CINXE.COM
Search results for: privacy issues
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: privacy issues</title> <meta name="description" content="Search results for: privacy issues"> <meta name="keywords" content="privacy issues"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="privacy issues" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="privacy issues"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5519</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: privacy issues</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5519</span> An Overview of Privacy and Security Issues in Social Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamad%20Ibrahim%20Al%20Ladan">Mohamad Ibrahim Al Ladan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20issues" title="social networks privacy issues">social networks privacy issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20issues" title=" social networks security issues"> social networks security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20precautions%20measures" title=" social networks privacy precautions measures"> social networks privacy precautions measures</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20precautions%20measures" title=" social networks security precautions measures"> social networks security precautions measures</a> </p> <a href="https://publications.waset.org/abstracts/74547/an-overview-of-privacy-and-security-issues-in-social-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5518</span> Offshore Outsourcing: Global Data Privacy Controls and International Compliance Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michelle%20J.%20Miller">Michelle J. Miller</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent year, there has been a rise of two emerging issues that impact the global employment and business market that the legal community must review closer: offshore outsourcing and data privacy. These two issues intersect because employment opportunities are shifting due to offshore outsourcing and some States, like the United States, anti-outsourcing legislation has been passed or presented to retain jobs within the country. In addition, the legal requirements to retain the privacy of data as a global employer extends to employees and third party service provides, including services outsourced to offshore locations. For this reason, this paper will review the intersection of these two issues with a specific focus on data privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=outsourcing" title="outsourcing">outsourcing</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20compliance" title=" international compliance"> international compliance</a>, <a href="https://publications.waset.org/abstracts/search?q=multinational%20corporations" title=" multinational corporations"> multinational corporations</a> </p> <a href="https://publications.waset.org/abstracts/35220/offshore-outsourcing-global-data-privacy-controls-and-international-compliance-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35220.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">411</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5517</span> Choosing an Optimal Epsilon for Differentially Private Arrhythmia Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arin%20Ghazarian">Arin Ghazarian</a>, <a href="https://publications.waset.org/abstracts/search?q=Cyril%20Rakovski"> Cyril Rakovski</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Differential privacy has become the leading technique to protect the privacy of individuals in a database while allowing useful analysis to be done and the results to be shared. It puts a guarantee on the amount of privacy loss in the worst-case scenario. Differential privacy is not a toggle between full privacy and zero privacy. It controls the tradeoff between the accuracy of the results and the privacy loss using a single key parameter called <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arrhythmia" title="arrhythmia">arrhythmia</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiology" title=" cardiology"> cardiology</a>, <a href="https://publications.waset.org/abstracts/search?q=differential%20privacy" title=" differential privacy"> differential privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=epsilon" title=" epsilon"> epsilon</a>, <a href="https://publications.waset.org/abstracts/search?q=medi-cal%20data" title=" medi-cal data"> medi-cal data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preserving%20analytics" title=" privacy preserving analytics"> privacy preserving analytics</a>, <a href="https://publications.waset.org/abstracts/search?q=statistical%20databases" title=" statistical databases"> statistical databases</a> </p> <a href="https://publications.waset.org/abstracts/117252/choosing-an-optimal-epsilon-for-differentially-private-arrhythmia-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117252.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5516</span> Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tao%20Feng">Tao Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=Fei%20Xing"> Fei Xing</a>, <a href="https://publications.waset.org/abstracts/search?q=Ye%20Lu"> Ye Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jun%20Li%20Fang"> Jun Li Fang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NDN" title="NDN">NDN</a>, <a href="https://publications.waset.org/abstracts/search?q=mutual%20anonymity" title=" mutual anonymity"> mutual anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=anonymous%20routing" title=" anonymous routing"> anonymous routing</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20coding" title=" network coding"> network coding</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20mechanism" title=" authentication mechanism"> authentication mechanism</a> </p> <a href="https://publications.waset.org/abstracts/28422/secure-network-coding-based-named-data-network-mutual-anonymity-transfer-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28422.