Showing 1 - 12 results of 12 for search '"privacy policy"', query time: 0.07s Refine Results
  1. 1

    Issues of privacy policy conflict in mobile social network by Pingshui Wang, Qinjuan Ma

    Published 2020-03-01
    “…In this article, aiming at the personalized privacy protection model proposed in our published paper, we analyzed the possible conflict between privacy policies and comprehensively considered the policy conflict brought by the resource-level relationship; meanwhile, we proposed a scheme of consistency verification for privacy policy to improve the previous personalized privacy protection model. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI

    Published 2019-07-01
    “…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article
  7. 7

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…In this paper, firstly, we model service privacy policy and user privacy preference with description logic. …”
    Get full text
    Article
  8. 8

    South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions by Nawal Omar, Scott Timcke

    Published 2024-12-01
    “…The study also demonstrates the importance of data minimisation, transparent practices, and adherence to privacy policies in order to maintain user trust and security in electoral technology. …”
    Get full text
    Article
  9. 9

    Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range by Zhe SUN, Hong NING, Lihua YIN, Binxing FANG

    Published 2023-02-01
    “…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
    Get full text
    Article
  10. 10

    Children's digital privacy on fast-food and dine-in restaurant mobile applications. by Christine Mulligan, Grace Gillis, Lauren Remedios, Christopher Parsons, Laura Vergeer, Monique Potvin Kent

    Published 2025-02-01
    “…Privacy policies of the top 30 fast-food and dine-in restaurants in Canada were reviewed. …”
    Get full text
    Article
  11. 11

    THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS by Thi Thu Huong Hoang, Hoang Nam Vu, Thi Khanh Chi Nguyen

    Published 2023-04-01
    “…The study also reveals the role of privacy policies and security concerns in consumer intentions to use e-wallets. …”
    Get full text
    Article
  12. 12

    The role of risk attitudes in shaping digital privacy preferences: evidence from a large-scale survey by Jing Chen, Manling Zhang, Mengyao Guo, Ze Gao

    Published 2025-01-01
    “…The findings suggest that privacy policies could be more effective through tailored approaches, including customized privacy settings and targeted educational campaigns that account for individual risk aversion.…”
    Get full text
    Article