Science topic
Information Privacy - Science topic
Explore the latest questions and answers in Information Privacy, and find Information Privacy experts.
Questions related to Information Privacy
In the context of the rapid development of artificial intelligence technology, how can ethics help us address the social impacts of algorithmic bias, data privacy, and automation? What measures do you think should be taken to ensure that the development of AI complies with ethical principles?
The Internet of Things (IoT) is poised to transform industries in 2025, driving automation, enhancing efficiency, and connecting billions of devices across diverse sectors. With the support of 5G and emerging 6G technologies on the horizon, IoT will leverage ultra-low latency and expanded bandwidth to enable real-time applications, from autonomous transport systems to smart city infrastructures. Industrial IoT (IoT) will play a crucial role in advancing Industry 4.0, powering predictive maintenance, automation, and streamlined production processes. Additionally, the integration of AI within IoT systems will bring intelligent cybersecurity as adaptive mechanisms become essential for real-time threat detection across critical infrastructures. Environmental sustainability will be another focal point, with IoT sensors providing data to manage resources such as energy and water, reducing waste and supporting climate initiatives. By embracing decentralized IoT frameworks like blockchain, IoT in 2025 will address data privacy and interoperability challenges, ensuring secure, cohesive networks that can drive innovation across all sectors.
To further develop and implement this proposed Industry 4.0 model, we are actively seeking funding and collaboration with industry and academic partners. This collaboration will enable us to refine and scale the model, leveraging resources and expertise to achieve impactful results. Our aim is to showcase these advancements at an IEEE Conference in the USA, contributing to the body of knowledge and setting new standards in the field.
Regards
Kazi Redwan
Lead, Tech Wings Lab
The last couple of months a significant number of RG members were “harassed” by scammers with non-sensical requests/questions. With the purpose to extract personal info from you, check the power of AI generated responses, or whatever their purpose might be.
Because of this RG changed their policy that you now can only message those who are following you.
So, the approach of the scammers is now: create a fake account, ask a pseudo-legit question and start to follow those who react (and they hope that you will follow them back) and subsequently ask again a non-sensical request/question. Or when you answer they reply and ask for connection to LinkedIn etc.
Check the profile and so far, all of them have:
0 papers
RG interest score --.
1 question
Conclusion: fake account and click on Report (and report to RG that you suspect that this is a fake profile).
How do i write an abstract on my research topic called "Analyzing the concept of Data Privacy in big data analytics in banking?
What are the potential risks of Artificial Intelligence (AI) in higher education, particularly concerning data privacy, bias and the digital divide?
How can these risks be mitigated?
How IoT devices are vulnerable and how it posses threats to user data privacy.
Before you answer 'yes, it is required', please understand that this question is on surveys where no personal information is collected. My colleagues have published journal papers on studies involving human participants without getting approval from the ethics committee. Those studies are typically on design practice, pedagogy and software usability.
Wherever there is a discussion on ethical approval in studies involving human participants, there is an implicit assumption that the data collected is about the participants, since most studies with human participants are conducted by researchers from medical, ergonomics or related domains. Hence, I am unable to find a brief, definitive answer specifically for this scenario.
Is ethical approval required for expert interviews and Delphi studies?
"In what ways might the integration of IoT confront apprehensions surrounding data confidentiality and security, specifically concerning the acquisition, retention, and conveyance of confidential data?"
While integrating manufacturing design, Industrial Revolution 4.0, and Lean Manufacturing can bring significant benefits but there are also challenges and problems that can arise in the process in term of Data Privacy and Security. How we can solve this problems?
An important question in the field of e-marketing is:
"How can businesses effectively leverage digital technologies and online platforms to create engaging, personalized, and seamless customer experiences that drive customer acquisition, retention, and loyalty?"
This question encompasses several key considerations in e-marketing, including:
1. Customer Engagement: How can businesses use digital channels, such as social media, email marketing, and content creation, to engage customers in meaningful and interactive ways that foster brand affinity and loyalty?
2. Personalization: What strategies and tools can businesses employ to deliver personalized and relevant marketing messages, product recommendations, and experiences tailored to individual customer preferences and behaviors?
3. Omnichannel Integration: How can businesses integrate various digital touchpoints, such as websites, mobile apps, social media, and offline channels, to provide a seamless and consistent customer experience across multiple platforms and devices?
4. Data-driven Marketing: How can businesses leverage data analytics, customer insights, and predictive modeling to optimize marketing strategies, target the right audience segments, and measure the impact of digital marketing initiatives?
5. Conversion Optimization: What tactics and techniques can be used to optimize the customer journey, from initial awareness to conversion, by refining website usability, call-to-action strategies, and conversion rate optimization techniques?
6. Customer Retention and Advocacy: How can businesses use e-marketing to nurture existing customer relationships, encourage repeat purchases, and cultivate brand advocates through loyalty programs, referral incentives, and post-purchase engagement strategies?
7. Regulatory Compliance and Data Privacy: How can businesses ensure compliance with data privacy regulations and ethical data practices while collecting, storing, and utilizing customer data for e-marketing purposes?
Addressing these questions is essential for businesses seeking to maximize the impact of their e-marketing efforts, build long-term customer relationships, and drive sustainable business growth in the digital age.
I would like to cordially invite all the young and experienced researches and scientist out there who are looking for collaborations on IOT, AI, ML , FL , blockchain techniques and data privacy, fake new detection to join my research lab. My lab is full of talented members ranging from industry experts to postDocs, undergrads to PhD scholars. It’s a common learning workspace
to support and guide all the qualitative and quantitate researches. Please check out my lab and works and share your thoughts or
feel free to connect with me for future collaborations.
What are the ethical implications of cloud computing, especially in terms of data privacy and responsible AI development?
This question emphasizes the importance of considering the broader implications and risks of AI adoption in research. It encourages researchers to discuss the ethical, legal, and societal implications of AI, including concerns related to algorithmic bias, data privacy, security vulnerabilities, and potential unintended consequences of AI implementation.
I was exploring differential privacy (DP) which is an excellent technique to preserve the privacy of the data. However, I am wondering what will be the performance metrics to prove this between schemes with DP and schemes without DP.
Are there any performance metrics in which a comparison can be made between scheme with DP and scheme without DP?
Thanks in advance.
As Homomorphic Encryption schemes like CKKS are not capable of performing non-linear functions such as comparison, other PET techniques, including MPC can provide us with a level of security for a desired machine learning application.
Currently, I'm searching for the current related works that combine CKKS and, MPC; particularly 2PC function secret sharing. Every idea would be greatly appreciated!
I clicked on the "data & privacy policy" link and it says some gobbledigook about "To alert you to special offers", "To notify you about a material change", "To help us create and publish content most relevant to you".
Any advice?
What is The role of data privacy policies in digital innovation management?
The field of instructional design and educational technology encompasses a wide range of technical considerations, but what do you think is the most important one? Could it be the selection and implementation of appropriate technology tools and platforms? Or data privacy and security? Any other?
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
I am a Masters's student writing my thesis on a compliance issue in the automotive industry, mainly dealing with software development. I have linked this issue to resistance to change management as one of the reasons, apart from my other hypotheses gathered during my internship, while having casual communication with frontline employees and supervisors.
To verify or refute these hypotheses, I conducted in-person interviews utilizing a questionnaire consisting of both open-ended and closed-ended questions. The data collected encompassed qualitative responses from the open-ended questions, as well as quantitative data obtained through the use of closed-ended questions and scales. During these secondary interviews, a new hypothesis is found.
When selecting a sample for a process, Quota Sampling (using the highest number of tickets) is commonly utilized. Additionally, to choose individuals to interview who have been assigned tickets in individual processes, Purposive or Judgmental Sampling is employed, considering their availability and location.
Currently, I am in the last phase of conducting a thematic analysis of this data using an employee-driven improvement approach. As a precaution for data privacy, the organization I work for prohibits using transcription or recording tools. Therefore, I solely relied on notes taken during the interview.
I'd like to confirm whether my approach falls under Grounded Theory and how it can be classified – deductive, inductive, or a combination of both.
I wonder if it's appropriate to refer to my research approach in an empirical study as mixed methods.
Lastly, I would greatly appreciate your input on the research purpose – whether it falls under the categories of Exploratory, Descriptive, or Explanatory. Personally, I am attempting to achieve all three objectives. I am curious to hear your thoughts on this matter.
I'd be so grateful for any help you can provide. Thanks!
What are the priorities that need to be addressed for AI systems to be dependable and trustworthy?
Data-intensive AI systems are expanding rapidly and are affecting many aspects of our daily life. While effectiveness of AI systems is growing, their dependability and trust seems to be endangered. Redefining and dealing with issues like data security, data privacy are among the key challenges AI systems are facing. What is your opinion on that?
How viAct sticks to data privacy norms to fulfill GDPR and other privacy compliance?
Answers in the survey will be analyzed through a hybrid multi-criteria decision-making model, and the data privacy act will be followed. We are willing to have you as our co-authors with your participation in the research. We humbly request your assistance in answering this survey. We would also like to kindly ask that you not share any information about our research with others due to its novelty/uniqueness. We intend to publish this as a peer-reviewed scientific journal in the future.
Feel free to message me to let me know, thanks!
While there are multiple researches that have been conducted to understand the importance of free will and data privacy in the context of neuromarketing, I am yet to come across a study which quantifies the issues. Would appreciate any suggestion on this, to help with my coursework. Thanks.
Dear all,
I have an epidemiological questionnaire for a project that I am currently involved. We need to use a web-based questionnaire for the patients, but the questionnaire will include personal and other confidential information about the patients. Could you suggest a web-based questionnaire tool which accepts this type of information and with high data privacy? As far as I know, SurveyMonkey and LimeSurvey are widely used in psychology research, but I am not quite sure that these fit for our purpose.
Many thanks
Currently, due to the data privacy and security concerns, there are less institutes willing to share their data. What can be done by both medical and computer science domain to deal with the issue?
As Proposed by Cynthia Dwork, A Differential privacy gain a lots of attention nowadays in the field of Data Privacy.
Also, there are various version of Differential Privacy(DP), Mainly used either Local DP or Global DP.
Can anyone suggest Which DP is best/good for which Data Types??
Considering the use of facial recognition cameras on autonomous vehicles, the storage of data collected, the security of the data and access, do UK data privacy laws go far enough to protect peoples rights?
xAPI is the new e-learning specification to outsmart SCORM. Any recommendation on undertaking Data privacy assessment?
Thanks!
I have just started working on big data privacy and i found that privacy issues with unstructured data is not being focused much. therefore, i am thinking to work on it. Kindly provide any material or suggestion related to this topic.
Thanks in advance.
I was exploring federated learning algorithms and reading this paper (https://arxiv.org/pdf/1602.05629.pdf). In this paper, they have average the weights that are received from clients as attached file. In the marked part, they have considered total client samples and individual client samples. As far I have learned that federated learning has introduced to keep data on the client-side to maintain privacy. Then, how come the server will know this information? I am confused about this concept.
Any clarification?
Thanks in advance.
Can anybody share with me a dataset from smart factory that we can use for experiments related to privacy / data anonymization / data protection?
Thanks.
Hoping to get some insight on your idea or contribution towards the privacy of data in e-mental health services and applications.
Kindly leave a comment of thought towards data privacy especially in Europe.
This is my survey and i am collecting data (anonymous) about what you think about having your sensitive data out there.
please follow the link to my survey.
would Appraciate it
As far as I know, Egypt is the last country which enacted the Data Protection Law on 13 July 2020. Accordingly, the total number of countries with data protection law is 143. Is there any update other than this?
Data sharing increases utilization of data requiring protection of privacy of the data owner.
There are a number of regulations that try to make sure that data custodians ensure the privacy of data subjects. However, these regulations do not seem to hold during pandemics, not to mention data privacy dangers that arise due to limited effectiveness of privacy systems as well as algorithms' data leaks.
What are the possible dangers of data privacy during corona pandemic that you think of?
I am interested to know if anyone has conducted online studies with a hierarchical linear modelling design in the field of education involving teachers and their students or in a similar field involving coach/mentor/supervisor and their athletes/employees? What platforms have you used and how has it been compatible with data privacy? What kind of ethical issues have you encountered?
I have recently started studying genomic data privacy and it seems the field is relatively new. I am looking for the existing problems. Implementing Homomorphic encryption or differential privacy has a lot going on. Can anyone suggest any other existing challenges?
How does public policy impact the use of internet and help industries invade our privacy? Does fundamental rights (such as that of freedom to express and right to personal privacy) come into play?
The protection of private life is essential since a possible injury might be impossible to repair. The video gives a larger view of the invasion of private life caused by social media with a distinct emphasis on FB as the first mover in this business, but in the end only refers to possible financial damages. In my opinion the safety of the internet transactions is only a secondary aspect of a much bigger problem, which is protection of privacy on internet. I am asking for you opinion.
A need for Data Protection Officers is emerging very fast. After adoption of GDPR, organizations worldwide need hundreds of thousands of DPOs. Are universities ready, are there enough data privacy programs/courses that putts together information security and law?
For providing Big Data privacy, its important that utility of the data/mining result should be preserved. For that before implementing anything, first we need to prove the concept/idea mathematically/theoretically.
Can anyone suggests good Papers/articles/notes on Good Mathematical foundation of Big Data Privacy preserving Models/algorithms?
Also, suggest some open issues in Big Data Privacy/ Privacy Preserving Big Data Analytics.
Hoping for your kind reply.
Open Access Journal that should take time to publish and related with Computer related fields like Big Data, Privacy and Security.
I am looking for case studies of actual privacy risks. At the core of privacy and data protection impact assessments, we find the concept of 'risk' meaning - in this case - the probability of a threat to personal data and the possible harm or damage caused by this threat. E.g. I fall victim to a phishing attack and the attacker gains access to my bank account, the actual harm being that my account is emptied. Another example would be that my account at a social media platform is hacked and my identity is used to "go shopping".
Now, one finds a lot of literature on privacy (PIA) and data protection impact assessments (e.g. the edited volume by Wright and De Hert (2012) on PIA), on the potential risks of low levels of data security (e.g. Rosner, Kenneally (2018): Clearly Opaque: Privacy Risks of the Internet of Things), on technological and organization standards (e.g. ISO 27001 on Information security management), or on the regulatory frameworks of privacy and data protection (e.g. everything on the details of the GDPR in the EU). But I have a hard time to find research results evaluating actual risks similar to your risk to fall victim to a traffic accident, have your home being broken into, or get cancer.
I would welcome any hint to empirical publications on actual privacy risk analysis be it from medical, social, internet-based or any other research that you consider as most important. I am *not* looking for literature on how to conduct privacy and data protection impact assessments or standards for this purpose. Thank you.
Hi, I am conducting a survey on Proximity marketing in retail sectors and your input would be appreciated. This questionnaire is a part of research for my dissertation and will not take more than 5 minutes to complete.
Respondent information will be kept anonymous and data privacy will be maintained as per GDPR rules. Click the link below to start the survey. Thank you !
Since organizations and companies are one of the big sources of data, many of them are still not interested in taking advantage of it. Although there are some obstacles and barriers that make managers hesitated to apply these technologies in action, overcoming them could provide huge advantages for organizations. There are some reason such as "organizational silos", privacy and security, costs, lack of appropriately skilled people, organizational culture.
Could you please name some of new challenges you may face in your organization or you experienced before?
Thanks
How can we apply Differential Privacy to real time data for privacy preserving?
I am interested in case study recearch and interview with the employees of companies. I search both employees rights and privacy and the data privacy of companies and ethical standarts and permissions of companies about publications related to companies.
Could you recommend me any website, similar case or an article related to this issue?
