection, such as Notice and Choice, contribute to the ‘responsibilisation’ of human rights activists who rely on the use of technologies for their work. We also consider how a group of human rights activists countered technology-mediated threats that this ‘responsibilisation’ causes by developing a collective approach to address their digital privacy and security needs. We conclude this article by discussing how technological tools used to maintain or counter the loss of privacy can be improved in order to support the privacy and digital security of human rights activists.

  1. Achieving Network Level Privacy in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2010-02-01

    Full Text Available Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power, sensor networks (e.g., mobility and topology and QoS issues (e.g., packet reach-ability and timeliness. In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  2. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely future of privacy.

  3. Comparison of Periorbital Anthropometry Between Beauty Pageant Contestants and Ordinary Young Women with Korean Ethnicity: A Three-Dimensional Photogrammetric Analysis.

    Science.gov (United States)

    Kim, Young Chul; Kwon, Jin Geun; Kim, Sung Chan; Huh, Chang Hun; Kim, Hee Jin; Oh, Tae Suk; Koh, Kyung S; Choi, Jong Woo; Jeong, Woo Shik

    2018-04-01

    The purpose of this study is to investigate the differences in the periorbital anthropometry between national Beauty Pageant Contestants and Ordinary Young Women with Korean ethnicity. Forty-three Beauty Pageant Contestants who were elected for the national beauty contest and forty-eight Ordinary Young Women underwent 3D photography. The authors analyzed 3D photogrammetric measures regarding periorbital soft tissue. The palpebral fissure width was significantly higher in the Beauty Pageant Contestants than the Ordinary Young Women (27.7 ± 1.2 vs. 26.3 ± 1.6 mm) (p Beauty Pageant Contestants (11.5. ± 1.0 vs. 9.1 ± 1.2 mm) (p Beauty Pageant Contestants (intercanthal width, 34.3 ± 1.86 mm vs. 36.7 ± 3.1 mm; upper eyelid height, 11.5 ± 1.4 mm vs. 13.4 ± 2.3 mm) (p Beauty Pageant Contestants (nasal width, 38.0 ± 1.8 vs. 39.5 ± 2.2 mm; midfacial width 144.5 ± 3.9 vs. 146.9 ± 5.2 mm) (p Beauty Pageant Contestants are wide-set eyes, larger palpebral fissure in width and height, relatively small upper eyelid height and intercanthal width, and relatively small nose and facial width compared to normal women. Our anthropometric results can be referable values for Asian eyelid surgery and help surgeons to establish individualized surgical planning. This journal requires that authors assign a level of evidence to each article. For a full description of these Evidence-Based Medicine ratings, please refer to the Table of Contents or the online Instructions to Authors www.springer.com/00266 .

  4. 48 CFR 352.224-70 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Privacy Act. 352.224-70... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 352.224-70 Privacy Act. As prescribed in 324.103(b)(2), the Contracting Officer shall insert the following clause: Privacy Act (January...

  5. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  6. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  7. Facebook: Personality and privacy on profiles

    OpenAIRE

    Casado Riera, Carla; Oberst, Ursula; Carbonell, Xavier

    2015-01-01

    The aim of this study was to study the possible relationship between the privacy settings in Facebook profiles and two personality dimensions, extraversion and neuroticism, in relation to gender. The Privacy on Facebook Questionnaire and the Eysenck Personality Inventory was applied to a sample of 92 womenand 70 men, all users of Facebook. No significant relationship was found between extraversion or neuroticism and the privacy settings of Facebook profiles, but the results showed significant...

  8. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  9. New threats to health data privacy

    Directory of Open Access Journals (Sweden)

    Li Fengjun

    2011-11-01

    Full Text Available Abstract Background Along with the rapid digitalization of health data (e.g. Electronic Health Records, there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  10. Giving Back — IDRC photo contest winner shares prize with ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-01-28

    Jan 28, 2011 ... Giving Back — IDRC photo contest winner shares prize with Senegalese colleagues ... South or the developed world are tackling the challenges of urban living. ... Upon his return to Canada, the 26-year-old wrote to IDRC the ...

  11. A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy

    Science.gov (United States)

    Popic, Victoria; Batzoglou, Serafim

    2017-05-01

    Low-cost clouds can alleviate the compute and storage burden of the genome sequencing data explosion. However, moving personal genome data analysis to the cloud can raise serious privacy concerns. Here, we devise a method named Balaur, a privacy preserving read mapper for hybrid clouds based on locality sensitive hashing and kmer voting. Balaur can securely outsource a substantial fraction of the computation to the public cloud, while being highly competitive in accuracy and speed with non-private state-of-the-art read aligners on short read data. We also show that the method is significantly faster than the state of the art in long read mapping. Therefore, Balaur can enable institutions handling massive genomic data sets to shift part of their analysis to the cloud without sacrificing accuracy or exposing sensitive information to an untrusted third party.

  12. PrivateRide: A Privacy-Enhanced Ride-Hailing Service

    Directory of Open Access Journals (Sweden)

    Pham Anh

    2017-04-01

    Full Text Available In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs, an online marketplace that enables accredited drivers to use their own cars to drive ride-hailing users. Unlike other transportation services, RHSs raise significant privacy concerns, as providers are able to track the precise mobility patterns of millions of riders worldwide. We present the first survey and analysis of the privacy threats in RHSs. Our analysis exposes high-risk privacy threats that do not occur in conventional taxi services. Therefore, we propose PrivateRide, a privacy-enhancing and practical solution that offers anonymity and location privacy for riders, and protects drivers’ information from harvesting attacks. PrivateRide lowers the high-risk privacy threats in RHSs to a level that is at least as low as that of many taxi services. Using real data-sets from Uber and taxi rides, we show that PrivateRide significantly enhances riders’ privacy, while preserving tangible accuracy in ride matching and fare calculation, with only negligible effects on convenience. Moreover, by using our Android implementation for experimental evaluations, we show that PrivateRide’s overhead during ride setup is negligible. In short, we enable privacy-conscious riders to achieve levels of privacy that are not possible in current RHSs and even in some conventional taxi services, thereby offering a potential business differentiator.

  13. Privacy Practices of Health Social Networking Sites: Implications for Privacy and Data Security in Online Cancer Communities.

    Science.gov (United States)

    Charbonneau, Deborah H

    2016-08-01

    While online communities for social support continue to grow, little is known about the state of privacy practices of health social networking sites. This article reports on a structured content analysis of privacy policies and disclosure practices for 25 online ovarian cancer communities. All of the health social networking sites in the study sample provided privacy statements to users, yet privacy practices varied considerably across the sites. The majority of sites informed users that personal information was collected about participants and shared with third parties (96%, n = 24). Furthermore, more than half of the sites (56%, n = 14) stated that cookies technology was used to track user behaviors. Despite these disclosures, only 36% (n = 9) offered opt-out choices for sharing data with third parties. In addition, very few of the sites (28%, n = 7) allowed individuals to delete their personal information. Discussions about specific security measures used to protect personal information were largely missing. Implications for privacy, confidentiality, consumer choice, and data safety in online environments are discussed. Overall, nurses and other health professionals can utilize these findings to encourage individuals seeking online support and participating in social networking sites to build awareness of privacy risks to better protect their personal health information in the digital age.

