Questions related to Information Privacy
Answers in the survey will be analyzed through a hybrid multi-criteria decision-making model, and the data privacy act will be followed. We are willing to have you as our co-authors with your participation in the research. We humbly request your assistance in answering this survey. We would also like to kindly ask that you not share any information about our research with others due to its novelty/uniqueness. We intend to publish this as a peer-reviewed scientific journal in the future.
Feel free to message me to let me know, thanks!
I was exploring differential privacy (DP) which is an excellent technique to preserve the privacy of the data. However, I am wondering what will be the performance metrics to prove this between schemes with DP and schemes without DP.
Are there any performance metrics in which a comparison can be made between scheme with DP and scheme without DP?
Thanks in advance.
While there are multiple researches that have been conducted to understand the importance of free will and data privacy in the context of neuromarketing, I am yet to come across a study which quantifies the issues. Would appreciate any suggestion on this, to help with my coursework. Thanks.
I have an epidemiological questionnaire for a project that I am currently involved. We need to use a web-based questionnaire for the patients, but the questionnaire will include personal and other confidential information about the patients. Could you suggest a web-based questionnaire tool which accepts this type of information and with high data privacy? As far as I know, SurveyMonkey and LimeSurvey are widely used in psychology research, but I am not quite sure that these fit for our purpose.
Currently, due to the data privacy and security concerns, there are less institutes willing to share their data. What can be done by both medical and computer science domain to deal with the issue?
As Proposed by Cynthia Dwork, A Differential privacy gain a lots of attention nowadays in the field of Data Privacy.
Also, there are various version of Differential Privacy(DP), Mainly used either Local DP or Global DP.
Can anyone suggest Which DP is best/good for which Data Types??
Considering the use of facial recognition cameras on autonomous vehicles, the storage of data collected, the security of the data and access, do UK data privacy laws go far enough to protect peoples rights?
I have just started working on big data privacy and i found that privacy issues with unstructured data is not being focused much. therefore, i am thinking to work on it. Kindly provide any material or suggestion related to this topic.
Thanks in advance.
I was exploring federated learning algorithms and reading this paper (https://arxiv.org/pdf/1602.05629.pdf). In this paper, they have average the weights that are received from clients as attached file. In the marked part, they have considered total client samples and individual client samples. As far I have learned that federated learning has introduced to keep data on the client-side to maintain privacy. Then, how come the server will know this information? I am confused about this concept.
Thanks in advance.
What are the priorities that need to be addressed for AI systems to be dependable and trustworthy?
Data-intensive AI systems are expanding rapidly and are affecting many aspects of our daily life. While effectiveness of AI systems is growing, their dependability and trust seems to be endangered. Redefining and dealing with issues like data security, data privacy are among the key challenges AI systems are facing. What is your opinion on that?
Hoping to get some insight on your idea or contribution towards the privacy of data in e-mental health services and applications.
Kindly leave a comment of thought towards data privacy especially in Europe.
This is my survey and i am collecting data (anonymous) about what you think about having your sensitive data out there.
please follow the link to my survey.
would Appraciate it
As far as I know, Egypt is the last country which enacted the Data Protection Law on 13 July 2020. Accordingly, the total number of countries with data protection law is 143. Is there any update other than this?
Data sharing increases utilization of data requiring protection of privacy of the data owner.
There are a number of regulations that try to make sure that data custodians ensure the privacy of data subjects. However, these regulations do not seem to hold during pandemics, not to mention data privacy dangers that arise due to limited effectiveness of privacy systems as well as algorithms' data leaks.
What are the possible dangers of data privacy during corona pandemic that you think of?
I am interested to know if anyone has conducted online studies with a hierarchical linear modelling design in the field of education involving teachers and their students or in a similar field involving coach/mentor/supervisor and their athletes/employees? What platforms have you used and how has it been compatible with data privacy? What kind of ethical issues have you encountered?
I have recently started studying genomic data privacy and it seems the field is relatively new. I am looking for the existing problems. Implementing Homomorphic encryption or differential privacy has a lot going on. Can anyone suggest any other existing challenges?
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
How does public policy impact the use of internet and help industries invade our privacy? Does fundamental rights (such as that of freedom to express and right to personal privacy) come into play?
The protection of private life is essential since a possible injury might be impossible to repair. The video gives a larger view of the invasion of private life caused by social media with a distinct emphasis on FB as the first mover in this business, but in the end only refers to possible financial damages. In my opinion the safety of the internet transactions is only a secondary aspect of a much bigger problem, which is protection of privacy on internet. I am asking for you opinion.