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5515</span> Privacy for the Internet of Things and its Different Dimensions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20M%20Esfahani">Maryam M Esfahani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iot" title="Iot">Iot</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=different%20dimension%20of%20privacy" title=" different dimension of privacy"> different dimension of privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=W3model" title=" W3model"> W3model</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20enhancing%20technologies" title=" privacy enhancing technologies"> privacy enhancing technologies</a> </p> <a href="https://publications.waset.org/abstracts/168830/privacy-for-the-internet-of-things-and-its-different-dimensions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5514</span> A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tosin%20Ige">Tosin Ige</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data" title="data">data</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=association%20rule" title=" association rule"> association rule</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preserving" title=" privacy preserving"> privacy preserving</a>, <a href="https://publications.waset.org/abstracts/search?q=mining%20technique" title=" mining technique"> mining technique</a> </p> <a href="https://publications.waset.org/abstracts/145870/a-comprehensive-survey-and-improvement-to-existing-privacy-preserving-data-mining-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145870.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5513</span> The Connection Between the International Law and the Legal Consultation on the Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Farouk%20Ahmed%20Ali%20Hussin">Amir Farouk Ahmed Ali Hussin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20legal" title="international legal">international legal</a>, <a href="https://publications.waset.org/abstracts/search?q=consultation%20mix" title=" consultation mix"> consultation mix</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20research" title=" legal research"> legal research</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20and%20medium-sized%20enterprises" title=" small and medium-sized enterprises"> small and medium-sized enterprises</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20International%20law" title=" strategic International law"> strategic International law</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy%20alignment" title=" strategy alignment"> strategy alignment</a>, <a href="https://publications.waset.org/abstracts/search?q=house%20of%20laws" title=" house of laws"> house of laws</a>, <a href="https://publications.waset.org/abstracts/search?q=deployment" title=" deployment"> deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20strategy" title=" production strategy"> production strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20strategy" title=" legal strategy"> legal strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20strategy" title=" business strategy"> business strategy</a> </p> <a href="https://publications.waset.org/abstracts/183135/the-connection-between-the-international-law-and-the-legal-consultation-on-the-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5512</span> Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wajdan%20Al%20Malwi">Wajdan Al Malwi</a>, <a href="https://publications.waset.org/abstracts/search?q=Karen%20Renaud"> Karen Renaud</a>, <a href="https://publications.waset.org/abstracts/search?q=Lewis%20Mackenzie"> Lewis Mackenzie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy%20paradox" title="privacy paradox">privacy paradox</a>, <a href="https://publications.waset.org/abstracts/search?q=self-disclosure" title=" self-disclosure"> self-disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20attitude" title=" privacy attitude"> privacy attitude</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20behavior" title=" privacy behavior"> privacy behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networking%20sites" title=" social networking sites"> social networking sites</a> </p> <a href="https://publications.waset.org/abstracts/134213/users-information-disclosure-determinants-in-social-networking-sites-a-systematic-literature-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134213.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5511</span> Self-Disclosure and Privacy Management Behavior in Social Media: Privacy Calculus Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chien-Wen%20Chen">Chien-Wen Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Nguyen%20Duong%20Thuy%20Trang"> Nguyen Duong Thuy Trang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Hsuan%20Chang"> Yu-Hsuan Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the development of information technology, social networking sites are inseparable from life and have become an important way for people to communicate. Nonetheless, privacy issues are raised by the presence of personal information on social networking sites. However, users can benefit from using the functions of social networking sites, which also leads to users worrying about the leakage of personal information without corresponding privacy protection behaviors, which is called the privacy paradox. However, previous studies have questioned the viewpoint of the privacy paradox, believing that users are not so naive and that people with privacy concerns will conduct privacy management. Consequently, this study is based on the view of privacy calculation perspective to investigate the privacy behavior of users on social networking sites. Among them, social benefits and privacy concerns are taken as the expected benefits and costs in the viewpoint of privacy calculation. At the same time, this study also explores the antecedents, including positive feedback, self-presentation, privacy policy, and information sensitivity, and the consequence of privacy behavior of weighing benefits and costs, including self-disclosure and three privacy management strategies by interpersonal boundaries (Preventive, Censorship, and Corrective). The survey respondents' characteristics and prior use experience of social networking sites were analyzed. As a consequence, a survey of 596 social network users was conducted online to validate the research framework. The results show that social benefit has the greatest influence on privacy behavior. The most important external factors affecting privacy behavior are positive feedback, followed by the privacy policy and information sensitivity. In addition, the important