scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Proceedings ArticleDOI
02 Jul 2018
TL;DR: This work-in-progress paper proposes a novel electronic voting system based on blockchain that addresses some of the limitations in existing systems and evaluatesSome of the popular blockchain frameworks for the purpose of constructing a blockchain-based e-voting system.
Abstract: Building a secure electronic voting system that offers the fairness and privacy of current voting schemes, while providing the transparency and flexibility offered by electronic systems has been a challenge for a long time. In this work-in-progress paper, we evaluate an application of blockchain as a service to implement distributed electronic voting systems. The paper proposes a novel electronic voting system based on blockchain that addresses some of the limitations in existing systems and evaluates some of the popular blockchain frameworks for the purpose of constructing a blockchain-based e-voting system. In particular, we evaluate the potential of distributed ledger technologies through the description of a case study; namely, the process of an election, and the implementation of a blockchain-based application, which improves the security and decreases the cost of hosting a nationwide election.

293 citations

Proceedings ArticleDOI
27 May 2011
TL;DR: In this article, the authors summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them, and compare the benefits and risks of cloud computing with those of the status quo.
Abstract: Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing parts of the IT industry. IT organizations have expresses concern about critical issues (such as security) that exist with the widespread implementation of cloud computing. These types of concerns originate from the fact that data is stored remotely from the customer's location; in fact, it can be stored at any location. Security, in particular, is one of the most argued-about issues in the cloud computing field; several enterprises look at cloud computing warily due to projected security risks. The risks of compromised security and privacy may be lower overall, however, with cloud computing than they would be if the data were to be stored on individual machines instead of in a so — called "cloud" (the network of computers used for remote storage and maintenance). Comparison of the benefits and risks of cloud computing with those of the status quo are necessary for a full evaluation of the viability of cloud computing. Consequently, some issues arise that clients need to consider as they contemplate moving to cloud computing for their businesses. In this paper I summarize reliability, availability, and security issues for cloud computing (RAS issues), and propose feasible and available solutions for some of them.

293 citations

Book ChapterDOI
Siani Pearson1
01 Jan 2013
TL;DR: This chapter assesses how security, trust and privacy issues occur in the context of cloud computing and discusses ways in which they may be addressed.
Abstract: Cloud computing refers to the underlying infrastructure for an emerging model of service provision that has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on information technology (IT) budgeting but also affect traditional security, trust and privacy mechanisms. The advantages of cloud computing—its ability to scale rapidly, store data remotely and share services in a dynamic environment—can become disadvantages in maintaining a level of assurance sufficient to sustain confidence in potential customers. Some core traditional mechanisms for addressing privacy (such as model contracts) are no longer flexible or dynamic enough, so new approaches need to be developed to fit this new paradigm. In this chapter, we assess how security, trust and privacy issues occur in the context of cloud computing and discuss ways in which they may be addressed.

293 citations

Journal ArticleDOI
TL;DR: A new smart meeting room system called EasyMeeting explores the use of multi-agent systems, Semantic Web ontologies, reasoning, and declarative policies for security and privacy.
Abstract: A new smart meeting room system called EasyMeeting explores the use of multi-agent systems, Semantic Web ontologies, reasoning, and declarative policies for security and privacy. Building on an earlier pervasive computing system, EasyMeeting provides relevant services and information to meeting participants based on their situational needs. The system also exploits the context-aware support provided by the Context Broker Architecture (Cobra). Cobra's intelligent broker agent maintains a shared context model for all computing entities in the space and enforces user-defined privacy policies.

293 citations

Journal ArticleDOI
01 Dec 2012
TL;DR: This study reviews fifteen established theories in online information privacy research and recognizes the primary contributions and connections of the theories and develops an integrated framework for further research.
Abstract: To study the formation of online consumers' information privacy concern and its effect, scholars from different perspectives applied multiple theories in research. To date, there has yet to be a systematic review and integration of the theories in literature. To fill the gap, this study reviews fifteen established theories in online information privacy research and recognizes the primary contributions and connections of the theories. Based on the review, an integrated framework is developed for further research. The framework highlights two interrelated trade-offs that influence an individual's information disclosure behavior: the privacy calculus (i.e., the trade-off between expected benefits and privacy risks) and the risk calculus (i.e., the trade-off between privacy risks and efficacy of coping mechanisms). These two trade-offs are together called the dual-calculus model. A decision table based on the dual-calculus model is provided to predict an individual's intention to disclose personal information online. Implications of the study for further research and practice are discussed.

292 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277