A need for Data Protection Officers is emerging very fast. After adoption of GDPR, organizations worldwide need hundreds of thousands of DPOs. Are universities ready, are there enough data privacy programs/courses that putts together information security and law?
For providing Big Data privacy, its important that utility of the data/mining result should be preserved. For that before implementing anything, first we need to prove the concept/idea mathematically/theoretically.
Can anyone suggests good Papers/articles/notes on Good Mathematical foundation of Big Data Privacy preserving Models/algorithms?
Also, suggest some open issues in Big Data Privacy/ Privacy Preserving Big Data Analytics.
Hoping for your kind reply.
Open Access Journal that should take time to publish and related with Computer related fields like Big Data, Privacy and Security.
I am looking for case studies of actual privacy risks. At the core of privacy and data protection impact assessments, we find the concept of 'risk' meaning - in this case - the probability of a threat to personal data and the possible harm or damage caused by this threat. E.g. I fall victim to a phishing attack and the attacker gains access to my bank account, the actual harm being that my account is emptied. Another example would be that my account at a social media platform is hacked and my identity is used to "go shopping".
Now, one finds a lot of literature on privacy (PIA) and data protection impact assessments (e.g. the edited volume by Wright and De Hert (2012) on PIA), on the potential risks of low levels of data security (e.g. Rosner, Kenneally (2018): Clearly Opaque: Privacy Risks of the Internet of Things), on technological and organization standards (e.g. ISO 27001 on Information security management), or on the regulatory frameworks of privacy and data protection (e.g. everything on the details of the GDPR in the EU). But I have a hard time to find research results evaluating actual risks similar to your risk to fall victim to a traffic accident, have your home being broken into, or get cancer.
I would welcome any hint to empirical publications on actual privacy risk analysis be it from medical, social, internet-based or any other research that you consider as most important. I am *not* looking for literature on how to conduct privacy and data protection impact assessments or standards for this purpose. Thank you.
Hi, I am conducting a survey on Proximity marketing in retail sectors and your input would be appreciated. This questionnaire is a part of research for my dissertation and will not take more than 5 minutes to complete.
Respondent information will be kept anonymous and data privacy will be maintained as per GDPR rules. Click the link below to start the survey. Thank you !
Since organizations and companies are one of the big sources of data, many of them are still not interested in taking advantage of it. Although there are some obstacles and barriers that make managers hesitated to apply these technologies in action, overcoming them could provide huge advantages for organizations. There are some reason such as "organizational silos", privacy and security, costs, lack of appropriately skilled people, organizational culture.
Could you please name some of new challenges you may face in your organization or you experienced before?
I am interested in case study recearch and interview with the employees of companies. I search both employees rights and privacy and the data privacy of companies and ethical standarts and permissions of companies about publications related to companies.
Could you recommend me any website, similar case or an article related to this issue?
I am a last year BCs student (Marketing) and am thinking about a topic related with data disclosure (e.g. permission marketing) in online context. Currently I am trying to look into different factors that would influence willingness to disclose personal data.
I'd like to know if there's a scale developed to measure paranoia in a digital context (digital/ online paranoia?) or any relevant paper/research, for that matter. From what I understand, paranoia has been proven to be a personal characteristic shared amost universally at different degrees, not just a severe clinical condition; would be interesting to see it in an online context.
Thank you in advance, any insight or clue, recommendation is really appreciated!
I am Information system's student and I have class project and now i am seeking for ideas that i can start with. My concentration is on the (Mobile HCI, Usable security and privacy, social media)
Please help me to start my project proposal please
thank you in advance.
Can anyone recommend some good sources of annotated (labeled) datasets for network security tests and Machine Learning (ML)? In general, various cybersecurity areas are welcomed but from reliable and confident sources. Poor and incorrect annotations or malicious sources are not of interest, so avoid it please.
Currently, I am working on a project (http://smile-h2020.eu/smile/) for smart mobility in the EU land borders to improve border control and management. SMILE increases the tendency to collect, use and process hard and soft biometrics data to optimize and speed up the border checks as well as monitor the flows of people at land borders. In SMILE system, first, the travellers need to pre-register their information includes enrolment of biometrics data using their mobile phone. The biometric information of the traveller is registered in a SMILE database and then becomes the only identifier of the traveller in one-to-many comparison against all biometrics database in EU. Second, upon arrival at the border control point (BCP), traveller will be identified and verified at SMILE "fast lane" using SMILE mobile devices. This is will include people who travels in groups such as family. Family with kids need to register their kids information (biometrics data) also.
I am working on legal and ethical assessment of SMILE use case scenarios and business model. My concerns now are "ethical and legal considerations in biometric data use in assessments with infants and children".