  14. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  15. Privacy and CHI : methodologies for studying privacy issues

    NARCIS (Netherlands)

    Patil, S.; Romero, N.A.; Karat, J.

    2006-01-01

    This workshop aims to reflect on methodologies to empirically study privacy issues related to advanced technology. The goal is to address methodological concerns by drawing upon both theoretical perspectives as well as practical experiences.

  16. Patient Privacy in the Era of Big Data

    Directory of Open Access Journals (Sweden)

    Mehmet Kayaalp

    2018-02-01

    Full Text Available Protecting patient privacy requires various technical tools. It involves regulations for sharing, de-identifying, securely storing, transmitting and handling protected health information (PHI. It involves privacy laws and legal agreements. It requires establishing rules for monitoring privacy leaks, determining actions when they occur, and handling de-identified clinical narrative reports. Deidentification is one such indispensable instrument in this set of privacy tools

  17. Biobanking and Privacy in India.

    Science.gov (United States)

    Chaturvedi, Sachin; Srinivas, Krishna Ravi; Muthuswamy, Vasantha

    2016-03-01

    Biobank-based research is not specifically addressed in Indian statutory law and therefore Indian Council for Medical Research guidelines are the primary regulators of biobank research in India. The guidelines allow for broad consent and for any level of identification of specimens. Although privacy is a fundamental right under the Indian Constitution, courts have limited this right when it conflicts with other rights or with the public interest. Furthermore, there is no established privacy test or actionable privacy right in the common law of India. In order to facilitate biobank-based research, both of these lacunae should be addressed by statutory law specifically addressing biobanking and more directly addressing the accompanying privacy concerns. A biobank-specific law should be written with international guidelines in mind, but harmonization with other laws should not be attempted until after India has created a law addressing biobank research within the unique legal and cultural environment of India. © 2016 American Society of Law, Medicine & Ethics.

  18. Location Privacy Techniques in Client-Server Architectures

    DEFF Research Database (Denmark)

    Jensen, Christian Søndergaard; Lu, Hua; Yiu, Man Lung

    2009-01-01

    A typical location-based service returns nearby points of interest in response to a user location. As such services are becoming increasingly available and popular, location privacy emerges as an important issue. In a system that does not offer location privacy, users must disclose their exact...... locations in order to receive the desired services. We view location privacy as an enabling technology that may lead to increased use of location-based services. In this chapter, we consider location privacy techniques that work in traditional client-server architectures without any trusted components other....... Third, their effectiveness is independent of the distribution of other users, unlike the k-anonymity approach. The chapter characterizes the privacy models assumed by existing techniques and categorizes these according to their approach. The techniques are then covered in turn according...

  19. Privacy amplification for quantum key distribution

    International Nuclear Information System (INIS)

    Watanabe, Yodai

    2007-01-01

    This paper examines classical privacy amplification using a universal family of hash functions. In quantum key distribution, the adversary's measurement can wait until the choice of hash functions is announced, and so the adversary's information may depend on the choice. Therefore the existing result on classical privacy amplification, which assumes the independence of the choice from the other random variables, is not applicable to this case. This paper provides a security proof of privacy amplification which is valid even when the adversary's information may depend on the choice of hash functions. The compression rate of the proposed privacy amplification can be taken to be the same as that of the existing one with an exponentially small loss in secrecy of a final key. (fast track communication)

  20. Guobin Yang (ed.), China’s Contested Internet,

    OpenAIRE

    Arsène, Séverine

    2016-01-01

    China’s Contested Internet is a collective book composed of 10 chapters, seven of which were previously published in a special issue of China Information in July 2014. With case studies ranging from around 2006 to 2013, this collection of papers covers some of the most salient phenomena that have characterised the Chinese Internet over the last decade: e-government initiatives such as public consultation on the health system reform project (Steven J. Balla), and municipal microblogs (Jesper S...

  1. 10 CFR 1304.103 - Privacy Act inquiries.

    Science.gov (United States)

    2010-01-01

    ... writing may be sent to: Privacy Act Officer, U.S. Nuclear Waste Technical Review Board, 2300 Clarendon... NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... contains a record pertaining to him or her may file a request in person or in writing, via the internet, or...

  2. The role of privacy protection in healthcare information systems adoption.

    Science.gov (United States)

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  3. A Model-Based Privacy Compliance Checker

    OpenAIRE

    Siani Pearson; Damien Allison

    2009-01-01

    Increasingly, e-business organisations are coming under pressure to be compliant to a range of privacy legislation, policies and best practice. There is a clear need for high-level management and administrators to be able to assess in a dynamic, customisable way the degree to which their enterprise complies with these. We outline a solution to this problem in the form of a model-driven automated privacy process analysis and configuration checking system. This system models privacy compliance ...

  4. Privacy Law and Print Photojournalism.

    Science.gov (United States)

    Dykhouse, Caroline Dow

    Reviews of publications about privacy law, of recent court actions, and of interviews with newspaper photographers and attorneys indicate that torts of privacy often conflict with the freedoms to publish and to gather news. Although some guidelines have already been established (about running distorted pictures, "stealing" pictures, taking…

  5. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  6. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  7. Smart Grid Privacy through Distributed Trust

    Science.gov (United States)

    Lipton, Benjamin

    Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed protecting privacy by aggregating user data before it reaches the utility, using techniques of homomorphic encryption to prevent exposure of unaggregated values. However, such schemes generally require users to trust in the correct operation of a single aggregation server. We propose two alternative systems based on secret sharing techniques that distribute this trust among multiple service providers, protecting user privacy against a misbehaving server. We also provide an extensive evaluation of the systems considered, comparing their robustness to privacy compromise, error handling, computational performance, and data transmission costs. We conclude that while all the systems should be computationally feasible on smart meters, the two methods based on secret sharing require much less computation while also providing better protection against corrupted aggregators. Building systems using these techniques could help defend the privacy of electricity customers, as well as customers of other utilities as they move to a more data-driven architecture.

  8. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  9. A Novel Cloud Computing Algorithm of Security and Privacy

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chen

    2013-01-01

    Full Text Available The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS, to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.

  10. Privacy-Preserving Restricted Boltzmann Machine

    Directory of Open Access Journals (Sweden)

    Yu Li

    2014-01-01

    Full Text Available With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM. The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model.

  11. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  12. Story Lab: Student Data Privacy

    Science.gov (United States)

    Herold, Benjamin

    2015-01-01

    Student data privacy is an increasingly high-profile--and controversial--issue that touches schools and families across the country. There are stories to tell in virtually every community. About three dozen states have passed legislation addressing student data privacy in the past two years, and eight different proposals were floating around…

  13. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  14. Ensuring privacy in the study of pathogen genetics.

    Science.gov (United States)

    Mehta, Sanjay R; Vinterbo, Staal A; Little, Susan J

    2014-08-01

    Rapid growth in the genetic sequencing of pathogens in recent years has led to the creation of large sequence databases. This aggregated sequence data can be very useful for tracking and predicting epidemics of infectious diseases. However, the balance between the potential public health benefit and the risk to personal privacy for individuals whose genetic data (personal or pathogen) are included in such work has been difficult to delineate, because neither the true benefit nor the actual risk to participants has been adequately defined. Existing approaches to minimise the risk of privacy loss to participants are based on de-identification of data by removal of a predefined set of identifiers. These approaches neither guarantee privacy nor protect the usefulness of the data. We propose a new approach to privacy protection that will quantify the risk to participants, while still maximising the usefulness of the data to researchers. This emerging standard in privacy protection and disclosure control, which is known as differential privacy, uses a process-driven rather than data-centred approach to protecting privacy. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Personalized privacy-preserving frequent itemset mining using randomized response.

    Science.gov (United States)

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  16. Privacy as virtue: searching for a new privacy paradigm in the age of Big Data

    NARCIS (Netherlands)

    van der Sloot, B.; Beyvers, E.; Helm, P.; Hennig, M.; Keckeis, C.; Kreknin, I.; Püschel, F.

    2017-01-01

    Originally, privacy was conceived primarily as a duty of the state not to abuse its powers It could not, for example, enter a private house without legitimate reason or reasonable suspicion that the owner of the house had engaged in, for example, criminal conduct Gradually, however, privacy has been

  17. Contestation in multi-level party systems with institutional constraints: A look at ethnically divided countries in Central and Eastern Europe

    DEFF Research Database (Denmark)

    Bochsler, Daniel

    2011-01-01

    Contestation is one of the main dimensions of democratic representation. Mainly, research has focused on contestation at the national level, however the concept equally applies for regional and for local politics. This paper discusses the effect of restrictive national-level institutions...... on political plurality in elections at the subnational level. Its argument is two-fold; firstly, the effect of restrictive political institutions spans over different levels of elections, and therefore restrictive national institutions also restrict political competition in subnational elections. This effect...... might hamper political contestation at the local and regional level if restrictive national institutions meet territorially structured political conflicts. Secondly, where free and politically relevant elections are fought, there is a genuine need for political contestation. Where the multi-level logic...

  18. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  19. Efficient Dynamic Searchable Encryption with Forward Privacy

    Directory of Open Access Journals (Sweden)

    Etemad Mohammad

    2018-01-01

    Full Text Available Searchable symmetric encryption (SSE enables a client to perform searches over its outsourced encrypted files while preserving privacy of the files and queries. Dynamic schemes, where files can be added or removed, leak more information than static schemes. For dynamic schemes, forward privacy requires that a newly added file cannot be linked to previous searches. We present a new dynamic SSE scheme that achieves forward privacy by replacing the keys revealed to the server on each search. Our scheme is efficient and parallelizable and outperforms the best previous schemes providing forward privacy, and achieves competitive performance with dynamic schemes without forward privacy. We provide a full security proof in the random oracle model. In our experiments on the Wikipedia archive of about four million pages, the server takes one second to perform a search with 100,000 results.

  20. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  1. The Cultural Ideological Contestation in National Examination

    Directory of Open Access Journals (Sweden)

    Kerta Adhi Made

    2018-01-01

    Full Text Available The purpose of this research was to find out the forms and the factors leading to the contestation of cultural ideology in National Examination. This research utilized Qualitative Research method and the approach of Cultural Studies. Based on the analysis, it was found that the forms of ideological contestation, specifically, centralistic, prioritizing on the result of cognitive domain, and imaging. The factors which caused consisted of political of education, state policies, and socio-cultural. The implications of this research were (1 There was shifting of educational values into capitalism, (2 The meaning of learning became limited in which it was just purposed at facing National Examination, (3 Educational services have shifted from humanist public services to commodification of education, with the result that honesty was marginalized. Eventhough the government has developed sophisticated system and very tight supervision, if the character of the subjects are not formed and cultured, accordingly, the National Examination stated honest and achievement oriented will be just a slogan. Therefore, the education system needs to be improved. The education paradigm which is more emphasized on the increasing of intellectual intelligence by multiple choice tests and scores needs to be deconstructed by adjusting with Indonesian cultural values based on “Pancasila” as ideological foundation and developing character education to the children from early age.

  2. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  3. An overview of human genetic privacy.

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2017-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. © 2016 New York Academy of Sciences.

  4. An overview of human genetic privacy

    Science.gov (United States)

    Shi, Xinghua; Wu, Xintao

    2016-01-01

    The study of human genomics is becoming a Big Data science, owing to recent biotechnological advances leading to availability of millions of personal genome sequences, which can be combined with biometric measurements from mobile apps and fitness trackers, and of human behavior data monitored from mobile devices and social media. With increasing research opportunities for integrative genomic studies through data sharing, genetic privacy emerges as a legitimate yet challenging concern that needs to be carefully addressed, not only for individuals but also for their families. In this paper, we present potential genetic privacy risks and relevant ethics and regulations for sharing and protecting human genomics data. We also describe the techniques for protecting human genetic privacy from three broad perspectives: controlled access, differential privacy, and cryptographic solutions. PMID:27626905

  5. 17 CFR 160.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-04-01

    ... examples. 160.2 Section 160.2 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form..., although use of the model privacy form is not required. (b) Examples. The examples in this part are not...

  6. Contestation des Nobel une tradition aussi ancienne que leur attribution

    CERN Document Server

    Sevestre, G

    2003-01-01

    "La contestation des Nobel, avec cette annee la campagne lancee par un Americain afin de faire reconnaitre son role dans la mise au point de l'imagerie a resonance magnetique (IRM), constitue une tradition, quasiment aussi ancienne que l'attribution de ces distinctions" (1 page).

  7. Privacy-preserving digital rights management

    NARCIS (Netherlands)

    Conrado, C.; Petkovic, M.; Jonker, W.; Jonker, W.; Petkovic, M.

    2004-01-01

    DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is how to allow a user to interact with the system in an anonymous/pseudonymous way, while

  8. Evolving Governance and Contested Water Reforms in Australia’s Murray Darling Basin

    Directory of Open Access Journals (Sweden)

    Jason Alexandra

    2018-01-01

    Full Text Available This paper explores the ways water governance adapts to changing social values and political imperatives by examining the case of water policy reforms in Australia’s Murray Darling Basin. Over more than two decades, Australia’s water reforms have explicitly aimed to promote ecological sustainability and economic efficiency, attempting to balance pro-market, micro-economic reforms with broader social and sustainability goals. Despite the formality of Australia’s intergovernmental agreements, water reforms have been expensive and heavily contested, experiencing many implementation challenges. However, water market reforms have generally been regarded as successful, enabling the reallocation of water for environmental and extractive uses, contributing to flexibility and adaptive capacity. Recognising that discursive contestation is central to policy development, the paper documents the way the reform processes have attempted to broker compromises between three competing policy paradigms—national development, economic rationalism and environmentalism. These inherent tensions resulted in prolonged contests for influence over policy directions long after formal statements of policy intent by Governments. Given that climate change is driving the need for water governance reforms, the paper looks to what lessons can be learnt about the redesigns of meta-governance arrangements, including through structured commitments to independent audits and evaluations that can provide the feedback needed for adaptive governance and policy learning.

  9. Privacy-preserving Identity Management

    OpenAIRE

    Milutinovic, Milica

    2015-01-01

    With the technological advances and the evolution of online services, user privacy is becoming a crucial issue in the modern day society. Privacy in the general sense refers to individuals’ ability to protect information about themselves and selectively present it to other entities. This concept is nowadays strongly affected by everyday practices that assume personal data disclosure, such as online shopping and participation in loyalty schemes. This makes it difficult for an individual to con...

  10. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    Science.gov (United States)

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  11. Towards context adaptive privacy decisions in ubiquitous computing

    NARCIS (Netherlands)

    Schaub, Florian; Könings, Bastian; Weber, M.; Kargl, Frank

    2012-01-01

    In ubiquitous systems control of privacy settings will be increasingly difficult due to the pervasive nature of sensing and communication capabilities. We identify challenges for privacy decisions in ubiquitous systems and propose a system for in situ privacy decision support. When context changes

  12. Privacy Challenges of Genomic Big Data.

    Science.gov (United States)

    Shen, Hong; Ma, Jian

    2017-01-01

    With the rapid advancement of high-throughput DNA sequencing technologies, genomics has become a big data discipline where large-scale genetic information of human individuals can be obtained efficiently with low cost. However, such massive amount of personal genomic data creates tremendous challenge for privacy, especially given the emergence of direct-to-consumer (DTC) industry that provides genetic testing services. Here we review the recent development in genomic big data and its implications on privacy. We also discuss the current dilemmas and future challenges of genomic privacy.

  13. Privacy in Online Social Networking Sites

    OpenAIRE

    M.Ida Evones

    2015-01-01

    There are more than 192 act ive social networking websites. Bringing every kind of social group together in one place and letting them interact is really a big thing indeed .Huge amount of information process in the sites each day, end up making it vulnerable to attack. There is no systematic framework taking into account the importance of privacy. Increased privacy settings don’t always guarantee privacy when there is a loop hole in the applications. Lack of user education results is over sh...

  14. A Secure and Privacy-Preserving Targeted Ad-System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven M.

    Thanks to its low product-promotion cost and its efficiency, targeted online advertising has become very popular. Unfortunately, being profile-based, online advertising methods violate consumers' privacy, which has engendered resistance to the ads. However, protecting privacy through anonymity seems to encourage click-fraud. In this paper, we define consumer's privacy and present a privacy-preserving, targeted ad system (PPOAd) which is resistant towards click fraud. Our scheme is structured to provide financial incentives to all entities involved.

  15. Computer-Aided Identification and Validation of Privacy Requirements

    Directory of Open Access Journals (Sweden)

    Rene Meis

    2016-05-01

    Full Text Available Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are processed by the system. The identification of privacy protection needs in complex systems is a hard and error prone task. Stakeholders whose personal data are processed might be overlooked, or the sensitivity and the need of protection of the personal data might be underestimated. The later personal data and the needs to protect them are identified during the development process, the more expensive it is to fix these issues, because the needed changes of the system-to-be often affect many functionalities. In this paper, we present a systematic method to identify the privacy needs of a software system based on a set of functional requirements by extending the problem-based privacy analysis (ProPAn method. Our method is tool-supported and automated where possible to reduce the effort that has to be spent for the privacy analysis, which is especially important when considering complex systems. The contribution of this paper is a semi-automatic method to identify the relevant privacy requirements for a software-to-be based on its functional requirements. The considered privacy requirements address all dimensions of privacy that are relevant for software development. As our method is solely based on the functional requirements of the system to be, we enable users of our method to identify the privacy protection needs that have to be addressed by the software-to-be at an early stage of the development. As initial evaluation of our method, we show its applicability on a small electronic health system scenario.

  16. The contest between psychiatrists and lawyers over involuntary detention: the effects of recent changes in mental health legislation in New South Wales.

    Science.gov (United States)

    Silove, D; Doutney, C; Pollock, C

    1986-09-01

    New mental health legislation was enacted in New South Wales in 1983 and, although the reformed Act remains unproclaimed, some of the new procedures have already been introduced into psychiatric hospitals. The spirit of the Act is clearly aimed at protecting the rights of the mentally ill, who are often unable to act as their own advocates. To ensure this protection, it is now routine for solicitors to represent detained patients in their pleas for release. In this report we describe three recent cases that illustrate the difficulties that arise when solicitors and psychiatrists contest the legitimacy of detention orders. The atmosphere of judicial hearings is becoming increasingly adversarial and the public disclosure of sensitive information can provoke unnecessary distress in patients and their families. In the zeal to preserve civil rights, the special needs of psychiatric patients can be obscured, sacrificing the patients' rights to confidentiality, privacy and appropriate treatment. While the involuntary detention of patients is a matter of the utmost seriousness, current procedures, which seem to be modelled on those of the criminal legal system, are proving to be inappropriate to the needs of psychiatric patients.

  17. Gain-Based Relief for Invasion of Privacy

    Directory of Open Access Journals (Sweden)

    Sirko Harder

    2013-11-01

    Full Text Available In many common law jurisdictions, some or all instances of invasion of privacy constitute a privacy-specific wrong either at common law (including equity or under statute. A remedy invariably available for such a wrong is compensation for loss. However, the plaintiff may instead seek to claim the profit the defendant has made from the invasion. This article examines when a plaintiff is, and should be, entitled to claim that profit, provided that invasion of privacy is actionable as such. After a brief overview of the relevant law in major common law jurisdictions, the article investigates how invasion of privacy fits into a general concept of what is called ‘restitution for wrongs’. It will be argued that the right to privacy is a right against the whole world and as such forms a proper basis of awarding gain-based relief for the unauthorised use of that right.

