Sciweavers

ISSA
2004
14 years 28 days ago
Legality Of Monitoring E-Mail At The Workplace: A Legal Update
It seems fair to assume that employers provide e-mail facilities to employees as tools intended for workrelated activity. As such it further seems fair to assume that employers wo...
Mariette Jones
IFIP11
2004
122views Business» more  IFIP11 2004»
14 years 28 days ago
Infusing Privacy Norms in DRM - Incentives and Perspectives from Law
: This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that...
Alex Cameron
ECIS
2001
14 years 28 days ago
Cyberliability: Is the Chief Privacy Officer the Solution?
The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization's privacy policy and ensuring compliance wit...
Janice C. Sipior, Burke T. Ward
ICIS
2004
14 years 28 days ago
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective
Location-based services (LBS), enabled by advances in mobile and positioning technologies, have afforded users with a pervasive flexibility to be uniquely addressable and to acces...
Heng Xu, Hock-Hai Teo
ICIS
2004
14 years 28 days ago
Opting-in or Opting-out on the Internet: Does it Really Matter?
Personal privacy has become one of the pressure points that comprises utmost primacy in the scientific community. An often debated privacy issue concerns the means of soliciting c...
Yee-Lin Lai, Kai Lung Hui
DMIN
2006
115views Data Mining» more  DMIN 2006»
14 years 28 days ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...
AAAI
2006
14 years 29 days ago
Analysis of Privacy Loss in Distributed Constraint Optimization
Distributed Constraint Optimization (DCOP) is rapidly emerging as a prominent technique for multiagent coordination. However, despite agent privacy being a key motivation for appl...
Rachel Greenstadt, Jonathan P. Pearce, Milind Tamb...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
14 years 29 days ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
SEC
2008
14 years 29 days ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans