scispace - formally typeset
Search or ask a question
Topic

Information privacy

About: Information privacy is a research topic. Over the lifetime, 25412 publications have been published within this topic receiving 579611 citations. The topic is also known as: data privacy & data protection.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors examine consumer perspectives of data collection awareness and knowledge of name removal mechanisms, such as opt in and opt out, across mail, telephone, and Internet direct channels.
Abstract: The authors examine consumer perspectives of data collection awareness and knowledge of name removal mechanisms, such as opt in and opt out, across mail, telephone, and Internet direct channels. The authors investigate consumer privacy states based on the fair information practices of notice (data collection awareness) and choice (knowledge of name removal mechanisms). Data from a national survey suggest that name removal preference varies by channel, consumer privacy state, channel-specific purchase experience, and consumer demographics. Empirical support is also found for alternative approaches (i.e., opt-in methods) for removing personal information from direct marketing lists.

233 citations

Proceedings ArticleDOI
20 Aug 2006
TL;DR: A suite of anonymization algorithms that produce an anonymous view based on a target class of workloads, consisting of one or more data mining tasks, as well as selection predicates are provided.
Abstract: Protecting data privacy is an important problem in microdata distribution. Anonymization algorithms typically aim to protect individual privacy, with minimal impact on the quality of the resulting data. While the bulk of previous work has measured quality through one-size-fits-all measures, we argue that quality is best judged with respect to the workload for which the data will ultimately be used.This paper provides a suite of anonymization algorithms that produce an anonymous view based on a target class of workloads, consisting of one or more data mining tasks, as well as selection predicates. An extensive experimental evaluation indicates that this approach is often more effective than previous anonymization techniques.

232 citations

Journal ArticleDOI
01 Jul 2004
TL;DR: In this work, ontologies are proposed for modeling the high-level security requirements and capabilities of Web services and clients and helps to match a client's request with appropriate services-those based on security criteria as well as functional descriptions.
Abstract: Web services will soon handle users' private information. They'll need to provide privacy guarantees to prevent this delicate information from ending up in the wrong hands. More generally, Web services will need to reason about their users' policies that specify who can access private information and under what conditions. These requirements are even more stringent for semantic Web services that exploit the semantic Web to automate their discovery and interaction because they must autonomously decide what information to exchange and how. In our previous work, we proposed ontologies for modeling the high-level security requirements and capabilities of Web services and clients.1 This modeling helps to match a client's request with appropriate services-those based on security criteria as well as functional descriptions.

231 citations

Journal ArticleDOI
TL;DR: This article emphasizes a researcher's obligation to protect research participants' privacy in mediated research contexts; and offers an introductory framework for reconsidering how to make case-based decisions to better protect the interests of participants in situations where vulnerability or potential harm is not easily determined.
Abstract: This article focuses on innovative methods for protecting privacy in research of Internet-mediated social contexts. Traditional methods for protecting privacy by hiding or anonymizing data no longer suffice in situations where social researchers need to design studies, manage data, and build research reports in increasingly public, archivable, searchable, and traceable spaces. In such research environments, there are few means of adequately disguising details about the venue and the persons being studied. One practical method of data representation in contexts in which privacy protection is unstable is fabrication, involving creative, bricolage-style transfiguration of original data into composite accounts or representational interactions. This article traces some of the historical trends that have restricted such creative ethical solutions; emphasizes a researcher's obligation to protect research participants' privacy in mediated research contexts; and offers an introductory framework for reconsidering h...

231 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
88% related
Server
79.5K papers, 1.4M citations
85% related
Encryption
98.3K papers, 1.4M citations
84% related
Social network
42.9K papers, 1.5M citations
83% related
Wireless network
122.5K papers, 2.1M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023562
20221,226
20211,535
20201,634
20191,255
20181,277