findings of this study are that social benefits will positively affect privacy management. It shows that users can get satisfaction from interacting with others through social networking sites. They will not only disclose themselves but also manage their privacy on social networking sites after considering social benefits and privacy management on social networking sites, and it expands the adoption of the Privacy Calculus Perspective framework from prior research. Therefore, it is suggested that as the functions of social networking sites increase and the development of social networking sites, users' needs should be understood and updated in order to ensure the sustainable operation of social networking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy%20calculus%20perspective" title="privacy calculus perspective">privacy calculus perspective</a>, <a href="https://publications.waset.org/abstracts/search?q=self-disclosure" title=" self-disclosure"> self-disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20management" title=" privacy management"> privacy management</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20benefit" title=" social benefit"> social benefit</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20concern" title=" privacy concern"> privacy concern</a> </p> <a href="https://publications.waset.org/abstracts/161178/self-disclosure-and-privacy-management-behavior-in-social-media-privacy-calculus-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161178.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5510</span> Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tharntip%20Tawnie%20Chutikulrungsee">Tharntip Tawnie Chutikulrungsee</a>, <a href="https://publications.waset.org/abstracts/search?q=Oliver%20Kisalay%20Burmeister"> Oliver Kisalay Burmeister</a>, <a href="https://publications.waset.org/abstracts/search?q=Maumita%20Bhattacharya"> Maumita Bhattacharya</a>, <a href="https://publications.waset.org/abstracts/search?q=Dragana%20Calic"> Dragana Calic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=facebook" title="facebook">facebook</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20privacy" title=" online privacy"> online privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=other-generated%20disclosure" title=" other-generated disclosure"> other-generated disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20sites%20%28SNSs%29" title=" social networks sites (SNSs)"> social networks sites (SNSs)</a> </p> <a href="https://publications.waset.org/abstracts/66391/other-generated-disclosure-a-challenge-to-privacy-on-social-network-sites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/66391.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5509</span> Digital Privacy Legislation Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Henry%20Foulds">Henry Foulds</a>, <a href="https://publications.waset.org/abstracts/search?q=Magda%20Huisman"> Magda Huisman</a>, <a href="https://publications.waset.org/abstracts/search?q=Gunther%20R.%20Drevin"> Gunther R. Drevin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> <p class="Abstract" style="text-indent:10.2pt">Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people’s privacy from being exploited by misuse of these technologies.<o:p></o:p> <p class="Abstract" style="margin-top:0cm">This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among computer science students. The chosen fixed variables for the population are study year and gamer classification.<o:p></o:p> <p class="Abstract" style="margin-top:0cm">The use of location based services in mobile applications and games are a concern for digital privacy. For this reason the study focused on computer science students as they have a high likelihood to use and develop this type of software. Surveys were used to evaluate awareness and perceived importance of digital privacy legislation.<o:p></o:p> <p class="Abstract" style="margin-top:0cm">The results of the study show that privacy legislation and awareness of privacy legislation are important to people. The perception of the importance of privacy legislation increases with academic experience. Awareness of privacy legislation increases from non-gamers to pro gamers. <o:p></o:p> <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20privacy" title="digital privacy">digital privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation%20awareness" title=" legislation awareness"> legislation awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=gaming" title=" gaming"> gaming</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20legislation" title=" privacy legislation"> privacy legislation</a> </p> <a href="https://publications.waset.org/abstracts/2041/digital-privacy-legislation-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">355</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5508</span> Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sanaz%20Kavianpour">Sanaz Kavianpour</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuraini%20Ismail"> Zuraini Ismail</a>, <a href="https://publications.waset.org/abstracts/search?q=Bharanidharan%20Shanmugam"> Bharanidharan Shanmugam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social Network Sites (SNSs) can be served as an invaluable platform to transfer the information across a large number of individuals. A substantial component of communicating and managing information is to identify which individual will influence others in propagating information and also whether dissemination of information in the absence of social signals about that information will be occurred or not. Classifying the final audience of social data is difficult as controlling the social contexts which transfers among individuals are not completely possible. Hence, undesirable information diffusion to an unauthorized individual on SNSs can threaten individuals’ privacy. This paper highlights the information diffusion in SNSs and moreover it emphasizes the most significant privacy issues to individuals of SNSs. The goal of this paper is to propose a privacy-preserving model that has urgent regards with individuals’ data in order to control availability of data and improve privacy by providing access to the data for an appropriate third parties without compromising the advantages of information sharing through SNSs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymization%20algorithm" title="anonymization algorithm">anonymization algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=classification%20algorithm" title=" classification algorithm"> classification algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20diffusion" title=" information diffusion"> information diffusion</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network%20sites" title=" social network sites"> social network sites</a> </p> <a href="https://publications.waset.org/abstracts/38265/privacy-preserving-model-for-social-network-sites-to-prevent-unwanted-information-diffusion" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38265.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5507</span> A Systematic Literature Review on Security and Privacy Design Patterns</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebtehal%20Aljedaani">Ebtehal Aljedaani</a>, <a href="https://publications.waset.org/abstracts/search?q=Maha%20Aljohani"> Maha Aljohani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design%20patterns" title="design patterns">design patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=classification%20of%20patterns" title=" classification of patterns"> classification of patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20patterns" title=" security patterns"> security patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20patterns" title=" privacy patterns"> privacy patterns</a> </p> <a href="https://publications.waset.org/abstracts/174494/a-systematic-literature-review-on-security-and-privacy-design-patterns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174494.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5506</span> The Relationship Between Artificial Intelligence, Data Science, and Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Naidoo">M. Naidoo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial intelligence often requires large amounts of good quality data. Within important fields, such as healthcare, the training of AI systems predominately relies on health and personal data; however, the usage of this data is complicated by various layers of law and ethics that seek to protect individuals’ privacy rights. This research seeks to establish the challenges AI and data sciences pose to (i) informational rights, (ii) privacy rights, and (iii) data protection. To solve some of the issues presented, various methods are suggested, such as embedding values in technological development, proper balancing of rights and interests, and others. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20science" title=" data science"> data science</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=policy" title=" policy"> policy</a> </p> <a href="https://publications.waset.org/abstracts/153286/the-relationship-between-artificial-intelligence-data-science-and-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153286.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5505</span> Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarthak%20Mishra">Sarthak Mishra</a>, <a href="https://publications.waset.org/abstracts/search?q=Astha%20Sinha"> Astha Sinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business-business%20transaction%20%28B2B%29" title="business-business transaction (B2B)">business-business transaction (B2B)</a>, <a href="https://publications.waset.org/abstracts/search?q=business-consumer%20transaction%20%28B2C%29" title=" business-consumer transaction (B2C)"> business-consumer transaction (B2C)</a>, <a href="https://publications.waset.org/abstracts/search?q=e-commerce" title=" e-commerce"> e-commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20transaction" title=" online transaction"> online transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20and%20security%20threats" title=" privacy and security threats"> privacy and security threats</a> </p> <a href="https://publications.waset.org/abstracts/53081/securing-the-electronic-commerce-the-way-forward-a-comparative-ananlysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">232</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5504</span> A New Protocol Ensuring Users' Privacy in Pervasive Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Nadir%20Djedid">Mohammed Nadir Djedid</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdallah%20Chouarfia"> Abdallah Chouarfia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pervasive%20systems" title="pervasive systems">pervasive systems</a>, <a href="https://publications.waset.org/abstracts/search?q=identification" title=" identification"> identification</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/3114/a-new-protocol-ensuring-users-privacy-in-pervasive-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3114.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5503</span> Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manvar%20Sagar">Manvar Sagar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikul%20Virpariya"> Nikul Virpariya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Privacy" title="Privacy">Privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Privacy%20Preservation%20in%20Data%20Mining%20%28PPDM%29" title=" Privacy Preservation in Data Mining (PPDM)"> Privacy Preservation in Data Mining (PPDM)</a>, <a href="https://publications.waset.org/abstracts/search?q=horizontally%20partitioned%20database" title=" horizontally partitioned database"> horizontally partitioned database</a>, <a href="https://publications.waset.org/abstracts/search?q=EMHS" title=" EMHS"> EMHS</a>, <a href="https://publications.waset.org/abstracts/search?q=MFI" title=" MFI"> MFI</a>, <a href="https://publications.waset.org/abstracts/search?q=shamir%20secret%20sharing" title=" shamir secret sharing"> shamir secret sharing</a> </p> <a href="https://publications.waset.org/abstracts/20983/privacy-preserving-in-association-rule-mining-on-horizontally-partitioned-database" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20983.