Exploiting Community Detection to Recommend Privacy Policies in Decentralized Online Social Networks
5
Citation
16
Reference
10
Related Paper
Citation Trend
Keywords:
Privacy software
Privacy Protection
The LPL Personal Privacy Policy User Interface (LPL PPP UI) is designed to allow for informed and free consent. An extension for the Layered Privacy Language and the Privacy Icons Overview is introduced here. The capabilities of the LPL PPP UI consist of informing the Data Subject about the contents of a privacy policy in a structured way, personal privacy interactions, and giving the Data Subject an overview utilising privacy icons are presented. The impact of the Privacy Icons Overview is further evaluated, taking into consideration both speed and accuracy. Furthermore, additional challenges for the creation of a privacy policy user interface as well as privacy icons are presented.
Privacy software
Interface (matter)
Cite
Citations (9)
This thesis investigates the privacy risks that m-learning app users face by identifying the personal information that m-learning apps collect from their users, and the privacy policies of these apps. It reveals that most of the m-learning applications have similar privacy policies, which seem to protect the interest of the providers rather than the users. The Privacy by Design framework is reviewed to determine whether it can help the developers address user privacy practices. The results from the sample of 260 participants suggest that users are less concerned with the collection of personal information that is non-identifiable. The survey also revealed that the users are more concerned when an app shares their personal information with third parties for commercial purposes than when it is shared with the government.
Privacy software
Privacy Protection
Mobile apps
Information sensitivity
Cite
Citations (0)
This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes a new federal law designed to remedy this situation. This piece argues that with minimal governmental regulation, electronic privacy policies can become effective tools to protect consumers personally identifying information.
Privacy software
Consumer privacy
Cite
Citations (1)
The increased interest in personal privacy has led businesses to issue privacy statements in hard copy and on Web sites that serve to notify the public of their intentions with regard to the collection and use of site visitors’ personal information. This in-process research presents data derived from Web site visits to show the extent of use and the content of privacy policies in large and small U.S. businesses. The large Fortune 500 businesses have slightly more than 50% with privacy policies. In contrast, less than 15% of the Inc. 500 have privacy policies. These large and small businesses also differ in regard to the content of the privacy policies and the use of visible privacy seals.
Privacy software
Cite
Citations (4)
The processing of personal information is omnipresent in our datadriven society enabling personalized services, which are regulated by privacy policies. Although privacy policies are strictly defined by the General Data Protection Regulation (GDPR), no systematic mechanism is in place to enforce them. Especially if data is merged from several sources into a data-set with different privacy policies associated, the management and compliance to all privacy requirements is challenging during the processing of the data-set. Privacy policies can vary hereby due to different policies for each source or personalization of privacy policies by individual users. Thus, the risk for negligent or malicious processing of personal data due to defiance of privacy policies exists. To tackle this challenge, a privacy-preserving framework is proposed. Within this framework privacy policies are expressed in the proposed Layered Privacy Language (LPL) which allows to specify legal privacy policies and privacy-preserving de-identification methods. The policies are enforced by a Policy-based De-identification (PD) process. The PD process enables efficient compliance to various privacy policies simultaneously while applying pseudonymization, personal privacy anonymization and privacy models for de-identification of the data-set. Thus, the privacy requirements of each individual privacy policy are enforced filling the gap between legal privacy policies and their technical enforcement.
Privacy software
Identification
Cite
Citations (4)
The recent trend of growing breaches of personal privacy suggests the urgent need for privacy protection. Legislated by Japan's General Services Administration in May 2003, the Privacy Act applies to activities dealing with personal information in private industry sectors including the information telecommunications industry. The Privacy Act stipulates the basic policies for the general execution of personal information protection and roles and duties related to privacy management for information telecommunications companies. The Act take effect on April 1, 2005 for information telecommunications industries. This document reviews the contents of the Japanese Privacy Act and seeks to understand the Japanese policy direction regarding privacy protection to address strategic current issues for Korean privacy policies
Privacy software
Privacy Protection
Cite
Citations (0)
Individuals are becoming increasingly concerned regarding the protection of their personal information. In an attempt to ease the privacy concerns of individuals, organisations publish privacy policies, promising how they will handle personal information. However, privacy policies as such do not guarantee the protection of personal information and do not offer much customisation on an individual level. Individual privacy contracts are proposed as a solution to this problem. A privacy contract constitutes a legal base on which to contest privacy breaches, should any occur. Every data subject has to enter into a privacy contract (consisting of privacy agreements) with the data controller, otherwise no transactions can be performed between the two parties. A data subject must consent to a privacy agreement before the data controller can use the data of the transaction associated with the agreement. This paper presents the principles and a conceptual view of the management of privacy contracts.
Privacy software
Publication
CONTEST
Cite
Citations (15)
Personal privacy in the era of big data involves information privacy, communication privacy, space privacy, and portrait privacy. Currently, personal privacy leaks happen frequently, affecting people's daily life and property safety. In response to the dilemma faced by personal privacy protection, we should actively improve relevant laws and regulations, improve key technologies for personal privacy protection, and enhance individual privacy protection awareness.
Privacy software
Privacy Protection
Cite
Citations (3)
Recently, the concern and significance about the privacy protection for Internet users are increased as many incidents of privacy violation have been occurred. Regarding the privacy problem, there are a few traditional privacy protection schemes. One of them is setting privacy policies of users' private information. P3P, EPAL and XACML are famous examples of that kind of privacy protection methods which requires presetting of privacy policy. However, there are three problems. First, privacy policy setting is difficult to users who have no knowledge of privacy policy and how to use of the methods. Second, it is impossible to define the privacy policies considering all cases. Lastly, privacy policy setting without considering the privacy-related consequences may cause privacy violations. In this paper, we propose a usability enhanced privacy protection system based on users' responses. The proposed system uses the users' responses to measure and reflect their privacy preferences. Moreover, the system considers data sensitivities to notice the expected privacy- related consequences when users allow release of their sensitive personal information.
XACML
Privacy software
Privacy Protection
Private information retrieval
Cite
Citations (6)
Internet privacy policies describe an organization's practices on data collection, use, and disclosure. These privacy policies both protect the organization and signal integrity commitment to site visitors. Consumers use the stated website policies to guide browsing and transaction decisions. This paper compares the classes of privacy protection goals (which express desired protection of consumer privacy rights) and vulnerabilities (which potentially threaten consumer privacy) with consumer privacy values. For this study, we looked at privacy policies from nearly 50 websites and surveyed over 1000 Internet users. We examined Internet users' major expectations about website privacy and revealed a notable discrepancy between what privacy policies are currently stating and what users deem most significant. Our findings suggest several implications to privacy managers and software project managers. Results from this study can help managers determine the kinds of policies needed to both satisfy user values and ensure privacy-aware website development efforts.
Privacy software
Consumer privacy
Cite
Citations (232)