scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: Several main issues in FLchain design are identified, including communication cost, resource allocation, incentive mechanism, security and privacy protection, and the applications of FLchain in popular MEC domains, such as edge data sharing, edge content caching and edge crowdsensing are investigated.
Abstract: Mobile-edge computing (MEC) has been envisioned as a promising paradigm to handle the massive volume of data generated from ubiquitous mobile devices for enabling intelligent services with the help of artificial intelligence (AI). Traditionally, AI techniques often require centralized data collection and training in a single entity, e.g., an MEC server, which is now becoming a weak point due to data privacy concerns and high overhead of raw data communications. In this context, federated learning (FL) has been proposed to provide collaborative data training solutions, by coordinating multiple mobile devices to train a shared AI model without directly exposing their underlying data, which enjoys considerable privacy enhancement. To improve the security and scalability of FL implementation, blockchain as a ledger technology is attractive for realizing decentralized FL training without the need for any central server. Particularly, the integration of FL and blockchain leads to a new paradigm, called FLchain , which potentially transforms intelligent MEC networks into decentralized, secure, and privacy-enhancing systems. This article presents an overview of the fundamental concepts and explores the opportunities of FLchain in MEC networks. We identify several main issues in FLchain design, including communication cost, resource allocation, incentive mechanism, security and privacy protection. The key solutions and the lessons learned along with the outlooks are also discussed. Then, we investigate the applications of FLchain in popular MEC domains, such as edge data sharing, edge content caching and edge crowdsensing. Finally, important research challenges and future directions are also highlighted.

238 citations

Journal ArticleDOI
TL;DR: A Dynamic Interviewing Programme was employed in order to survey users of an instant messaging ICQ ('I seek you') client using both closed and open question formats, indicating that Internet users are concerned about a wider range of privacy issues than surveys have typically covered.
Abstract: A consistent finding reported in online privacy research is that an overwhelming majority of people are 'concerned' about their privacy when they use the Internet. Therefore, it is important to understand the discourse of Internet users' privacy concerns, and any actions they take to guard against these concerns. A Dynamic Interviewing Programme (DIP) was employed in order to survey users of an instant messaging ICQ ('I seek you') client using both closed and open question formats. Analysis of 530 respondents' data illustrates the importance of establishing users' privacy concerns and the reasoning behind these concerns. Results indicate that Internet users are concerned about a wider range of privacy issues than surveys have typically covered. The results do not provide final definitions for the areas of online privacy, but provide information that is useful to gain a better understanding of privacy concerns and actions.

237 citations

Journal ArticleDOI
TL;DR: In this article, the authors present results of an online experiment that evaluated consumer response to privacy seals in a naturalistic exposure setting and found that privacy seals enhance trust in the Web site and expectations that the site would inform the user of its information practices.
Abstract: Online privacy is an issue of increasing national importance, and voluntary privacy seals provided by third-party organizations such as TRUSTe and BBBOnline have been proposed as a means of assuring consumer privacy. Few studies have examined privacy seal effects. This study presents results of an online experiment that evaluated consumer response to privacy seals in a naturalistic exposure setting. Findings suggest that privacy seals enhance trust in the Web site and expectations that the site would inform the user of its information practices. While concern for privacy-threatening information practices had no influence, privacy self-efficacy, confidence in ability to protect one's privacy, moderated seal effects. Implications for the continued role of privacy seals are discussed. ********** Online consumer privacy has attracted the attention of state and federal regulators and poses a significant challenge to online marketers. Concerns for the confidentiality of personal information are widespread (Cole 2001; NTIA 2000; Pew Research 2000). However, 64% of adult consumers report never seeking out instructions on how to protect one's personal information on the Internet, and 40% report knowing almost nothing about how to prevent Web sites from collecting their information (Turow 2003). Three-fourths of nonusers see the Internet as a privacy threat (Cole 2001), suggesting that online privacy invasion is a deterrent to potential Internet shoppers as well. Privacy threats may lower participation in commercial activities online and are of particular concern to new users and women (Pew Research 2000), thereby limiting the growth potential of online commerce. The debate is not merely academic since the release of consumer credit information can transform Internet users into victims of credit card and other financial fraud. A content analysis of leading e-commerce sites by the Federal Trade Commission (FTC) found that only 20% met the agency's standards for preserving consumer privacy (FTC 2000), and more recently, violations of online privacy policies have been unveiled. Fair-practice database information and notice standards are sought by all stakeholders (FTC 2000; Milne and Rohm 2000). The FTC and industry leaders alike had hoped that voluntary third-party seal programs (e.g., TRUSTe, BBBOnline) with clear privacy policy language and iconic representation of privacy guarantees (Green et al. 2000) would provide a self-regulatory solution to adequate notice. The public demand for third-party verification (Harris Interactive 2002) and slow adoption of Platform for Privacy Preferences (P3P), the automated browser privacy program by individual Web sites, suggest that use of third-party seal verification programs is likely to increase (Festa 2002). To date, little research has examined consumer response to privacy seals. Notably, Miyazaki and Krishnamurthy (2002) examined the effects of privacy seal presence, in off-line conditions, with clearly stated privacy policies. Their findings suggest that seals may have the effects desired by online retailers but pose a problem for true consumer protection. Participants had more favorable perceptions of privacy policies at Web sites that displayed seals, and seals increased anticipated disclosures and patronage for individuals who viewed online shopping as risky. The results are discouraging for consumer protection since Miyazaki and Krishnamurthy (2002) also found no differences in the privacy policies of Web sites on the basis of seal display. More recently, LaRose and Rifon (forthcoming) found that sealed sites were significantly more invasive than the unsealed sites with respect to the amount of personal information requested. Other recent evidence suggests that a majority (57%) of consumers inaccurately interpret a Web site privacy policy's presence as an indication that the Web site does not collect or share their personal information (Turow 2003). …

237 citations

Proceedings ArticleDOI
20 Apr 2009
TL;DR: This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership that promotes truthfulness, and that rewards users who promote co-ownership, and shows that supporting these type of solutions is not feasible, but can be implemented through a minimal increase in overhead to end-users.
Abstract: Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression for users, and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social Network sites, Social Networks yet do not support any mechanism for collaborative management of privacy settings for shared content. In this paper, we model the problem of collaborative enforcement of privacy policies on shared data by using game theory. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness, and that rewards users who promote co-ownership. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge this is the first time such a protection mechanism for Social Networking has been proposed. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks. We show that supporting these type of solutions is not also feasible, but can be implemented through a minimal increase in overhead to end-users.

236 citations

Journal ArticleDOI
01 Jan 2003
TL;DR: Many discarded hard drives contain information that is both confidential and recoverable, as the authors' own experiment shows.
Abstract: Many discarded hard drives contain information that is both confidential and recoverable, as the authors' own experiment shows. The availability of this information is little publicized, but awareness of it will surely spread.

236 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277