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">408</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5502</span> Online Shopping vs Privacy – Results of an Experimental Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrzej%20Poszewiecki">Andrzej Poszewiecki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The presented paper contributes to the experimental current of research on privacy. The question of privacy is being discussed at length at present, primarily among lawyers and politicians. However, the matter of privacy has been of interest for economists for some time as well. The valuation of privacy by people is of great importance now. This article is about how people valuate their privacy. An experimental method has been utilised in the conducted research – the survey was carried out among customers of an online store, and the studied issue was whether their readiness to sell their data (WTA) was different from the willingness to buy data back (WTP). The basic aim of this article is to analyse whether people shopping on the Internet differentiate their privacy depending on whether they protect or sell it. The achieved results indicate the presence of major differences in this respect, which do not always come up with the original expectations. The obtained results have supported the hypothesis that people are more willing to sell their data than to repurchase them. However, the hypothesis that the value of proposed remuneration affects the willingness to sell/buy back personal data (one’s privacy) has not been supported. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy" title="privacy">privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20economics" title=" experimental economics"> experimental economics</a>, <a href="https://publications.waset.org/abstracts/search?q=behavioural%20economics" title=" behavioural economics"> behavioural economics</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a> </p> <a href="https://publications.waset.org/abstracts/50832/online-shopping-vs-privacy-results-of-an-experimental-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50832.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5501</span> Federated Learning in Healthcare</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ananya%20Gangavarapu">Ananya Gangavarapu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Convolutional Neural Networks (CNN) based models are providing diagnostic capabilities on par with the medical specialists in many specialty areas. However, collecting the medical data for training purposes is very challenging because of the increased regulations around data collections and privacy concerns around personal health data. The gathering of the data becomes even more difficult if the capture devices are edge-based mobile devices (like smartphones) with feeble wireless connectivity in rural/remote areas. In this paper, I would like to highlight Federated Learning approach to mitigate data privacy and security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20learning%20in%20healthcare" title="deep learning in healthcare">deep learning in healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title=" federated learning"> federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=training%20in%20distributed%20environment" title=" training in distributed environment"> training in distributed environment</a> </p> <a href="https://publications.waset.org/abstracts/122875/federated-learning-in-healthcare" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122875.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5500</span> On Privacy-Preserving Search in the Encrypted Domain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chun-Shien%20Lu">Chun-Shien Lu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Privacy-preserving query has recently received considerable attention in the signal processing and multimedia community. It is also a critical step in wireless sensor network for retrieval of sensitive data. The purposes of privacy-preserving query in both the areas of signal processing and sensor network are the same, but the similarity and difference of the adopted technologies are not fully explored. In this paper, we first review the recently developed methods of privacy-preserving query, and then describe in a comprehensive manner what we can learn from the mutual of both areas. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=encryption" title="encryption">encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy-preserving" title=" privacy-preserving"> privacy-preserving</a>, <a href="https://publications.waset.org/abstracts/search?q=search" title=" search"> search</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/55834/on-privacy-preserving-search-in-the-encrypted-domain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55834.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5499</span> Convergence and Stability in Federated Learning with Adaptive Differential Privacy Preservation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rizwan%20Rizwan">Rizwan Rizwan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper provides an overview of Federated Learning (FL) and its application in enhancing data security, privacy, and efficiency. FL utilizes three distinct architectures to ensure privacy is never compromised. It involves training individual edge devices and aggregating their models on a server without sharing raw data. This approach not only provides secure models without data sharing but also offers a highly efficient privacy--preserving solution with improved security and data access. Also we discusses various frameworks used in FL and its integration with machine learning, deep learning, and data mining. In order to address the challenges of multi--party collaborative modeling scenarios, a brief review FL scheme combined with an adaptive gradient descent strategy and differential privacy mechanism. The adaptive learning rate algorithm adjusts the gradient descent process to avoid issues such as model overfitting and fluctuations, thereby enhancing modeling efficiency and performance in multi-party computation scenarios. Additionally, to cater to ultra-large-scale distributed secure computing, the research introduces a differential privacy mechanism that defends against various background knowledge attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title="federated learning">federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=differential%20privacy" title=" differential privacy"> differential privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=gradient%20descent%20strategy" title=" gradient descent strategy"> gradient descent strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=convergence" title=" convergence"> convergence</a>, <a href="https://publications.waset.org/abstracts/search?q=stability" title=" stability"> stability</a>, <a href="https://publications.waset.org/abstracts/search?q=threats" title=" threats"> threats</a> </p> <a href="https://publications.waset.org/abstracts/187891/convergence-and-stability-in-federated-learning-with-adaptive-differential-privacy-preservation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187891.