Science topic

Privacy - Science topic

The state of being free from intrusion or disturbance in one's private life or affairs. (Random House Unabridged Dictionary, 2d ed, 1993)
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Privacy (10,000)
Sorted by most recent
Chapter
Full-text available
This paper focuses on problems associated with the usage of internet banking and its privacy and security in the Islamic banks in area of Kota Bharu, a state capital of Kelantan which are attributed to the perspective, decision and suggestions from customers for possible actions that could be taken to overcome the problem. This study is conducted u...
Article
Full-text available
Recent advancements in disruptive technology have gathered extensive data from various sectors, including healthcare, transportation, retail, market prediction, surveillance, finance, and telecommunication. Quantifiable information has been obtained from the massive amount of shared consumer data to achieve valuable insights into each of these sect...
Chapter
Full-text available
The beyond 5G networks (B5G) are characterized by high throughputs at extremely low latencies and better energy consumptions. This has seen them being deployed as the backbone of numerous Internet of Things (IoT) application domains such as smart homes, smart cities and in intelligent transport systems. Massive and private data flows in these ultra...
Article
Full-text available
To make privacy a first-class citizen in software, we argue for equipping developers with usable and responsibly-designed tools, as well as providing support from organizations, educators, and regulators. We discuss the challenges with the successful integration of privacy features and propose solutions for stakeholders to help developers perform p...
Article
Full-text available
This article explores the implications of South Korea’s assertions that it has successfully controlled the transmission of coronavirus disease (COVID-19). South Korea has consistently pursued two underlying policies since the COVID-19 outbreak, namely, securing maximum transparency and undertaking seemingly extreme preemptive measures. However, the...
Article
Full-text available
The dynamic population distributions by activity type (e.g. working, shopping or in-home) are vital for resource allocation, urban planning and epidemic containment. Although studies have incorporated individual-level human mobility data to map population distribution by activity type, access to such data is hindered due to privacy issues and they...
Article
Full-text available
Drone delivery services are novelty concepts to most people in emerging market economies. To gain competitive advantages, retailers in emerging market need to be proactive in understanding the key factors contributing to the acceptance of last-mile drone delivery services by general users. This study offers personal and social perspectives of the a...
Article
Full-text available
Background Defacing has become mandatory for anonymization of brain MRI scans; however, concerns regarding data integrity were raised. Thus, we systematically evaluated the effect of different defacing procedures on automated brain atrophy estimation. Methods In total, 268 Alzheimer’s disease patients were included from ADNI, which included unacce...
Article
Full-text available
Modern technology has had and continues to have various impacts on societies and human life in general. While technology in some ways defines the ‘digital age’ of today, discourses of ‘technological progress’ may dominate discussions of tomorrow. Conceptions of technology and futures seem to be intertwined, as technology has been predicted by exper...
Article
Full-text available
To achieve clinical impact in daily oncological practice, emerging AI-based cancer imaging research needs to have clearly defined medical focus, AI methods, and outcomes to be estimated. AI-supported cancer imaging should predict major relevant clinical endpoints, aiming to extract associations and draw inferences in a fair, robust, and trustworthy...
Article
Full-text available
Authentication plays a critical role in the security of quantum key distribution (QKD) protocols. We propose using Polynomial Hash and its variants for authentication of variable length messages in QKD protocols. Since universal hashing is used not only for authentication in QKD but also in other steps in QKD like error correction and privacy ampli...
Conference Paper
Full-text available
Network Slicing (NS) is a predominant technology in future telecommunication networks, including Fifth Generation (5G), which supports the realization of heterogeneous applications and services. It allows the allocation of a dedicated logical network slice of the physical network to each application. Security is one of the paramount challenges in a...
Article
Full-text available
User-generated contents often contain private information, even when they are shared publicly on social media and on the web in general. Although many filtering and natural language approaches for automatically detecting obscenities or hate speech have been proposed, determining whether a shared post contains sensitive information is still an open...
Article
Full-text available
We propose a set of protocols for quantum anonymous veto (QAV) broadly categorized under the probabilistic, iterative, and deterministic schemes. The schemes are based upon different types of quantum resources. Specifically, they may be viewed as single photon-based, bipartite and multipartite entangled states-based, orthogonal state-based and conj...
Article
Full-text available
Conventional vision-based systems, such as cameras, have demonstrated their enormous versatility in sensing human activities and developing interactive environments. However, these systems have long been criticized for incurring privacy, power, and latency issues due to their underlying structure of pixel-wise analog signal acquisition, computation...