What is the best age for biometric data collection? Is age limits have been considered in other contexts? If so, what are the the age limits for biometric data collection in case of infants and children?
I just want to clarify on data privacy as it is being addressed in research nowadays.
Is there really a need to code the research environment or locale?
The GDPR seems to be more a protectionist initiative for large and rich publishers. They say that "the GDPR improves transparency and data privacy rights of individuals", but seems to be an initiative to restrict science and reduces the access to information, but is it? Please you must say what your opinion.
As i have read many literatures/papers on Privacy in big data, i got to know that various people are using different technique to achieve it. They are:
1. Anonymization Technique
2. Differential Privacy
3. Homomorphic Encryption
All of above have its own pros and cons, so kindly suggest me which is best to choose for providing privacy in Big Data Analytics?
Also where to provide privacy??? At data generation phase, data collection Phase or data analytics phase???
I recently had a discussion with the go-to information privacy guy at our department about one of my research projects. The project is concerned with motivating and discouraging factors in sharing genome data and we (currently) use the privacy calculus as our theoretical lens.
The result of our discussion was that he advised to refrain from using the privacy calculus since:
- There are already too many privacy calculus papers out there, making it somewhat the next TAM and that he had witnessed papers being rejected simply because it was yet another privacy calculus paper.
- People do not behave this way and do not actually engage in such a calculus.
What do other scholars think about this? Is the privacy calculus at risk of being the next TAM? Should we still use it, if it fits our research?
Why to provide data privacy while doing big data analytics?
Which are vulnerabilities in big data analytics w.r.t. privacy concern?
I met with the CEO of a very interesting company that provides ultrasonic scanning of piping along with a service where garnet is used to clean pipes and then a 3M product ScotchKote is applied to pipes all the way down to 3/4 to make them non corrosive. Just looking for any formal studies on this approach and it appears it could address the root of many issues from both a Municpal standpoint as well as individual buildings.
PKI guarantees that a machine is who it says it is through 3 party system? What about processes on the same machine. I want to validate that a signed or encrypted message came from a specific process.
Biometric IDs and the Risks Involved
India has generated 111,15,84,242 Aadhaar IDs as of Feb 1, 2017, as per the Authority (UIDAI) Website https://uidai.gov.in/new/ Each ID is linked to a photograph, ten fingerprints and two iris scans of the person involved. There are major research questions related to these cards that computer scientists and others should study.
What are the safeguards necessary for allowing banks, insurance companies, cell phone companies and others to access an individual’s biometrics for identification or other purposes?
I became acutely aware of the risks involved yesterday when a cell phone company tried to persuade my wife to let them access her fingerprint for comparison with the stored fingerprint associated with her Aadhaar number. Visit
“Your fingerprint is not your own! Meaning of privacy in India!"
in the article addressed by the link below.
Hello Folks, Is there anyone who has used Child Exploitation Hash Dataset for cyber crime-related simulation and will be able to share or has a lead as to how I can get it for research purposes only?
Email users want their email messages or email clients to provide high level of privacy as well as good security.
Threat classifications and models have been proposed for classifying threats related to information systems. For example,
Islam, T., Manivannan, D., & Zeadally, S. (2016). A Classification and Characterization of Security Threats in Cloud Computing. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 7(1).
Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks
Jouini, M., Rabai, L. B. A., & Aissa, A. B. (2014). Classification of security threats in information systems. Procedia Computer Science, 32, 489-496.
Threats Classification: State of the Art
However, none of the them talks about classification of threats related to individuals such as home internet users or students.
My question is can the threat classification proposed for information systems can be used as it is for individuals?
I personally believe it shouldn't be used as human and information systems are different.
When working with collaborators in Switzerland it became obvious that the government shot itself in the foot when regulating the use and transfer of patient data. Even some of the simple anonymized statistical data sets require permission from the ethics committee.
These country-specific regulations also serve as a barrier to entry when asking someone for a data set from a published paper in order to replicate their experiments to see if these experiments are reproducible.
In your experience, what are the best countries (including Asia), where data transactions for research purposes are not regulated and most fluid?
I am trying to find different case studies that could be used for learnng different information security and privacy (IS&P) concepts, issues, approaches to deal with different IS&P threats. Although I am more interested in case studies focused on human element in information security, however, case studies focusing other aspects of IS&P are also of interest.
In some cases, "scenarios" and "case-based learning" are also used for this kind of teaching or learning.
I myself am searching but if someone already is aware of some resources, it will be really helpful.
I need a privacy meter to secure personal data. For this I need to find threshold value,so that I can find all the entities which are below threshold are safe. Other entities which are above threshold values are unsafe.