I am a last year BCs student (Marketing) and am thinking about a topic related with data disclosure (e.g. permission marketing) in online context. Currently I am trying to look into different factors that would influence willingness to disclose personal data.
I'd like to know if there's a scale developed to measure paranoia in a digital context (digital/ online paranoia?) or any relevant paper/research, for that matter. From what I understand, paranoia has been proven to be a personal characteristic shared amost universally at different degrees, not just a severe clinical condition; would be interesting to see it in an online context.
Thank you in advance, any insight or clue, recommendation is really appreciated!
I am Information system's student and I have class project and now i am seeking for ideas that i can start with.
My concentration is on the (Mobile HCI, Usable security and privacy, social media)
Please help me to start my project proposal please
thank you in advance.
How do you feel about disclosing your private info on social media applications such as Facebook? Do you behave the same in your daily life, or is it something special for social media only? How much are you concerned about your privacy in general?
Can anyone recommend some good sources of annotated (labeled) datasets for network security tests and Machine Learning (ML)? In general, various cybersecurity areas are welcomed but from reliable and confident sources. Poor and incorrect annotations or malicious sources are not of interest, so avoid it please.
Currently, I am working on a project (http://smile-h2020.eu/smile/) for smart mobility in the EU land borders to improve border control and management. SMILE increases the tendency to collect, use and process hard and soft biometrics data to optimize and speed up the border checks as well as monitor the flows of people at land borders. In SMILE system, first, the travellers need to pre-register their information includes enrolment of biometrics data using their mobile phone. The biometric information of the traveller is registered in a SMILE database and then becomes the only identifier of the traveller in one-to-many comparison against all biometrics database in EU. Second, upon arrival at the border control point (BCP), traveller will be identified and verified at SMILE "fast lane" using SMILE mobile devices. This is will include people who travels in groups such as family. Family with kids need to register their kids information (biometrics data) also.
I am working on legal and ethical assessment of SMILE use case scenarios and business model. My concerns now are "ethical and legal considerations in biometric data use in assessments with infants and children".
What is the best age for biometric data collection? Is age limits have been considered in other contexts? If so, what are the the age limits for biometric data collection in case of infants and children?
Thanks
I just want to clarify on data privacy as it is being addressed in research nowadays.
Is there really a need to code the research environment or locale?
Thanks.
The GDPR seems to be more a protectionist initiative for large and rich publishers. They say that "the GDPR improves transparency and data privacy rights of individuals", but seems to be an initiative to restrict science and reduces the access to information, but is it? Please you must say what your opinion.
As i have read many literatures/papers on Privacy in big data, i got to know that various people are using different technique to achieve it. They are:
1. Anonymization Technique
2. Differential Privacy
3. Homomorphic Encryption
All of above have its own pros and cons, so kindly suggest me which is best to choose for providing privacy in Big Data Analytics?
Also where to provide privacy??? At data generation phase, data collection Phase or data analytics phase???
I recently had a discussion with the go-to information privacy guy at our department about one of my research projects. The project is concerned with motivating and discouraging factors in sharing genome data and we (currently) use the privacy calculus as our theoretical lens.
The result of our discussion was that he advised to refrain from using the privacy calculus since:
- There are already too many privacy calculus papers out there, making it somewhat the next TAM and that he had witnessed papers being rejected simply because it was yet another privacy calculus paper.
- People do not behave this way and do not actually engage in such a calculus.
What do other scholars think about this? Is the privacy calculus at risk of being the next TAM? Should we still use it, if it fits our research?
Why to provide data privacy while doing big data analytics?
Which are vulnerabilities in big data analytics w.r.t. privacy concern?
FOR EXAMPLE PRIVACY ACT IN U.S. FOR HEALTHCARE Health Insurance Portability and Accountability Act of 1996 etc..
I met with the CEO of a very interesting company that provides ultrasonic scanning of piping along with a service where garnet is used to clean pipes and then a 3M product ScotchKote is applied to pipes all the way down to 3/4 to make them non corrosive. Just looking for any formal studies on this approach and it appears it could address the root of many issues from both a Municpal standpoint as well as individual buildings.
