Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (4)
- Law (4)
- Physical Sciences and Mathematics (4)
- Privacy Law (2)
- Arts and Humanities (1)
-
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Computer Engineering (1)
- Computer Law (1)
- Computer and Systems Architecture (1)
- Contracts (1)
- Data Storage Systems (1)
- Databases and Information Systems (1)
- Engineering (1)
- Information Security (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Law and Economics (1)
- Medicine and Health Sciences (1)
- Science and Technology Law (1)
- Social and Behavioral Sciences (1)
- Theatre and Performance Studies (1)
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
10th Annual Conference On Recent Developments In Intellectual Property Law & Policy, Marc Greenberg, William T. Gallagher, Chester Chuang
10th Annual Conference On Recent Developments In Intellectual Property Law & Policy, Marc Greenberg, William T. Gallagher, Chester Chuang
Intellectual Property Law
Welcome to the 10 Annual Conference on Recent Developments in Intellectual Property Law andPolicy, presented by the Intellectual Property Law Center of Golden Gate University School of Law.
Short Paper: The Netsani Framework For Analysis And Fine-Tuning Of Network Trace Sanitization, Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz
Short Paper: The Netsani Framework For Analysis And Fine-Tuning Of Network Trace Sanitization, Phil Fazio, Keren Tan, Jihwang Yeo, David Kotz
Dartmouth Scholarship
Anonymization is critical prior to sharing wireless-network traces within the research community, to protect both personal and organizational sensitive information from disclosure. One difficulty in anonymization, or more generally, sanitization, is that users lack information about the quality of a sanitization result, such as how much privacy risk a sanitized trace may expose, and how much research utility the sanitized trace may retain. We propose a framework, NetSANI, that allows users to analyze and control the privacy/utility tradeoff in network sanitization. NetSANI can accommodate most of the currently available privacy and utility metrics for network trace sanitization. This framework provides …
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
A Functional Approach To Social Networking Sites, Erin M. Bryant, Jennifer Marmo, Artemio Ramirez Jr.
A Functional Approach To Social Networking Sites, Erin M. Bryant, Jennifer Marmo, Artemio Ramirez Jr.
Human Communication and Theatre Faculty Research
The widespread use of social networking websites (SNSs) is one of the most groundbreaking communication trends to emerge in recent years. Since its creation in 2004, sites such as Facebook have become immensely popular among college students. Many SNSs continue to experience exponential growth. Facebook, for example, reached 100 million active users in August 2008 and proceeded to quadruple this membership base to surpass 400 million active users by July 2010 (Facebook.com). In addition to maintaining astronomically high membership rates, SNSs also appear to be part of user's daily schedules. In one study assessing Facebook use, Ellison, Heino, and Gibbs …
Website Design As Contract, Woodrow Hartzog
Website Design As Contract, Woodrow Hartzog
Faculty Scholarship
Few website users actually read or rely upon terms of use or privacy policies. Yet users regularly take advantage of and rely upon website design features like privacy settings. To reconcile the disparity between boilerplate legalese and website design, this article develops a theory of website design as contract. The ability to choose privacy settings, un-tag photos, and delete information is part of the negotiation between websites and users regarding their privacy. Yet courts invariably recognize only the boilerplate terms when analyzing online agreements. In this article, I propose that if significant website features are incorporated into the terms of …
Privacy-Preserving Pki Design Based On Group Signature, Sokjoon Lee, Hyeok Chan Kwon, Dong-Il Seo
Privacy-Preserving Pki Design Based On Group Signature, Sokjoon Lee, Hyeok Chan Kwon, Dong-Il Seo
Australian Information Security Management Conference
Nowadays, Internet becomes a part of our life. We can make use of numerous services with personal computer, Lap-top, tablet, smart phone or smart TV. These devices with network make us enjoy ubiquitous computing life. Sometimes, on-line services request us authentication or identification for access control and authorization, and PKI technology is widely used because of its security. However the possibility of privacy invasion will increase, if We’re identified with same certificate in many services and these identification data are accumulated. For privacy-preserving authentication or anonymous authentication, there have been many researches such as Group signatures, anonymous credentials, etc. Among …
Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet
Unraveling Privacy: The Personal Prospectus And The Threat Of A Full-Disclosure Future, Scott R. Peppet
Publications
Information technologies are reducing the costs of credible signaling, just as they have reduced the costs of data mining and economic sorting. The burgeoning informational privacy field has ignored this evolution, leaving it unprepared to deal with the consequences of these new signaling mechanisms. In an economy with robust signaling, those with valuable credentials, clean medical records, and impressive credit scores will want to disclose those traits to receive preferential economic treatment. Others may then find that they must also disclose private information to avoid the negative inferences attached to staying silent. This unraveling effect creates new types of privacy …
A Threat Taxonomy For Mhealth Privacy, David Kotz
A Threat Taxonomy For Mhealth Privacy, David Kotz
Dartmouth Scholarship
Networked mobile devices have great potential to enable individuals (and their physicians) to better monitor their health and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called \emphmHealth\/ technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges.