-
1
Issues of privacy policy conflict in mobile social network
Published 2020-03-01“…In this article, aiming at the personalized privacy protection model proposed in our published paper, we analyzed the possible conflict between privacy policies and comprehensively considered the policy conflict brought by the resource-level relationship; meanwhile, we proposed a scheme of consistency verification for privacy policy to improve the previous personalized privacy protection model. …”
Get full text
Article -
2
Specification and enforcement of personalized privacy policy for social network
Published 2012-09-01Subjects: Get full text
Article -
3
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01Subjects: Get full text
Article -
4
GDPR-oriented intelligent checking method of privacy policies compliance
Published 2023-12-01Subjects: Get full text
Article -
5
Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle
Published 2024-12-01Subjects: Get full text
Article -
6
Privacy-preserving photo sharing framework cross different social network
Published 2019-07-01“…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
Get full text
Article -
7
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…In this paper, firstly, we model service privacy policy and user privacy preference with description logic. …”
Get full text
Article -
8
South African Electoral Commission’s mobile app for voters: Data privacy and security dimensions
Published 2024-12-01“…The study also demonstrates the importance of data minimisation, transparent practices, and adherence to privacy policies in order to maintain user trust and security in electoral technology. …”
Get full text
Article -
9
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…Since China’s Data Security Law, Personal Information Protection Law and related laws were formalized, demand for privacy protection technology talents has increased sharply, and data privacy protection courses have been gradually offered in the cyberspace security majors of various universities.Building on longstanding practices in data security research and teaching, the teaching team of “Academician Fang Binxing’s Experimental Class” (referred to as “Fang Class”) at Guangzhou University has proposed a teaching method for data privacy protection based on a teaching-in-practice range.In the selection of teaching course content, the teaching team selected eight typical key privacy protection techniques including anonymity model, differential privacy, searchable encryption, ciphertext computation, adversarial training, multimedia privacy protection, privacy policy conflict resolution, and privacy violation traceability.Besides, the corresponding teaching modules were designed, which were deployed in the teaching practice range for students to learn and train.Three teaching methods were designed, including the knowledge and application oriented teaching method which integrates theory and programming, the engineering practice oriented teaching method based on algorithm extension and adaptation, and the comprehensive practice oriented teaching method for practical application scenarios.Then the closed loop of “learning-doing-using” knowledge learning and application was realized.Through three years of privacy protection teaching practice, the “Fang class” has achieved remarkable results in cultivating students’ knowledge application ability, engineering practice ability and comprehensive innovation ability, which provided useful discussion for the construction of the initial course of data privacy protection.…”
Get full text
Article -
10
Children's digital privacy on fast-food and dine-in restaurant mobile applications.
Published 2025-02-01“…Privacy policies of the top 30 fast-food and dine-in restaurants in Canada were reviewed. …”
Get full text
Article -
11
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…The study also reveals the role of privacy policies and security concerns in consumer intentions to use e-wallets. …”
Get full text
Article -
12
The role of risk attitudes in shaping digital privacy preferences: evidence from a large-scale survey
Published 2025-01-01“…The findings suggest that privacy policies could be more effective through tailored approaches, including customized privacy settings and targeted educational campaigns that account for individual risk aversion.…”
Get full text
Article