Article
Full-text available
In recent times, the Indian government has launched campaigns cautioning users against malicious apps which trick users into expending money on the app in the false hopes of quick passive income. They are also tricked into sharing their personally identifiable information in many cases. It is observed that such apps are heavily promoted on video sh...
Article
Full-text available
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the Internet to collect and share data. The introduction of varied devices continues to grow tremendously, posing new privacy and security risks—the proliferation of Internet connections and the advent of new technologies such as the IoT. Various and so...
Article
Full-text available
Given the increasing research activity on epigenetics to monitor human diseases and its connection with lifestyle and environmental expositions, the field of epigenetics has attracted a great deal of interest also at the ethical and societal level. In this review, we will identify and discuss current ethical, legal and social issues of epigenetics...
Article
Full-text available
Background Meta-analysis describes a category of statistical methods that aim at combining the results of multiple studies to increase statistical power by exploiting summary statistics. Different industries that use genomic prediction do not share their raw data due to logistic or privacy restrictions, which can limit the size of their reference p...
Article
Full-text available
Objective Achieving sufficient statistical power in a survival analysis usually requires large amounts of data from different sites. Sensitivity of individual-level data, ethical and practical considerations regarding data sharing across institutions could be a potential challenge for achieving this added power. Hence we implemented a federated met...
Article
Full-text available
Background Several technological advancements and digitization of healthcare data have provided the scientific community with a large quantity of genomic data. Such datasets facilitated a deeper understanding of several diseases and our health in general. Strikingly, these genome datasets require a large storage volume and present technical challen...
Article
Full-text available
The main purpose of this study is to determine the dimensions of speculative entrepreneurship for Bitcoin Turkish miners and to determine the motivational factors to become entrepreneurs in this area. The study was designed as a qualitative study where data was collected from a sample of 13 Bitcoin miners. The collected data thus was analyzed and c...
Article
Full-text available
In healthcare, gender and sex considerations are crucial because they affect individuals' health and disease differences. Yet, most algorithms deployed in the healthcare context do not consider these aspects and do not account for bias detection. Missing these dimensions in algorithms used in medicine is a huge point of concern, as neglecting these...
Article
Full-text available
Peer-to-peer energy (P2P) energy trading is the vital paradigm of power systems operation and control. P2P energy trading is a concept of buying and selling the generated electrical energy from the own renewable energy resources to the micro-grid connected houses, offices and factories. P2P energy trading also allows the users to decide to whom the...
Article
Full-text available
The prevalent paradigm of power system operations has mostly centered on placing all the intelligence in resources that are connected to transmission networks, whereas distribution grids are often not accounted for in-depth and put aside by only approximating some limited behaviors. Nonetheless, proliferation of distributed energy resources, e.g. s...
Conference Paper
Full-text available
Afin d’améliorer la protection de données personnelles dans les lacs de données, nous proposons un méta-modèle qui comprend plusieurs aspects de privacy. Notre méta-modèle permet de décrire les contraintes nécessaires pour l’implémentation des procédures de protection de données personnelles (pseudonymisation/anonymisation). Il permet également de...
Preprint
Full-text available
With the continuous appreciation of cryptocurrency, cryptojacking, the act by which computing resources are stolen to mine cryptocurrencies, is becoming more rampant. In this paper, we conduct a measurement study on cryptojacking network traffic and propose CryptoJacking-Sniffer (CJ-Sniffer), an easily deployable, privacy-aware approach to protecti...
Conference Paper
Full-text available
While the digital information age has brought us convenience in recent years. It has also brought many security risks. The centralized data storage poses the risk of data leakage. With the breakout of the Novel Coronavirus, it is common for schools to import the health management tools such as the body temperature monitoring system. If these health...
Preprint
Full-text available
Open data sets that contain personal information are susceptible to adversarial attacks even when anonymized. By performing low-cost joins on multiple datasets with shared attributes, malicious users of open data portals might get access to information that violates individuals' privacy. However, open data sets are primarily published using a relea...
Preprint
Full-text available
The digitalisation of the reproductive body has seen a myriad of cutting-edge technologies to prioritise neglected intimate health and care topics, such as fertility and contraception. The impact of these intimate data on livelihood and society is pervasive including that privacy is critical to safeguarding security as this increasing digitalisatio...
