scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Posted Content
TL;DR: This work analyzes two of Facebooks more recent features, Applications and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity,” finding that many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.
Abstract: Social networking sites like Facebook are rapidly gaining in popularity. At the same time, they seem to present significant privacy issues for their users. We analyze two of Facebooks’s more recent features, Application and News Feed, from the perspective enabled by Helen Nissenbaum’s treatment of privacy as “contextual integrity.” Offline, privacy is mediated by highly granular social contexts. Online contexts, including social networking sites, lack much of this granularity. These contextual gaps are at the root of many of the sites’ privacy issues. Application, which nearly invisibly shares not just a users’, but a user’s friends’ information with third parties, clearly violates standard norms of information flow. News Feed is a more complex case, because it involves not just questions of privacy, but also of program interface and of the meaning of “friendship” online. In both cases, many of the privacy issues on Facebook are primarily design issues, which could be ameliorated by an interface that made the flows of information more transparent to users.

143 citations

Proceedings ArticleDOI
13 Mar 2006
TL;DR: This work proposes a solution to the RFID privacy problem that has the potential to guarantee user privacy without requiring changes to existing infrastructure or reducing business value from the use of RFID technology.
Abstract: In this work we propose a solution to the RFID privacy problem that has the potential to guarantee user privacy without requiring changes to existing infrastructure or reducing business value from the use of RFID technology. We give emphasis to the development of a lightweight protocol that does not incur costly overheads with respect to computation, storage as well as time and effort needed for deployment configuration. For RFID technology to be widely used, security should ship as a "default" and require no significant effort to configure. We demonstrate the security and efficiency properties of our protocol and we offer some interesting time/space tradeoffs that may lead to further improvements.

143 citations

Journal ArticleDOI
TL;DR: Additional revisions to HIPAA based on the principles and trade-offs reflected in the Common Rule can go a long way to remedying remaining flaws in the system.
Abstract: In the short time since it became effective for health care organizations, a privacy regulation issued under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has had a significant adverse impact on the conduct of clinical research in the United States, without a substantial corresponding increase in privacy protection for research participants. Some of the problems associated with HIPAA have been resolved through revisions since the regulation's initial promulgation in December 2000, and other problems can be addressed by better educating health care providers and researchers about its requirements and available alternatives for compliance; however, considerable structural challenges remain. These constitute substantial barriers to research and resulting medical advances. Additional revisions to HIPAA based on the principles and trade-offs reflected in the Common Rule—which responsibly balances an individual's interest in privacy protection with the public interest in gaining knowle...

143 citations

Journal ArticleDOI
TL;DR: A personalized privacy protection (PERIO) framework based on game theory and data encryption, which is then combined with game theory to construct a rational uploading strategy and a privacy-preserving data aggregation scheme to ensure data confidentiality, integrity, and real-timeness.
Abstract: With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm of the industrial Internet of Things, has provided a promising opportunity to construct powerful industrial systems and provide industrial services. The existing unified privacy strategy for all sensing data results in excessive or insufficient protection and low quality of crowdsensing services (QoCS) in MCS. To tackle this issue, in this article we propose a personalized privacy protection (PERIO) framework based on game theory and data encryption. Initially, we design a personalized privacy measurement algorithm to calculate users’ privacy level, which is then combined with game theory to construct a rational uploading strategy. Furthermore, we propose a privacy-preserving data aggregation scheme to ensure data confidentiality, integrity, and real-timeness. Theoretical analysis and ample simulations with real trajectory dataset indicate that the PERIO scheme is effective and makes a reasonable balance between retaining high QoCS and privacy.

143 citations

Proceedings ArticleDOI
01 Aug 2016
TL;DR: An overview of the privacy and security challenges directed towards the smart home domain is presented, which identifies constraints, evaluates solutions, and discusses a number of challenges and research issues where further investigation is required.
Abstract: Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders' awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. In this paper, we present an overview of the privacy and security challenges directed towards the smart home domain. We also identify constraints, evaluate solutions, and discuss a number of challenges and research issues where further investigation is required.

143 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277