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">30</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5498</span> Location Privacy Preservation of Vehicle Data In Internet of Vehicles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ying%20Ying%20Liu">Ying Ying Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Austin%20Cooke"> Austin Cooke</a>, <a href="https://publications.waset.org/abstracts/search?q=Parimala%20Thulasiraman"> Parimala Thulasiraman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of Things (IoT) has attracted a recent spark in research on Internet of Vehicles (IoV). In this paper, we focus on one research area in IoV: preserving location privacy of vehicle data. We discuss existing location privacy preserving techniques and provide a scheme for evaluating these techniques under IoV traffic condition. We propose a different strategy in applying Differential Privacy using k-d tree data structure to preserve location privacy and experiment on real world Gowalla data set. We show that our strategy produces differentially private data, good preservation of utility by achieving similar regression accuracy to the original dataset on an LSTM (Long Term Short Term Memory) neural network traffic predictor. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=differential%20privacy" title="differential privacy">differential privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title=" internet of things"> internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20vehicles" title=" internet of vehicles"> internet of vehicles</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20privacy" title=" location privacy"> location privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20preservation%20scheme" title=" privacy preservation scheme"> privacy preservation scheme</a> </p> <a href="https://publications.waset.org/abstracts/127016/location-privacy-preservation-of-vehicle-data-in-internet-of-vehicles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127016.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5497</span> Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Shamseddine">Maha Shamseddine</a>, <a href="https://publications.waset.org/abstracts/search?q=Amjad%20Nusayr"> Amjad Nusayr</a>, <a href="https://publications.waset.org/abstracts/search?q=Wassim%20Itani"> Wassim Itani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy%20enforcement" title="privacy enforcement">privacy enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=platform-as-a-service%20privacy%20awareness" title=" platform-as-a-service privacy awareness"> platform-as-a-service privacy awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20privacy" title=" cloud computing privacy"> cloud computing privacy</a> </p> <a href="https://publications.waset.org/abstracts/131754/platform-as-a-service-sticky-policies-for-privacy-classification-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131754.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">227</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5496</span> Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Dennis">Huang Dennis</a>, <a href="https://publications.waset.org/abstracts/search?q=Aurelio%20Aziel"> Aurelio Aziel</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20operating%20system" title="mobile operating system">mobile operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=Malware" title=" Malware"> Malware</a> </p> <a href="https://publications.waset.org/abstracts/168876/study-on-security-and-privacy-issues-of-mobile-operating-systems-based-on-malware-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">88</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5495</span> The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akram%20Waheb%20Nasef%20Alzordoky">Akram Waheb Nasef Alzordoky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20issues" title="social networks privacy issues">social networks privacy issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20issues" title=" social networks security issues"> social networks security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20privacy%20precautions%20measures" title=" social networks privacy precautions measures"> social networks privacy precautions measures</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks%20security%20precautions%20measures" title=" social networks security precautions measures"> social networks security precautions measures</a> </p> <a href="https://publications.waset.org/abstracts/190127/the-effect-of-artificial-intelligence-on-international-law-legal-security-and-privacy-issues" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5494</span> Privacy Policy Prediction for Uploaded Image on Content Sharing Sites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pallavi%20Mane">Pallavi Mane</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikita%20Mankar"> Nikita Mankar</a>, <a href="https://publications.waset.org/abstracts/search?q=Shraddha%20Mazire"> Shraddha Mazire</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasika%20Pashankar"> Rasika Pashankar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20information%20services" title="online information services">online information services</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20and%20protection" title=" security and protection"> security and protection</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20based%20services" title=" web based services"> web based services</a> </p> <a href="https://publications.waset.org/abstracts/41635/privacy-policy-prediction-for-uploaded-image-on-content-sharing-sites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41635.