Article
Full-text available
Precision psychiatry is an emerging field with transformative opportunities for mental health. However, the use of clinical prediction models carries unprecedented ethical challenges, which must be addressed before accessing the potential benefits of precision psychiatry. This critical review covers multidisciplinary areas, including psychiatry, et...
Article
Full-text available
Investigating the relationships between ride-hailing travel demand and the built environment is of utmost importance to sustainable development. Previous studies have explored the heterogeneity in the relationships across different spatial regions or quantiles of travel demand distribution, but rarely both. To fill the research gap, this study deve...
Preprint
Full-text available
The hotel industry is facing numerous challenges, particularly in terms of marketing performance and customer perception. As a result, hotel managers must consider guest satisfaction when implementing relevant strategies to improve product promotion, brand value, and marketing performance. In light of this, the purpose of this paper is to investiga...
Article
Full-text available
This paper concerns differentially private Bayesian estimation of the parameters of a population distribution, when a noisy statistic of a sample from that population is shared to provide differential privacy. This work mainly addresses two problems. (1) What statistics of the sample should be shared privately? For this question, we promote using t...
Article
Full-text available
Privacy preservation has become one of the crucial research topics in multi-agent planning. A number of techniques to preserve private information throughout the planning process have emerged. One major difficulty of such research is the comparison of properties related to privacy among such techniques. A metric allowing for comparison of such priv...
Article
Full-text available
Although manufacturers and experts consider autonomous vehicles (AVs) as a much safer alternative than traditional human-driven vehicles, the lack of trust and high perceived risk by potential users can be a major obstacle to their acceptance. While both risk and trust have been the focus of interest for AV researchers, studies have often produced...
Article
Full-text available
The aim of this paper is to integrate security and privacy in mmWave communications. MmWave communication mechanism access three major key components of secure communication (SC) operations. The proposed design for mmWave communication facilitates the detection of the primary signal in the physical (PHY) layer to find the spectrum throughput for th...
Article
Full-text available
After several decades of decline, night train services have gained momentum in recent years. However, the willingness to use night trains as an alternative to airplane travel has so far received only limited research attention. This paper addresses this knowledge gap by presenting the results of a two-stage stated preferences survey comprising of a...
Article
Full-text available
O-RAN reaches the goal of network flexibility through AIenabled functions, particularly with machine learning (ML) systems. Hence, the role of AI/ML is immense in the envisioned 6G paradigm. However, the alliance between O-RAN and AI/ML may also be a double-edged sword in 6G as their applicability for protecting or infringing security and privacy....
Article
Full-text available
In recent years, individual drivers‘ crash risk assessments have received much attention for identifying high-risk drivers. To this end, we propose a probabilistic assessment method of crash risks with a reproducible long-term dataset (i.e., traffic violations, license, and crash records). In developing this method, we used 7.75 million violations...
Article
Full-text available
This paper introduces a data trading system based on the blockchain network, where a trusted data aggregator collects data from the Internet of Things (IoT) device owners and sells them in the format of different packages to multiple buyers. In this paper, we formulate infinitely repeated games between rational buyers that are competing with each o...
Article
Full-text available
Privacy Policies inform users about how their personal data is managed while fulfilling the obligatory requirements. Past studies have shown that users often do not read privacy policies, cannot comprehend the long and complex policy documents, and resort to providing their consent without knowledge. To enable users to make an informed decision, we...
Article
Full-text available
Using the theoretical constructs of uncertainty and coping as guiding frameworks, this study examines how the online setting (e.g., private direct message or public comment) and type of harassment (i.e., gender harassment, unwanted sexual attention, or sexual coercion) affect younger employees’ sexual harassment experiences on Facebook. Specificall...
Article
Full-text available
The building internet of things (BIoT) is quite a promising concept for curtailing energy consumption, reducing costs, and promoting building transformation. Besides, integrating artificial intelligence (AI) into the BIoT is essential for data analysis and intelligent decision-making. Thus, data-driven approaches to infer occupancy patterns usage a...
Conference Paper
Full-text available
Health data is considered to be sensitive and personal; both governments and software platforms have enacted specific measures to protect it. Consumer apps that collect health data are becoming more popular, but raise new privacy concerns as they collect unnecessary data, share it with third parties, and track users. However, developers of these ap...
