scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: This architecture separates data from identities by splitting communication from data analysis, and promises significant reductions in infrastructure cost because the system can exploit the sensing, computing, and communications devices already installed in many modern vehicles.
Abstract: Intelligent transportation systems increasingly depend on probe vehicles to monitor traffic: they can automatically report position, travel time, traffic incidents, and road surface problems to a telematics service provider. This kind of traffic-monitoring system could provide good coverage and timely information on many more roadways than is possible with a fixed infrastructure such as cameras and loop detectors. This approach also promises significant reductions in infrastructure cost because the system can exploit the sensing, computing, and communications devices already installed in many modern vehicles. This architecture separates data from identities by splitting communication from data analysis. Data suppression techniques can help prevent data mining algorithms from reconstructing private information from anonymous database samples

343 citations

Book
01 Jan 1998
TL;DR: In this paper, the authors present a conceptual framework for analyzing and debating privacy policy and for designing and developing information systems in Canada and in Europe as well as in the United States.
Abstract: From the Publisher: Privacy is the capacity to negotiate social relationships by controlling access to information about oneself. As laws, policies, and technological developments increasingly structure our relationships with social institutions, privacy faces new threats and new opportunities. The essays in this book provide a new conceptual framework for analyzing and debating privacy policy and for designing and developing information systems. The authors are international experts in the technical, economic, and political aspects of privacy; the book's particular strengths are its synthesis of these three aspects and its treatment of privacy issues in Canada and in Europe as well as in the United States.

343 citations

Journal ArticleDOI
TL;DR: Since communications lines are the principal user-processor links, the authors suggested a complex series of protective measures, including terminal and user identification, the use of passwords, disposal of carbon papers and typewriter ribbons, physical security of the terminal, and privacy transformations, which are techniques for coding data.
Abstract: A half-dozen computer users and designers devoted two complete sessions of the Spring Joint Computer Conference in April to their attempts to protect sensitive information in multiple-access computers. Concern over this type of information developed in Congress just a year ago when the Budget Bureau proposed a Na-~ional Data Center for the consolidation of govermnent statistical work. During a session on security and privacy , a consensus was developed by the speakers that this information, whether of a personal or a classified nature, can be protected in the computer, but once it begins travelling along communication lines to switehing centers or to remote terminals, it is vulnerable to intrusion. The speakers said the central processor and the files can be protected against invasion by a series of countermeasures, including use of a monitor that guards the entire software; memory protect and privileged instructions; placement of the computer in a secure location; clearances for operating personnel; logging of sig-niticant events; access management; and various processing restrictions, such as a ban on copying of complete files. The speakers seemed confident that these measures are within their grasp, although some are still to be implemented. The protection of communications lines, however, seems to be far from solution. It is too simple to tap these lines. In a joint paper, Harold E. Petersen and Rein Turn, of the Rand Corporation, said that you can penetrate communications lines with a $100 tape recorder and a code conversion table. They also said that digital transmission of information provides no more privacy than Morse code, for example. \"Nevertheless,\" they said, \"some users seem willing to entrust to digital systems vaIuable information that they would not communicate over a telephone.\" According to Petersen and Turn, information can be picked off communications lines by wiretapping, electremag-netic pickup, or the use of special terminals that can intercept information between the user and the processor, modify it, or replace it with other information. Shielding of the lines would help, of course, but this is so expensive that it would be feasible in only a few cases, such as for lines carrying highly classi-fled information. Since communications lines are the principal user-processor links, the authors suggested a complex series of protective measures, including terminal and user identification, the use of passwords, disposal of carbon papers and typewriter ribbons, physical security of the terminal, and privacy transformations, which are techniques for coding data. …

343 citations

Journal ArticleDOI
TL;DR: In this paper, the authors examined online retailer disclosures of various privacy and security-related practices for 17 product categories and compared the prevalence of disclosures to a subset of data from a consumer survey to evaluate potential relationships between online retailer practices and consumer perceptions of risk and purchase intentions.
Abstract: The Federal Trade Commission has declared the privacy and security of consumer information to be two major issues that stem from the rapid growth in e-commerce, particularly in terms of consumer-related commerce on the Internet. Although prior studies have assessed online retailer responses to privacy and security concerns with respect to retailers’ disclosure of their practices, these studies have been fairly general in their approaches and have not explored the potential for such disclosures to affect consumers. The authors examine online retailer disclosures of various privacy- and security-related practices for 17 product categories. They also compare the prevalence of disclosures to a subset of data from a consumer survey to evaluate potential relationships between online retailer practices and consumer perceptions of risk and purchase intentions across product categories.

343 citations

Journal ArticleDOI
TL;DR: Results indicate that the vast majority of online users are pragmatic when it comes to privacy, and analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern.
Abstract: Traditional typologies of consumer privacy concern suggest that consumers fall intro three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on the situation presented. This study examines online users to determine whether types of privacy concern online mirror the offline environment. An e-mail survey of online users examined perceived privacy concerns of 15 different situations involving collection and usage of personally identifiable information. Results indicate that the vast majority of online users are pragmatic when it comes to privacy. Further analysis of the data suggested that online users can be segmented into four distinct groups, representing differing levels of privacy concern. Distinct demographic differences were seen. Persons with higher levels of education are more concerned about their privacy online than persons with less education. Additionally, persons over the age of 45 years tended to be either not at all concerned about privacy or highly concerned about privacy. Younger persons tended to be more pragmatic. Content and policy implications are provided.

342 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277