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5493</span> Need for Privacy in the Technological Era: An Analysis in the Indian Perspective</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amrashaa%20Singh">Amrashaa Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Article%2021" title="Article 21">Article 21</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20protection" title=" data protection"> data protection</a>, <a href="https://publications.waset.org/abstracts/search?q=dissent" title=" dissent"> dissent</a>, <a href="https://publications.waset.org/abstracts/search?q=fundamental%20right" title=" fundamental right"> fundamental right</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/117830/need-for-privacy-in-the-technological-era-an-analysis-in-the-indian-perspective" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5492</span> The Feminism of Data Privacy and Protection in Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olayinka%20Adeniyi">Olayinka Adeniyi</a>, <a href="https://publications.waset.org/abstracts/search?q=Melissa%20Omino"> Melissa Omino</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The field of data privacy and data protection in Africa is still an evolving area, with many African countries yet to enact legislation on the subject. While African Governments are bringing their legislation to speed in this field, how patriarchy pervades every sector of African thought and manifests in society needs to be considered. Moreover, the laws enacted ought to be inclusive, especially towards women. This, in a nutshell, is the essence of data feminism. Data feminism is a new way of thinking about data science and data ethics that is informed by the ideas of intersectional feminism. Feminising data privacy and protection will involve thinking women, considering women in the issues of data privacy and protection, particularly in legislation, as is the case in this paper. The line of thought of women inclusion is not uncommon when even international and regional human rights specific for women only came long after the general human rights. The consideration is that these should have been inserted or rather included in the original general instruments in the first instance. Since legislation on data privacy is coming in this century, having seen the rights and shortcomings of earlier instruments, then the cue should be taken to ensure inclusive wholistic legislation for data privacy and protection in the first instance. Data feminism is arguably an area that has been scantily researched, albeit a needful one. With the spate of increase in the violence against women spiraling in the cyber world, compounding the issue of COVID-19 and the needful response of governments, and the effect of these on women and their rights, fast forward, the research on the feminism of data privacy and protection in Africa becomes inevitable. This paper seeks to answer the questions, what is data feminism in the African context, why is it important in the issue of data privacy and protection legislation; what are the laws, if any, existing on data privacy and protection in Africa, are they women inclusive, if not, why; what are the measures put in place for the privacy and protection of women in Africa, and how can this be made possible. The paper aims to investigate the issue of data privacy and protection in Africa, the legal framework, and the protection or provision that it has for women if any. It further aims to research the importance and necessity of feminizing data privacy and protection, the effect of lack of it, the challenges or bottlenecks in attaining this feat and the possibilities of accessing data privacy and protection for African women. The paper also researches the emerging practices of data privacy and protection of women in other jurisprudences. It approaches the research through the methodology of review of papers, analysis of laws, and reports. It seeks to contribute to the existing literature in the field and is explorative in its suggestion. It suggests a draft of some clauses to make any data privacy and protection legislation women inclusive. It would be useful for policymaking, academic, and public enlightenment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=feminism" title="feminism">feminism</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a>, <a href="https://publications.waset.org/abstracts/search?q=Africa" title=" Africa"> Africa</a> </p> <a href="https://publications.waset.org/abstracts/131944/the-feminism-of-data-privacy-and-protection-in-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131944.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">205</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5491</span> Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Deborah%20Garcia-Magna">Deborah Garcia-Magna</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20law%20reform" title="criminal law reform">criminal law reform</a>, <a href="https://publications.waset.org/abstracts/search?q=ECHR%20jurisprudence" title=" ECHR jurisprudence"> ECHR jurisprudence</a>, <a href="https://publications.waset.org/abstracts/search?q=right%20to%20privacy" title=" right to privacy"> right to privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=sexting" title=" sexting"> sexting</a> </p> <a href="https://publications.waset.org/abstracts/84852/challenges-of-new-technologies-in-the-field-of-criminal-law-the-protection-of-the-right-to-privacy-in-the-spanish-penal-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/84852.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">194</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5490</span> Protecting Privacy and Data Security in Online Business</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bilquis%20Ferdousi">Bilquis Ferdousi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=privacy" title="privacy">privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=legislation" title=" legislation"> legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20business" title=" online business"> online business</a> </p> <a href="https://publications.waset.org/abstracts/160198/protecting-privacy-and-data-security-in-online-business" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160198.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=183">183</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=184">184</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=privacy%20issues&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>