• No results found

privacy risk

An experimental method for the elicitation of implicit attitudes to privacy risk

An experimental method for the elicitation of implicit attitudes to privacy risk

... of privacy risks, computation of premiums, and policy evaluation by re- searchers, policy-makers, managers and other participants in the market for private ...the privacy risk aversion level is ...

46

Pseudonymization risk analysis in distributed systems

Pseudonymization risk analysis in distributed systems

... P3P privacy policy. [31] inte- grate links to the privacy policy in the system’s workflow ...stated privacy policy (our LTS can be similarly analysed); there has been limited research into the eval- ...

16

The Influence of Risk Perception in Online Purchasing Behavior: Examination of an Early-Stage Online Market

The Influence of Risk Perception in Online Purchasing Behavior: Examination of an Early-Stage Online Market

... Privacy risk has been added to e-marketing literature as an additional dimension (Jarvenpaa and Todd, 1997, and Forsythe and Shi, ...2003). Privacy risk is the potential loss of control over ...

9

Online consumer purchase behaviour : an experimental study on the effects of online reviews valence and information completeness on consumer’s trust, perceived risk and intention to purchase through Facebook in the Netherlands

Online consumer purchase behaviour : an experimental study on the effects of online reviews valence and information completeness on consumer’s trust, perceived risk and intention to purchase through Facebook in the Netherlands

... perceived risk and purchase intention when considering to buy from a particular seller in online transaction (Bart, et ...(process risk, financial risk and privacy risk) were taken as ...

45

Consumer adoption of personalised nutrition services from the perspective of a risk–benefit trade-off

Consumer adoption of personalised nutrition services from the perspective of a risk–benefit trade-off

... the Privacy Calculus and its antecedents determine consumers’ intention to adopt per- sonalised nutrition ...possible privacy risks that may keep consumers from engaging with their ...consumers’ ...

14

Does privacy policy really matter in E commerce? The influence of FIP principles on customers’ behavioral intentions in both familiar and unfamiliar websites

Does privacy policy really matter in E commerce? The influence of FIP principles on customers’ behavioral intentions in both familiar and unfamiliar websites

... perceived risk has been defined in many ...perceived risk that consumer behavior involves risk that any action of a consumer will have several consequences which he or she cannot anticipate with ...

65

The Influence of Perceived Risk on the uptake of Mobile Money Services by SMEs Operations in Karagwe District, Tanzania

The Influence of Perceived Risk on the uptake of Mobile Money Services by SMEs Operations in Karagwe District, Tanzania

... between privacy risk and mobile money services usage by SMEs ...between privacy risk and mobile money services usage by SMEs ...that, privacy risk has portion in increasing ...

10

An Investigation of Challenges to Online Federated Identity Management Systems

An Investigation of Challenges to Online Federated Identity Management Systems

... to privacy, in that transfers of personal information routinely occur between organizations as well as between the individual and an organization, and might frequently cross industry sectors and jurisdictional ...

5

Enhancing Social Network Privacy in Web Browsing

Enhancing Social Network Privacy in Web Browsing

... study privacy protection in PWS applications that model user preferences as hierarchical user ...the privacy risk of exposing the generalized ...

14

Privacy-Aware Risk-Based Access Control Systems

Privacy-Aware Risk-Based Access Control Systems

... re-identification risk assessed using a well known metric ...di↵erential privacy to which we will dedicate the next chapter (Chapter ...the privacy risk is too large, the framework can apply ...

192

Highly Effective Security Techniques in OSN Based on
Genetic Programming Approach

Highly Effective Security Techniques in OSN Based on Genetic Programming Approach

... Abstract: Assurance is one of the grinding centers that enhances when trades get mediated in online community techniques (Online Social Networks). Diverse gatherings of utilization innovation specialists have limited the ...

5

Antidepressant prescribing in the precision medicine era: a prescriber’s primer on pharmacogenetic tools

Antidepressant prescribing in the precision medicine era: a prescriber’s primer on pharmacogenetic tools

... 2) Does the tool have a clinically relevant benefit that outweighs the harms? Evidence to date suggests there may be potential benefits associated with the use of pharmacogenetic decision support tools, such as increased ...

7

Perturbation of convex risk minimization and its application in differential private learning algorithms

Perturbation of convex risk minimization and its application in differential private learning algorithms

... An error analysis is the second contribution of this paper. The analysis relies on the concentration inequality in the setting of differential privacy. After conducting a differ- ent error decomposition using the ...

16

Differentially private genome data dissemination through top-down specialization

Differentially private genome data dissemination through top-down specialization

... the privacy of ...potential privacy risks, NIH has forbidden public access to most aggregate research results to protect ...higher risk that individuals could be actually identified from a relatively ...

7

SECURITY MANAGEMENT AND FUTURE CLOUD  DATA CENTER IN CLOUD COMPUTING

SECURITY MANAGEMENT AND FUTURE CLOUD DATA CENTER IN CLOUD COMPUTING

... In this paper is only that it is difficult for the service provider to determine x given the obfuscated data. It may be that the service provider can easily obtain some information about x, but not enough to determine x. ...

15

Patient-Centric and Privacy Preserving Clinical Decision Support System Using Naive Bayesian Classification Manodnya A. Shitole, Manoj A. Wakchaure

Patient-Centric and Privacy Preserving Clinical Decision Support System Using Naive Bayesian Classification Manodnya A. Shitole, Manoj A. Wakchaure

... In the advanced age in which the healthcare area is exploring widely in that Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable ...

6

Download
			
			
				Download PDF

Download Download PDF

... on privacy believing that their specific approval should be required before any kind of information about them is collected and processed (Eurobarometer 359, ...

28

Privacy Calculus in the Context of the General
Data Protection Regulation and Healthcare: A
Quantitative Study

Privacy Calculus in the Context of the General Data Protection Regulation and Healthcare: A Quantitative Study

... certain risk. The five classic dimensions of risk range from being of financial, performance, physical, social and psychological nature(Kaplan, Szybillo, & Jacoby, ...of privacy calculus, new ...

13

Overlapping Slicing a Method for Privacy Preservation in Medical Applications Rakshatha V, Supriya Salian

Overlapping Slicing a Method for Privacy Preservation in Medical Applications Rakshatha V, Supriya Salian

... Preserving the privacy for the healthcare data has been the most significant issue. Especially when the data gets published. So while publishing any kind of the data related to medical, certain tools and methods ...

5

Health Information Management: Psychological factors influencing information privacy concerns in psychiatric hospitals

Health Information Management: Psychological factors influencing information privacy concerns in psychiatric hospitals

... consistent with this study. While ethics is related to morality, it should be noted that unethical behavior is not always illegal. In most cases, when individuals and organizations encounter an immoral problem, they are ...

7

Show all 10000 documents...

Related subjects