Conference Paper
Full-text available
As a distributed machine learning paradigm, federated learning (FL) has been regarded as a promising candidate to preserve user privacy in Internet of Things (IoT) networks. Leveraging the waveform superposition property of wireless channels, over-the-air FL (AirFL) achieves fast model aggregation by integrating communication and computation via co...
Conference Paper
Full-text available
The number of medical IoT devices is increasing rapidly: CT scanners , ECG devices, insulin pumps and other devices, which previously operated independently, are being interconnected with other devices, now sharing patient data and/or uploading them to the cloud. Medical IoT devices can create privacy and security risks for patients, healthcare pro...
Chapter
Full-text available
Smart healthcare systems have been widely applied in the fields of intelligent healthcare, self-monitoring, diagnosis, and emergency. In recent years, there have been growing concerns regarding the privacy of the data collected from the users of the smart healthcare systems. This chapter proposes a lightweight federated learning framework based on...
Article
Full-text available
The Internet of Things (IoT) is a system with an ever-growing complexity; it is the next breakthrough that will humanize every object in our lives, as well as the next stage of automation. People are eager to embrace the convenience and practicalities brought by the rapidly evolving Internet-connected gadgets and applications. The IoT, which connec...
Presentation
Full-text available
ABSTRACT: In the last few years, it has been shown that Artificial Intelligence (AI) and Machine Learning (ML) outperforms human experts and specialists of the corresponding fields in terms of correct disease diagnosis. However, current laws, regulations and ethical aspects with regards to patients' and hospitals/clinics' data, don't allow the mass...
Article
Full-text available
Even though the 2012 Media Law dealt with electronic journalism (Chapter Five entitled Electronic Media) in Articles 67-68, 71 However, he did not address its ethics. This gap has resulted in ethical and professional transgressions mainly related to lack of accuracy and credibility and spread of false news, plagiarism, absence of original sources,...
Article
Full-text available
The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when the...
Article
Full-text available
Recently, exploring acoustic conditions of people in their everyday environments has drawn a lot of attention. One of the most important and disturbing sound sources is the test participant’s own voice. This contribution proposes an algorithm to determine the own-voice audio segments (OVS) for blocks of 125 ms and a method for measuring sound press...
Article
Full-text available
In terms of security and privacy, mobile ad-hoc network (MANET) continues to be in demand for additional debate and development. As more MANET applications become data-oriented, implementing a secure and reliable data transfer protocol becomes a major concern in the architecture. However , MANET's lack of infrastructure, unpredictable topology, and...
Article
Full-text available
The massive heterogeneous devices and open channels of the Internet of Things (IoT) lead to low efficiency and privacy leakage in the authentication process, which brings great challenges to identity authentication. This paper focuses on the anonymous authentication between the IoT edge device and the cloud server. In this work, we first propose a...
Conference Paper
Full-text available
The world has entered into the fifth industrial revolution (a.k.a. I5.0) which is characterized as a human-centric revolution as it relies on professionals' innovative and creative capabilities to guide fast, intelligent, and accurate machines. The issues of malfunctioning and loss of productivity during automation essentialized the use of humans'...
Article
Full-text available
Federated learning (FL) enables clients to train a machine learning model collaboratively by just aggregating their model parameters, which makes it very useful in empowering the IoTs with intelligence. To prevent privacy information leakage from parameters during aggregation, many FL frameworks use homomorphic encryption to protect client’s parame...
Article
Full-text available
Location-based service (LBS) is one of the most popular applications in 5G environment. Users can enjoy plenty of intelligent services, but serious threats will be caused in LBS at the same time. In order to protect privacy while ensuring efficiency, an efficient privacy-preserving framework based on the dimension-aware under spatiotemporal constra...
Preprint
Full-text available
Authentication systems are vulnerable to model inversion attacks where an adversary is able to approximate the inverse of a target machine learning model. Biometric models are a prime candidate for this type of attack. This is because inverting a biometric model allows the attacker to produce a realistic biometric input to spoof biometric authentic...
Article
Full-text available
The (IoT) is growing steadily, and so is the number of data that is generated by (IoT) devices. This makes it difficult to find and leverage relevant data (and data sources) without a data marketplace. Such a marketplace provides a platform to enable different parties, e.g., sensor operators and service providers, to trade their data. Today, most d...
Article
Full-text available
Background: The kidney exchange problem (KEP) addresses the matching of patients in need for a replacement organ with compatible living donors. Ideally many medical institutions should participate in a matching program to increase the chance for successful matches. However, to fulfill legal requirements current systems use complicated policy-based...