scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: The results support the core assertion that perceived control over personal information is a key factor affecting context-specific concerns for information privacy and have important implications for service providers and consumers as well as for regulatory bodies and technology developers.
Abstract: This study seeks to clarify the nature of control in the context of information privacy to generate insights into the effects of different privacy assurance approaches on context-specific concerns for information privacy. We theorize that such effects are exhibited through mediation by perceived control over personal information and develop arguments in support of the interaction effects involving different privacy assurance approaches (individual self-protection, industry self-regulation, and government legislation). We test the research model in the context of location-based services using data obtained from 178 individuals in Singapore. In general, the results support our core assertion that perceived control over personal information is a key factor affecting context-specific concerns for information privacy. In addition to enhancing our theoretical understanding of the link between control and privacy concerns, these findings have important implications for service providers and consumers as well as for regulatory bodies and technology developers.

282 citations

Book ChapterDOI
22 Jul 2015
TL;DR: This paper surveys the existing literature on privacy notices and identifies challenges, requirements, and best practices for privacy notice design, and mapping out the design space for privacy notices by identifying relevant dimensions provides a taxonomy and consistent terminology of notice approaches.
Abstract: Notifying users about a system's data practices is supposed to enable users to make informed privacy decisions. Yet, current notice and choice mechanisms, such as privacy policies, are often ineffective because they are neither usable nor useful, and are therefore ignored by users. Constrained interfaces on mobile devices, wearables, and smart home devices connected in an Internet of Things exacerbate the issue. Much research has studied usability issues of privacy notices and many proposals for more usable privacy notices exist. Yet, there is little guidance for designers and developers on the design aspects that can impact the effectiveness of privacy notices. In this paper, we make multiple contributions to remedy this issue. We survey the existing literature on privacy notices and identify challenges, requirements, and best practices for privacy notice design. Further, we map out the design space for privacy notices by identifying relevant dimensions. This provides a taxonomy and consistent terminology of notice approaches to foster understanding and reasoning about notice options available in the context of specific systems. Our systemization of knowledge and the developed design space can help designers, developers, and researchers identify notice and choice requirements and develop a comprehensive notice concept for their system that addresses the needs of different audiences and considers the system's limitations and opportunities for providing notice.

281 citations

Proceedings ArticleDOI
19 May 2008
TL;DR: This paper introduces a novel RSU-aided messages authentication scheme, called RAISE, which adopts the k-anonymity approach to protect user identity privacy, where an adversary cannot associate a message with a particular vehicle.
Abstract: Addressing security and privacy issues is a prerequisite for a market-ready vehicular communication network Although recent related studies have already addressed most of these issues, few of them have taken scalability issues into consideration When the traffic density becomes larger, a vehicle cannot verify all signatures of the messages sent by its neighbors in a timely manner, which results in message loss Communication overhead as another issue has also not been well addressed in previously reported studies To deal with these issues, this paper introduces a novel RSU-aided messages authentication scheme, called RAISE With RAISE, roadside units (RSUs) are responsible for verifying the authenticity of the messages sent from vehicles and for notifying the results back to vehicles In addition, our scheme adopts the k-anonymity approach to protect user identity privacy, where an adversary cannot associate a message with a particular vehicle Extensive simulations are conducted to verify the proposed scheme, which demonstrates that RAISE yields much better performance than any of the previously reported counterparts in terms of message loss ratio and delay

281 citations

Journal ArticleDOI
TL;DR: Privacy as a social issue and behavioral concept is discussed in this article, where the benefits of obtaining privacy and the costs of failing to achieve and of losing privacy are discussed. And behavioral aspects of privacy, including indicators of privacy's importance and the generally overlooked status of privacy in psychology, are explored.
Abstract: This introduction, to an issue on privacy as a social issue and behavioral concept, discusses what privacy is, by examining definitions and theories of privacy, and what privacy does, by reviewing the benefits of obtaining privacy and the costs of failing to achieve and of losing privacy. It provides a possible bridge between social psychological and social issues approaches to privacy and examines privacy as a social issue for Americans as citizens, health-care recipients, consumers, and employees. It then briefly explores behavioral aspects of privacy, including indicators of privacy's importance and the generally overlooked status of privacy in psychology.

280 citations

Journal ArticleDOI
TL;DR: The Pufferfish framework can be used to create new privacy definitions that are customized to the needs of a given application and is introduced to allow experts in an application domain to develop rigorous privacy definitions for their data sharing needs.
Abstract: In this article, we introduce a new and general privacy framework called Pufferfish. The Pufferfish framework can be used to create new privacy definitions that are customized to the needs of a given application. The goal of Pufferfish is to allow experts in an application domain, who frequently do not have expertise in privacy, to develop rigorous privacy definitions for their data sharing needs. In addition to this, the Pufferfish framework can also be used to study existing privacy definitions. We illustrate the benefits with several applications of this privacy framework: we use it to analyze differential privacy and formalize a connection to attackers who believe that the data records are independent; we use it to create a privacy definition called hedging privacy, which can be used to rule out attackers whose prior beliefs are inconsistent with the data; we use the framework to define and study the notion of composition in a broader context than before; we show how to apply the framework to protect unbounded continuous attributes and aggregate information; and we show how to use the framework to rigorously account for prior data releases.

279 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277