904 resultados para Privacy Enhencing Technologies
Resumo:
While several privacy protection techniques are pre- sented in the literature, they are not complemented with an established objective evaluation method for their assess- ment and comparison. This paper proposes an annotation- free evaluation method that assesses the two key aspects of privacy protection that are privacy and utility. Unlike some existing methods, the proposed method does not rely on the use of subjective judgements and does not assume a spe- cific target type in the image data. The privacy aspect is quantified as an appearance similarity and the utility aspect is measured as a structural similarity between the original raw image data and the privacy-protected image data. We performed an extensive experimentation using six challeng- ing datasets (including two new ones) to demonstrate the effectiveness of the evaluation method by providing a per- formance comparison of four state-of-the-art privacy pro- tection techniques.
Resumo:
With the increase in e-commerce and the digitisation of design data and information,the construction sector has become reliant upon IT infrastructure and systems. The design and production process is more complex, more interconnected, and reliant upon greater information mobility, with seamless exchange of data and information in real time. Construction small and medium-sized enterprises (CSMEs), in particular,the speciality contractors, can effectively utilise cost-effective collaboration-enabling technologies, such as cloud computing, to help in the effective transfer of information and data to improve productivity. The system dynamics (SD) approach offers a perspective and tools to enable a better understanding of the dynamics of complex systems. This research focuses upon system dynamics methodology as a modelling and analysis tool in order to understand and identify the key drivers in the absorption of cloud computing for CSMEs. The aim of this paper is to determine how the use of system dynamics (SD) can improve the management of information flow through collaborative technologies leading to improved productivity. The data supporting the use of system dynamics was obtained through a pilot study consisting of questionnaires and interviews from five CSMEs in the UK house-building sector.
Resumo:
Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.
Resumo:
This paper presents a study on reduction of energy consumption in buildings through behaviour change informed by wireless monitoring systems for energy, environmental conditions and people positions. A key part to the Wi-Be system is the ability to accurately attribute energy usage behaviour to individuals, so they can be targeted with specific feedback tailored to their preferences. The use of wireless technologies for indoor positioning was investigated to ascertain the difficulties in deployment and potential benefits. The research to date has demonstrated the effectiveness of highly disaggregated personal-level data for developing insights into people’s energy behaviour and identifying significant energy saving opportunities (up to 77% in specific areas). Behavioural research addressed social issues such as privacy, which could affect the deployment of the system. Radio-frequency research into less intrusive technologies indicates that received-signal-strength-indicator-based systems should be able to detect the presence of a human body, though further work would be needed in both social and engineering areas.
Resumo:
This article presents an experimental scalable message driven IoT and its security architecture based on Decentralized Information Flow Control. The system uses a gateway that exports SoA (REST) interfaces to the internet simplifying external applications whereas uses DIFC and asynchronous messaging within the home environment.
Resumo:
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that follow the "Privacy by Design" model created by Ann Cavoukian, Ph.D.