Hello,
I need the taxonomy tree for each attribute of the adult dataset. It is used on a lot of articles but I could not find it.
Anybody help me?
PKI guarantees that a machine is who it says it is through 3 party system? What about processes on the same machine. I want to validate that a signed or encrypted message came from a specific process.
Also suggest some research papers on it.
Thank you.
Biometric IDs and the Risks Involved
India has generated 111,15,84,242 Aadhaar IDs as of Feb 1, 2017, as per the Authority (UIDAI) Website https://uidai.gov.in/new/ Each ID is linked to a photograph, ten fingerprints and two iris scans of the person involved. There are major research questions related to these cards that computer scientists and others should study.
What are the safeguards necessary for allowing banks, insurance companies, cell phone companies and others to access an individual’s biometrics for identification or other purposes?
I became acutely aware of the risks involved yesterday when a cell phone company tried to persuade my wife to let them access her fingerprint for comparison with the stored fingerprint associated with her Aadhaar number. Visit
“Your fingerprint is not your own! Meaning of privacy in India!"
in the article addressed by the link below.
Hello Folks, Is there anyone who has used Child Exploitation Hash Dataset for cyber crime-related simulation and will be able to share or has a lead as to how I can get it for research purposes only?
Ayodeji
Email users want their email messages or email clients to provide high level of privacy as well as good security.
Threat classifications and models have been proposed for classifying threats related to information systems. For example,
Islam, T., Manivannan, D., & Zeadally, S. (2016). A Classification and Characterization of Security Threats in Cloud Computing. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 7(1).
Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496.
Threats Classification: State of the Art
However, none of the them talks about classification of threats related to individuals such as home internet users or students.
My question is can the threat classification proposed for information systems can be used as it is for individuals?
I personally believe it shouldn't be used as human and information systems are different.
When working with collaborators in Switzerland it became obvious that the government shot itself in the foot when regulating the use and transfer of patient data. Even some of the simple anonymized statistical data sets require permission from the ethics committee.
These country-specific regulations also serve as a barrier to entry when asking someone for a data set from a published paper in order to replicate their experiments to see if these experiments are reproducible.
In your experience, what are the best countries (including Asia), where data transactions for research purposes are not regulated and most fluid?
Hello,
I am trying to find different case studies that could be used for learnng different information security and privacy (IS&P) concepts, issues, approaches to deal with different IS&P threats. Although I am more interested in case studies focused on human element in information security, however, case studies focusing other aspects of IS&P are also of interest.
In some cases, "scenarios" and "case-based learning" are also used for this kind of teaching or learning.
I myself am searching but if someone already is aware of some resources, it will be really helpful.
Thanks,
Ali
What is the difference between p-sensitive k-anonymity and l-diversity?
Hi,
I need a privacy meter to secure personal data. For this I need to find threshold value,so that I can find all the entities which are below threshold are safe. Other entities which are above threshold values are unsafe.
Can anyone provide some formulas and methods to find how to mitigate privacy risk for a large amount of personal data.
Research question: "How aware are high educated parents of their private data in their family household?"
-Target group: Families with children range 7-12 years with high educated parents in any age.
-Subject: Awareness of shared private data in personal surroundings in and around the home.
I'm looking for work on childrens' views of privacy. At what age do they become aware of the importance of privacy regarding their personal information. are there recommendations from psychologists on the need to protect childrens privacy?
Is there any research done that increasing global information privacy concerns are impacting the telemetry sharing among organizations and impacting the over all threat intelligence ?
Data blocking is becoming recognised as a problem in data analytics in healthcare and has been known to be a problem in health research for a long time. Although data breaches are not uncommon, has anyone measured the resultant harm to patients from these eg how many have actually suffered identity theft or embarrassment from
From your finding in this work, do you think that the security policy should be tailor made based on HCO? I mean that rather than enforcing the policy by considering the role of the employers, we include the rules that they can learn.