  18. 12 CFR 573.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section... FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model... privacy form is not required. (b) Examples. The examples in this part are not exclusive. Compliance with...

  19. 12 CFR 332.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model... this part, although use of the model privacy form is not required. (b) Examples. The examples in this...

  20. 12 CFR 216.2 - Model privacy form and examples.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a... of this part, although use of the model privacy form is not required. (b) Examples. The examples in...

  1. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  2. Genetic privacy and non-discrimination.

    Science.gov (United States)

    Romeo Casabona, Carlos María

    2011-01-01

    The UN Inter-Agency Committee on Bioethics met for its tenth meeting at the UNESCO headquarters in Paris on 4-5th March 2011. Member organisations such as the WHO and UNESCO were in attendance alongside associate members such as the Council for Europe, the European Commission, the Organisation for Economic Co-operation and Development and the World Trade Organisation. Discussion centred on the theme "genetic privacy and nondiscrimination". The United Nations Economic and Social Council (ECOSOC) had previously considered, from a legal and ethical perspective, the implications of increasingly sophisticated technologies for genetic privacy and non-discrimination in fields such as medicine, employment and insurance. Thus, the ECOSOC requested that UNESCO report on relevant developments in the field of genetic privacy and non-discrimination. In parallel with a consultation process with member states, UNESCO launched a consultation with the UN Interagency Committee on Bioethics. This article analyses the report presented by the author concerning the analysis of the current contentions in the field and illustrates attempts at responding on a normative level to a perceived threat to genetic privacy and non-discrimination.

  3. Photowalk contest winners

    CERN Multimedia

    Roberto Cantoni

    2010-01-01

    The local winners of the global particle physics Photowalk have been announced by the five participating laboratories. At CERN, Diego Giol and Christian Stephani were the jury’s favourites, and their photos will now go forward to the global vote, competing against the local winners from DESY in Germany, Fermilab in the US, KEK in Japan and TRIUMF in Canada. Two prizes are to be awarded, one selected by a global jury, the other by popular vote – it’s time to get voting!   Diego Giol #1 The global winners of the Photowalk contest will be revealed by the second week of October, but the local CERN winners were announced last week. After three weeks of work, two meetings of the jury and three successive selections, 20 photos were chosen from the 792 entries. The three highest-ranked will participate in the final competition. The public can vote for their favourite photos on the interactions.org website until 8 October. Only two photographers took the three winning photo...

  4. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  5. ECMS--Educational Contest Management System for Selecting Elite Students

    Science.gov (United States)

    Schneider, Thorsten

    2004-01-01

    Selecting elite students out of a huge collective is a difficult task. The main problem is to provide automated processes to reduce human work. ECMS (Educational Contest Management System) is an online tool approach to help--fully or partly automated--with the task of selecting such elite students out of a mass of candidates. International tests…

  6. 77 FR 32111 - Privacy Act System of Records

    Science.gov (United States)

    2012-05-31

    ... contacted in order to obtain that office's advice regarding obligations under the Privacy Act; 8. Breach... FEDERAL COMMUNICATIONS COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission. ACTION: Notice; one new Privacy Act system of records. SUMMARY: Pursuant to subsection (e)(4) of...

  7. CARAVAN: Providing Location Privacy for VANET

    National Research Council Canada - National Science Library

    Sampigethaya, Krishna; Huang, Leping; Li, Mingyan; Poovendran, Radha; Matsuura, Kanta; Sezaki, Kaoru

    2005-01-01

    .... This type of tracking leads to threats on the location privacy of the vehicle's user. In this paper, we study the problem of providing location privacy in VANET by allowing vehicles to prevent tracking of their broadcast communications...

  8. Does Blue Uniform Color Enhance Winning Probability in Judo Contests?

    NARCIS (Netherlands)

    Dijkstra, P.D.; Preenen, P.T.Y.; Essen, H. van

    2018-01-01

    The color of an athlete's uniform may have an effect on psychological functioning and consequently bias the chances of winning contests in sport competition. Several studies reported a winning bias for judo athletes wearing a blue outfit relative to those wearing a white outfit. However, we argue

  9. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  10. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  11. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Science.gov (United States)

    2010-07-01

    ...) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...-347) directs agencies to conduct reviews of how privacy issues are considered when purchasing or... a PIA to effectively address privacy factors. Guidance is provided at http://www.doncio.navy.mil. (f...

  12. 36 CFR 902.56 - Protection of personal privacy.

    Science.gov (United States)

    2010-07-01

    ... privacy. 902.56 Section 902.56 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT... Protection of personal privacy. (a) Any of the following personnel, medical, or similar records is within the... invasion of his personal privacy: (1) Personnel and background records personal to any officer or employee...

  13. 76 FR 51869 - Privacy Act Implementation

    Science.gov (United States)

    2011-08-19

    ... permanent residence. Maintain includes collect, use, disseminate, or control. Privacy Act means the Privacy... announces the creation, deletion, or amendment of one or more system of records. System of records notices... reference and university libraries or electronically at the [[Page 51873

  14. Measuring privacy compliance using fitness metrics

    NARCIS (Netherlands)

    Banescu, S.; Petkovic, M.; Zannone, N.; Barros, A.; Gal, A.; Kindler, E.

    2012-01-01

    Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solutions for privacy compliance are often manual, leading infringements to remain undetected.

  15. The Effects of Ocean Acidification on Feeding and Contest Behaviour by the Beadlet Anemone Actinia equina

    Science.gov (United States)

    Bamber, Tess Olivia; Jackson, Angus Charles; Mansfield, Robert Philip

    2018-05-01

    Increasing concentrations of atmospheric carbon dioxide are causing oceanic pH to decline worldwide, a phenomenon termed ocean acidification. Mounting experimental evidence indicates that near-future levels of CO2 will affect calcareous invertebrates such as corals, molluscs and gastropods, by reducing their scope for calcification. Despite extensive research into ocean acidification in recent years, the effects on non-calcifying anthozoans, such as sea anemones, remain little explored. In Western Europe, intertidal anemones such as Actinia equina are abundant, lower trophic-level organisms that function as important ecosystem engineers. Changes to behaviours of these simple predators could have implications for intertidal assemblages. This investigation identified the effects of reduced seawater pH on feeding and contest behaviour by A. equina. Video footage was recorded for A. equina feeding at current-day seawater (pH 8.1), and the least (pH 7.9) and most (pH 7.6) severe end-of-century predictions. Footage was also taken of contests over ownership of space between anemones exposed to reduced pH and those that were not. No statistically significant differences were identified in feeding duration or various aspects of contest behaviour including initiating, winning, inflating acrorhagi, inflicting acrorhagial peels and contest duration. Multivariate analyses showed no effect of pH on a combination of these variables. This provides contrast with other studies where anemones with symbiotic algae thrive in areas of natural increased acidity. Thus, novel experiments using intraspecific contests and resource-holding potential may prove an effective approach to understand sub-lethal consequences of ocean acidification for A. equina, other sea anemones and more broadly for marine ecosystems.

  16. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  17. 77 FR 61275 - Privacy Act of 1974: Implementation

    Science.gov (United States)

    2012-10-09

    ... (FBI) Privacy Act system of records titled FBI Data Warehouse System, JUSTICE/FBI- 022. This system is...)(G), (H), and (I), (5), and (8); (f); and (g) of the Privacy Act: (1) FBI Data Warehouse System... security; disclose information that would constitute an unwarranted invasion of another's personal privacy...

  18. 22 CFR 212.22 - Protection of personal privacy.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Protection of personal privacy. 212.22 Section... Information for Public Inspection and Copying § 212.22 Protection of personal privacy. To the extent required to prevent a clearly unwarranted invasion of personal privacy, USAID may delete identifying details...

  19. Modelling information dissemination under privacy concerns in social media

    Science.gov (United States)

    Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui

    2016-05-01

    Social media has recently become an important platform for users to share news, express views, and post messages. However, due to user privacy preservation in social media, many privacy setting tools are employed, which inevitably change the patterns and dynamics of information dissemination. In this study, a general stochastic model using dynamic evolution equations was introduced to illustrate how privacy concerns impact the process of information dissemination. Extensive simulations and analyzes involving the privacy settings of general users, privileged users, and pure observers were conducted on real-world networks, and the results demonstrated that user privacy settings affect information differently. Finally, we also studied the process of information diffusion analytically and numerically with different privacy settings using two classic networks.

  20. Privacy Preservation in Distributed Subgradient Optimization Algorithms

    OpenAIRE

    Lou, Youcheng; Yu, Lean; Wang, Shouyang

    2015-01-01

    Privacy preservation is becoming an increasingly important issue in data mining and machine learning. In this paper, we consider the privacy preserving features of distributed subgradient optimization algorithms. We first show that a well-known distributed subgradient synchronous optimization algorithm, in which all agents make their optimization updates simultaneously at all times, is not privacy preserving in the sense that the malicious agent can learn other agents' subgradients asymptotic...

  1. Contested water rights in post-apartheid South Africa: The struggle ...

    African Journals Online (AJOL)

    2010-03-25

    Mar 25, 2010 ... the redistribution of water resources is contested by the elite. The paper identifies ... implementation of the South African National Water Act by presenting empirical ... The participation in decision making on water management ...... Even more striking is the lack of an integrated approach across sectors ...

  2. Perspectives on ... Multiculturalism and Library Exhibits: Sites of Contested Representation

    Science.gov (United States)

    Reece, Gwendolyn J.

    2005-01-01

    This article analyzes a multicultural library exhibit presenting the Palestinian/Israeli conflict as a site of contested representation. Qualitative methodology is used to interrogate the exhibit and its audience reception. Drawing on insights from critical pedagogy, implications for libraries arising from this case study are given and suggestions…

  3. Certificate Transparency with Privacy

    Directory of Open Access Journals (Sweden)

    Eskandarian Saba

    2017-10-01

    Full Text Available Certificate transparency (CT is an elegant mechanism designed to detect when a certificate authority (CA has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a CT log without violating user privacy. Second, we extend CT to support non-public subdomains.

  4. 37 CFR 251.23 - FOIA and Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false FOIA and Privacy Act. 251.23 Section 251.23 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT... Access to and Inspection of Records § 251.23 FOIA and Privacy Act. Freedom of Information Act and Privacy...

  5. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... be identified, the local Privacy Act officer will assume these duties. Issues that cannot be resolved... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT...

  6. Privacy in the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Etter, Michael; Lutz, Christoph

    ’s digital services through providing recommendations to Europe’s institutions. The initial stage of this research project involves a set of three literature reviews of the state of research on three core topics in relation to the sharing economy: participation (1), privacy (2), and power (3). This piece...... is a literature review on the topic of privacy. It addresses key privacy challenges for different stakeholders in the sharing economy. Throughout, we use the term "consumers" to refer to users on the receiving end (e.g., Airbnb guests, Uber passengers), "providers" to refer to users on the providing end (e.......g., Airbnb hosts, Uber drivers) and "platforms" to refer to the mediating sites, apps and infrastructures matching consumers and providers (e.g., Airbnb, Uber)....

  7. AnonySense: Opportunistic and Privacy-Preserving Context Collection

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Kapadia, Apu; Cornelius, Cory

    2008-01-01

    on tessellation and clustering to protect users' privacy against the system while reporting context, and k-anonymous report aggregation to improve the users' privacy against applications receiving the context. We outline the architecture and security properties of AnonySense, and focus on evaluating our....... We propose AnonySense, a general-purpose architecture for leveraging users' mobile devices for measuring context, while maintaining the privacy of the users.AnonySense features multiple layers of privacy protection-a framework for nodes to receive tasks anonymously, a novel blurring mechanism based...

  8. Privacy Data Decomposition and Discretization Method for SaaS Services

    Directory of Open Access Journals (Sweden)

    Changbo Ke

    2017-01-01

    Full Text Available In cloud computing, user functional requirements are satisfied through service composition. However, due to the process of interaction and sharing among SaaS services, user privacy data tends to be illegally disclosed to the service participants. In this paper, we propose a privacy data decomposition and discretization method for SaaS services. First, according to logic between the data, we classify the privacy data into discrete privacy data and continuous privacy data. Next, in order to protect the user privacy information, continuous data chains are decomposed into discrete data chain, and discrete data chains are prevented from being synthesized into continuous data chains. Finally, we propose a protection framework for privacy data and demonstrate its correctness and feasibility with experiments.

  9. Privacy and human behavior in the age of information.

    Science.gov (United States)

    Acquisti, Alessandro; Brandimarte, Laura; Loewenstein, George

    2015-01-30

    This Review summarizes and draws connections between diverse streams of empirical research on privacy behavior. We use three themes to connect insights from social and behavioral sciences: people's uncertainty about the consequences of privacy-related behaviors and their own preferences over those consequences; the context-dependence of people's concern, or lack thereof, about privacy; and the degree to which privacy concerns are malleable—manipulable by commercial and governmental interests. Organizing our discussion by these themes, we offer observations concerning the role of public policy in the protection of privacy in the information age. Copyright © 2015, American Association for the Advancement of Science.

  10. A Comparison between the Swedish 3G Beauty Contest and the UK 3G Auction

    OpenAIRE

    Welin, Erik

    2006-01-01

    This thesis compares the two different version of public franchise bidding for awarding 3G licenses used in Sweden and the UK, respectively a beauty contest and an auction. The fact is that the Swedish beauty contest has failed to tackle many of the problems discussed in connection with public franchise bidding in an effective way. Sweden has first of all had problems with enforcing the ambitious coverage criteria. The UK has on the other hand succeeded in tackling the problems and raised gov...