Can anyone provide some formulas and methods to find how to mitigate privacy risk for a large amount of personal data.
Research question: "How aware are high educated parents of their private data in their family household?"
-Target group: Families with children range 7-12 years with high educated parents in any age.
-Subject: Awareness of shared private data in personal surroundings in and around the home.
I'm looking for work on childrens' views of privacy. At what age do they become aware of the importance of privacy regarding their personal information. are there recommendations from psychologists on the need to protect childrens privacy?
Is there any research done that increasing global information privacy concerns are impacting the telemetry sharing among organizations and impacting the over all threat intelligence ?
Data blocking is becoming recognised as a problem in data analytics in healthcare and has been known to be a problem in health research for a long time. Although data breaches are not uncommon, has anyone measured the resultant harm to patients from these eg how many have actually suffered identity theft or embarrassment from
From your finding in this work, do you think that the security policy should be tailor made based on HCO? I mean that rather than enforcing the policy by considering the role of the employers, we include the rules that they can learn.
l been researching on improving privacy in shibboleth identity provider. Please l want to know the parameter (variable) used in measuring the capability of privacy in that system?
Secondly, How do we know that a system enhances privacy on cloud?
Thirdly, Are there quantities for measuring Privacy?
Fourthly,I want to know the mode of data collection in the above system too?
I need datasets of residential energy consumptions using smart meter, where the appliances are detected based on the energy signature.
I am interested to find the advantages for each method , because there are a lot of researchers used k-anonymity and they were make many enhancement to it. Some others worked on l-diversity also for protecting sensitive data privacy.If anyone know other techniques I appreciate that..
deFinetti's theorem is considered as "final nail in the coffin" for its impact on privacy preserving data mining techniques that are syntactic type. For example k-anonymity, l-diversity, t-closeness etc. Can any one explain why ?
I´m working a new research addressing privacy and life satisfcation. Does anyone know good references for this empirical study in social networking sites, eg Facebook? Any suggestions?
The future data protection package includes a General Regulation and a Directive on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data.
However, the data protection package initially leaves unaffected Prüm regime as was pointed out by the European Data Protection Supervisor (Opinion of the European Data Protection Supervisor on the data protection reform package, 7 March 2012, 443, page 68 ).
The Amendment 6 of EU Parliament (14 March 2014) introduced it. (EP legislative resolution of 12 March 2014 COM(2012)0010 – C7-0024/2012 – 2012/0010(COD)) Today (4 December 2014) is in discussion within the Council (http://eur-lex.europa.eu/procedure/EN/201285)
I am interested in know any comments or articles regarding this question, thanks!
Hi All. I'm Khairil from Malaysia.
Currently, I've being working on developing a model / framework regarding the Data Leakage Protection for government sector. Does anyone have references? Thank you so much for your help.
Adoption of cloud computing as a new environment for software development is a good idea due to the great benefits cloud computing can give.
But, the important point that all organizations are worrying about is security and data privacy. So, how strong is the security of the cloud and how can I manage such aspects?
I am not asking about what you DO to protect privacy, but rather what (if anything) your institution has TOLD you are privacy rules when using social media for instructional tasks. My impression is that many schools give teachers little guidance, unless there is formal research involved.
I referred a patient to a private imaging clinic for MRI investigation. The exam was payed for. My question now is who has the IPRs for those images? Is it enough to ask the patient for his permission to publish the case or do I need the approval of the private clinic?
I am studying functional encryption for application in Data privacy. I need to know that how performance and complexities are measured for key policy attribute based encryption, Ciphertext policy attribute based encryption, Inner product encryption. Are there any real world deployment for these?. Any mathamatical or Practical Implementation available for the exact understanding of above algorithms?
Traditional searchable encryption has been widely studied in the context of cryptography. Could anyone present some information, survey about the public key encryption with keyword search applied to cloud computing?
Dear colleagues, we are looking for data on informality among firms in Latin America, and comparisons to other emerging regions.
In particular, we would like to know estimates of the share of firms not registered (while they should); or firms paying taxes, etc...
Apparently, some household surveys include the question, but we would favor firm surveys.
Note: The WB Entreprise survey only surveys formal firms, and how they compete with informal ones.
It is pretty much common nowadays to store, process, or transmit data by means of a Cloud. Whatever the Cloud of your choice might be (public or private), you expect the Cloud provider to provide you with the security of your information. But how safe is a Cloud? And what can one do to tackle this issue?
I am looking for the state of the art algorithms so I can use it for proving the we have privacy preserving issues and then make some adjustment into the algorithm and make it privacy proof.