  11. Privacy preserving surveillance and the tracking-paradox

    OpenAIRE

    Greiner, S.; Birnstill, Pascal; Krempel, Erik; Beckert, B.; Beyerer, Jürgen

    2013-01-01

    Increasing capabilities of intelligent video surveillance systems impose new threats to privacy while, at the same time, offering opportunities for reducing the privacy invasiveness of surveillance measures as well as their selectivity. We show that aggregating more data about observed people does not necessarily lead to less privacy, but can increase the selectivity of surveillance measures. In case of video surveillance in a company environment, if we enable the system to authenticate emplo...

  12. 76 FR 30952 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-05-27

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... the Department. These assessments were approved and published on the Privacy Office's web site between..., 2011 and March 31, 2011, the Chief Privacy Officer of the DHS approved and published sixteen Privacy...

  13. 76 FR 58814 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-09-22

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... DHS. These assessments were approved and published on the Privacy Office's Web site between June 1... 31, 2011, the Chief Privacy Officer of the DHS approved and published twenty-six Privacy Impact...

  14. 76 FR 78934 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-12-20

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on.... These assessments were approved and published on the Privacy Office's web site between September 1, 2011... November 30, 2011, the Chief Privacy Officer of the DHS approved and published seven Privacy Impact...

  15. 76 FR 37823 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2011-06-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... Department. These assessments were approved and published on the Privacy Office's Web site between March 31... 31, 2011, the Chief Privacy Officer of the DHS approved and published ten Privacy Impact Assessments...

  16. Privacy vs. Reward in Indoor Location-Based Services

    Directory of Open Access Journals (Sweden)

    Fawaz Kassem

    2016-10-01

    Full Text Available With the advance of indoor localization technology, indoor location-based services (ILBS are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service, a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.

  17. A Cross-Cultural Perspective on the Privacy Calculus

    Directory of Open Access Journals (Sweden)

    Sabine Trepte

    2017-01-01

    Full Text Available The “privacy calculus” approach to studying online privacy implies that willingness to engage in disclosures on social network sites (SNSs depends on evaluation of the resulting risks and benefits. In this article, we propose that cultural factors influence the perception of privacy risks and social gratifications. Based on survey data collected from participants from five countries (Germany [n = 740], the Netherlands [n = 89], the United Kingdom [n = 67], the United States [n = 489], and China [n = 165], we successfully replicated the privacy calculus. Furthermore, we found that culture plays an important role: As expected, people from cultures ranking high in individualism found it less important to generate social gratifications on SNSs as compared to people from collectivist-oriented countries. However, the latter placed greater emphasis on privacy risks—presumably to safeguard the collective. Furthermore, we identified uncertainty avoidance to be a cultural dimension crucially influencing the perception of SNS risks and benefits. As expected, people from cultures ranking high in uncertainty avoidance found privacy risks to be more important when making privacy-related disclosure decisions. At the same time, these participants ascribed lower importance to social gratifications—possibly because social encounters are perceived to be less controllable in the social media environment.

  18. 32 CFR 701.109 - Privacy Act (PA) appeals.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy Act (PA) appeals. 701.109 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.109 Privacy Act (PA) appeals. (a... commence when the appeal reaches the office of the review authority having jurisdiction over the record...

  19. Contested Norms in Inter-National Encounters: The ‘Turbot War’ as a Prelude to Fairer Fisheries Governance

    Directory of Open Access Journals (Sweden)

    Antje Wiener

    2016-08-01

    Full Text Available This article is about contested norms in inter-national encounters in global fisheries governance. It illustrates how norms work by reconstructing the trajectory of the 1995 ‘Turbot War’ as a series of inter-national encounters among diverse sets of Canadian and European stakeholders. By unpacking the contestations and identifying the norms at stake, it is suggested that what began as action at cross-purposes (i.e. each party referring to a different fundamental norm, ultimately holds the potential for fairer fisheries governance. This finding is shown by linking source and settlement of the dispute and identifying the shared concern for the balance between the right to fish and the responsibility for sustainable fisheries. The article develops a framework to elaborate on procedural details including especially the right for stakeholder access to regular contestation. It is organised in four sections: section 1 summarises the argument, section 2 presents the framework of critical norms research, section 3 reconstructs contestations of fisheries norms over the duration of the dispute, and section 4 elaborates on the dispute as a prelude to fairer fisheries governance. The latter is based on a novel conceptual focus on stakeholder access to contestation at the meso-layer of fisheries governance where organising principles are negotiated close to policy and political processes, respectively. The conclusion suggests for future research to pay more attention to the link between the ‘is’ and the ‘ought’ of norms in critical norms research in International Relations theories (IR.

  20. Privacy Information Security Classification for Internet of Things Based on Internet Data

    OpenAIRE

    Lu, Xiaofeng; Qu, Zhaowei; Li, Qi; Hui, Pan

    2015-01-01

    A lot of privacy protection technologies have been proposed, but most of them are independent and aim at protecting some specific privacy. There is hardly enough deep study into the attributes of privacy. To minimize the damage and influence of the privacy disclosure, the important and sensitive privacy should be a priori preserved if all privacy pieces cannot be preserved. This paper focuses on studying the attributes of the privacy and proposes privacy information security classification (P...

  1. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  2. The privacy paradox : Investigating discrepancies between expressed privacy concerns and actual online behavior - A systematic literature review

    NARCIS (Netherlands)

    Barth, Susanne; de Jong, Menno D.T.

    2017-01-01

    Also known as the privacy paradox, recent research on online behavior has revealed discrepancies between user attitude and their actual behavior. More specifically: While users claim to be very concerned about their privacy, they nevertheless undertake very little to protect their personal data.

  3. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  4. Evaluating Common Privacy Vulnerabilities in Internet Service Providers

    Science.gov (United States)

    Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios

    Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.

  5. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Science.gov (United States)

    2011-10-14

    ... should a breach occur; and (7) Any agency-specific privacy training requirements. (d) The contractor is... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act...

  6. Syllabus for Privacy and Information Technology, Fall 2017, UCLA Information Studies

    OpenAIRE

    Borgman, Christine L.

    2017-01-01

    Privacy is a broad topic that covers many disciplines, stakeholders, and concerns. This course addresses the intersection of privacy and information technology, surveying a wide array of topics of concern for research and practice in the information fields. Among the topics covered are the history and changing contexts of privacy; privacy risks and harms; law, policies, and practices; privacy in searching for information, in reading, and in libraries; surveillance, networks, and privacy by de...

  7. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  8. 77 FR 46100 - Published Privacy Impact Assessments on the Web

    Science.gov (United States)

    2012-08-02

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Published Privacy Impact Assessments on... published on the Privacy Office's Web site between March 1, 2012 and May 31, 2012. DATES: The PIAs will be... approved and published fifteen Privacy Impact Assessments (PIAs) on the DHS Privacy Office Web site, www...

  9. Designing Privacy-aware Internet of Things Applications

    OpenAIRE

    Perera, Charith; Barhamgi, Mahmoud; Bandara, Arosha K.; Ajmal, Muhammad; Price, Blaine; Nuseibeh, Bashar

    2017-01-01

    Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. In this paper, we explore how a Privacy-by-Design (PbD) framework, formulated as a set of guidelines, can help software engineers to design privacy-aware IoT applications. We studied the utility of our propos...

  10. Toward sensitive document release with privacy guarantees

    OpenAIRE

    David Sánchez; Montserrat Batet

    2017-01-01

    Toward sensitive document release with privacy guarantees DOI: 10.1016/j.engappai.2016.12.013 URL: http://www.sciencedirect.com/science/article/pii/S0952197616302408 Filiació URV: SI Inclòs a la memòria: SI Privacy has become a serious concern for modern Information Societies. The sensitive nature of much of the data that are daily exchanged or released to untrusted parties requires that responsible organizations undertake appropriate privacy protection measures. Nowadays, much...

  11. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Directory of Open Access Journals (Sweden)

    Cynthia Cheung

    Full Text Available Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters.This study sought to understand privacy attitudes of early adopters of emerging health technologies.Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis.Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science.Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  12. Privacy Attitudes among Early Adopters of Emerging Health Technologies.

    Science.gov (United States)

    Cheung, Cynthia; Bietz, Matthew J; Patrick, Kevin; Bloss, Cinnamon S

    2016-01-01

    Advances in health technology such as genome sequencing and wearable sensors now allow for the collection of highly granular personal health data from individuals. It is unclear how people think about privacy in the context of these emerging health technologies. An open question is whether early adopters of these advances conceptualize privacy in different ways than non-early adopters. This study sought to understand privacy attitudes of early adopters of emerging health technologies. Transcripts from in-depth, semi-structured interviews with early adopters of genome sequencing and health devices and apps were analyzed with a focus on participant attitudes and perceptions of privacy. Themes were extracted using inductive content analysis. Although interviewees were willing to share personal data to support scientific advancements, they still expressed concerns, as well as uncertainty about who has access to their data, and for what purpose. In short, they were not dismissive of privacy risks. Key privacy-related findings are organized into four themes as follows: first, personal data privacy; second, control over personal information; third, concerns about discrimination; and fourth, contributing personal data to science. Early adopters of emerging health technologies appear to have more complex and nuanced conceptions of privacy than might be expected based on their adoption of personal health technologies and participation in open science. Early adopters also voiced uncertainty about the privacy implications of their decisions to use new technologies and share their data for research. Though not representative of the general public, studies of early adopters can provide important insights into evolving attitudes toward privacy in the context of emerging health technologies and personal health data research.

  13. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    Science.gov (United States)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  14. The study on privacy preserving data mining for information security

    Science.gov (United States)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  15. 32 CFR 701.119 - Privacy and the web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site. ...

  16. Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications.

    Science.gov (United States)

    Sun, Jiajun; Liu, Ningzhong

    2017-09-04

    Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration.

  17. Unveiling consumer's privacy paradox behaviour in an economic exchange.

    Science.gov (United States)

    Motiwalla, Luvai F; Li, Xiao-Bai

    2016-01-01

    Privacy paradox is of great interest to IS researchers and firms gathering personal information. It has been studied from social, behavioural, and economic perspectives independently. However, prior research has not examined the degrees of influence these perspectives contribute to the privacy paradox problem. We combine both economic and behavioural perspectives in our study of the privacy paradox with a price valuation of personal information through an economic experiment combined with a behavioural study on privacy paradox. Our goal is to reveal more insights on the privacy paradox through economic valuation on personal information. Results indicate that general privacy concerns or individual disclosure concerns do not have a significant influence on the price valuation of personal information. Instead, prior disclosure behaviour in specific scenario, like with healthcare providers or social networks, is a better indicator of consumer price valuations.

  18. CERN Photo Club (CPC) / Canon Contest - My View of CERN

    CERN Multimedia

    Steyaert, Didier

    2016-01-01

    The CERN Photo Club has organized in collaboration with Canon Switzerland a photo contest open to all members of the CERN (Persons with a CERN access card). The only restriction is that the photos must have been taken with a CANON camera (DSLR, bridge or compact) between 1 and 31 October 2016.

  19. Privacy and confidentiality in pragmatic clinical trials.

    Science.gov (United States)

    McGraw, Deven; Greene, Sarah M; Miner, Caroline S; Staman, Karen L; Welch, Mary Jane; Rubel, Alan

    2015-10-01

    With pragmatic clinical trials, an opportunity exists to answer important questions about the relative risks, burdens, and benefits of therapeutic interventions. However, concerns about protecting the privacy of this information are significant and must be balanced with the imperative to learn from the data gathered in routine clinical practice. Traditional privacy protections for research uses of identifiable information rely disproportionately on informed consent or authorizations, based on a presumption that this is necessary to fulfill ethical principles of respect for persons. But frequently, the ideal of informed consent is not realized in its implementation. Moreover, the principle of respect for persons—which encompasses their interests in health information privacy—can be honored through other mechanisms. Data anonymization also plays a role in protecting privacy but is not suitable for all research, particularly pragmatic clinical trials. In this article, we explore both the ethical foundation and regulatory framework intended to protect privacy in pragmatic clinical trials. We then review examples of novel approaches to respecting persons in research that may have the added benefit of honoring patient privacy considerations. © The Author(s) 2015.

  20. HIPPA privacy regulations: practical information for physicians.

    Science.gov (United States)

    McMahon, E B; Lee-Huber, T

    2001-07-01

    After much debate and controversy, the Bush administration announced on April 12, 2001, that it would implement the Health Insurance Portability and Accountability Act (HIPAA) privacy regulations issued by the Clinton administration in December of 2000. The privacy regulations became effective on April 14, 2001. Although the regulations are considered final, the Secretary of the Department of Health and Human Services has the power to modify the regulations at any time during the first year of implementation. These regulations affect how a patient's health information is used and disclosed, as well as how patients are informed of their privacy rights. As "covered entities," physicians have until April 14, 2003, to comply fully with the HIPAA privacy regulations, which are more than 1,500 pages in length. This article presents a basic overview of the new and complex regulations and highlights practical information about physicians' compliance with the regulations. However, this summary of the HIPAA privacy regulations should not be construed as legal advice or an opinion on specific situations. Please consult an attorney concerning your compliance with HIPAA and the regulations promulgated thereunder.