Results for ' privacy preserving utility mining'

979 found
Order:
  1.  17
    Anonymity preserving sequential pattern mining.Anna Monreale, Dino Pedreschi, Ruggero G. Pensa & Fabio Pinelli - 2014 - Artificial Intelligence and Law 22 (2):141-173.
    The increasing availability of personal data of a sequential nature, such as time-stamped transaction or location data, enables increasingly sophisticated sequential pattern mining techniques. However, privacy is at risk if it is possible to reconstruct the identity of individuals from sequential data. Therefore, it is important to develop privacy-preserving techniques that support publishing of really anonymous data, without altering the analysis results significantly. In this paper we propose to apply the Privacy-by-design paradigm for designing a (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  41
    Trust and privacy in the future internet—a research perspective.Dirk Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3. Trust and privacy in the future internet—a research perspective.Dirk van Rooy & Jacques Bus - 2010 - Identity in the Information Society 3 (2):397-404.
    With the proliferation of networked electronic communication came daunting capabilities to collect, process, combine and store data, resulting in hitherto unseen transformational pressure on the concepts of trust, security and privacy as we know them. The Future Internet will bring about a world where real life will integrate physical and digital life. Technology development for data linking and mining, together with unseen data collection, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  4.  61
    Fairer machine learning in the real world: Mitigating discrimination without collecting sensitive data.Reuben Binns & Michael Veale - 2017 - Big Data and Society 4 (2):205395171774353.
    Decisions based on algorithmic, machine learning models can be unfair, reproducing biases in historical data used to train them. While computational techniques are emerging to address aspects of these concerns through communities such as discrimination-aware data mining and fairness, accountability and transparency machine learning, their practical implementation faces real-world challenges. For legal, institutional or commercial reasons, organisations might not hold the data on sensitive attributes such as gender, ethnicity, sexuality or disability needed to diagnose and mitigate emergent indirect discrimination-by-proxy, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   22 citations  
  5.  44
    Privacy-Preserving and Scalable Service Recommendation Based on SimHash in a Distributed Cloud Environment.Yanwei Xu, Lianyong Qi, Wanchun Dou & Jiguo Yu - 2017 - Complexity:1-9.
    With the increasing volume of web services in the cloud environment, Collaborative Filtering- based service recommendation has become one of the most effective techniques to alleviate the heavy burden on the service selection decisions of a target user. However, the service recommendation bases, that is, historical service usage data, are often distributed in different cloud platforms. Two challenges are present in such a cross-cloud service recommendation scenario. First, a cloud platform is often not willing to share its data to other (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  6.  44
    Privacy preserving or trapping?Xiao-yu Sun & Bin Ye - forthcoming - AI and Society:1-11.
    The development and application of artificial intelligence (AI) technology has raised many concerns about privacy violations in the public. Thus, privacy-preserving computation technologies (PPCTs) have been developed, and it is expected that these new privacy protection technologies can solve the current privacy problems. By not directly using raw data provided by users, PPCTs claim to protect privacy in a better way than their predecessors. They still have technical limitations, and considerable research has treated PPCTs (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  92
    Privacy preserving electronic petitions.Claudia Diaz, Eleni Kosta, Hannelore Dekeyser, Markulf Kohlweiss & Girma Nigusse - 2008 - Identity in the Information Society 1 (1):203-219.
    We present the design of a secure and privacy preserving e-petition system that we have implemented as a proof-of-concept demonstrator. We use the Belgian e-ID card as source of authentication, and then proceed to issue an anonymous credential that is used to sign petitions. Our system ensures that duplicate signatures are detectable, while preserving the anonymity of petition signers. We analyze the privacy and security requirements of our application, present an overview of its architecture, and discuss (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  16
    A Smart Privacy-Preserving Learning Method by Fake Gradients to Protect Users Items in Recommender Systems.Guixun Luo, Zhiyuan Zhang, Zhenjiang Zhang, Yun Liu & Lifu Wang - 2020 - Complexity 2020:1-10.
    In this paper, we study the problem of protecting privacy in recommender systems. We focus on protecting the items rated by users and propose a novel privacy-preserving matrix factorization algorithm. In our algorithm, the user will submit a fake gradient to make the central server not able to distinguish which items are selected by the user. We make the Kullback–Leibler distance between the real and fake gradient distributions to be small thus hard to be distinguished. Using theories (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  15
    Privacy preserving solution of DCOPs by mediation.Pablo Kogan, Tamir Tassa & Tal Grinshpoun - 2023 - Artificial Intelligence 319 (C):103916.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service.Huijuan Lian, Weidong Qiu, Zheng di YanHuang & Jie Guo - 2017 - Complexity:1-14.
    With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  8
    Privacy preserving region optimal algorithms for symmetric and asymmetric DCOPs.Tal Grinshpoun, Tamir Tassa, Vadim Levit & Roie Zivan - 2019 - Artificial Intelligence 266 (C):27-50.
  12.  33
    Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks.Haleem Farman, Bilal Jan, Muhammad Talha, Abi Zar, Huma Javed, Murad Khan, Aziz Ud Din & Kijun Han - 2018 - Complexity 2018:1-12.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are only issued (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  14.  20
    Inherently privacy-preserving vision for trustworthy autonomous systems: Needs and solutions.Adam K. Taras, Niko Sünderhauf, Peter Corke & Donald G. Dansereau - 2024 - Journal of Responsible Technology 17 (C):100079.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  23
    Privacy-preserving graph convolution network for federated item recommendation.Pengqing Hu, Zhaohao Lin, Weike Pan, Qiang Yang, Xiaogang Peng & Zhong Ming - 2023 - Artificial Intelligence 324 (C):103996.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16. Between Privacy and Utility: On Differential Privacy in Theory and Practice.Jeremy Seeman & Daniel Susser - 2023 - Acm Journal on Responsible Computing 1 (1):1-18.
    Differential privacy (DP) aims to confer data processing systems with inherent privacy guarantees, offering strong protections for personal data. But DP’s approach to privacy carries with it certain assumptions about how mathematical abstractions will be translated into real-world systems, which—if left unexamined and unrealized in practice—could function to shield data collectors from liability and criticism, rather than substantively protect data subjects from privacy harms. This article investigates these assumptions and discusses their implications for using DP to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  29
    PC-SyncBB: A privacy preserving collusion secure DCOP algorithm.Tamir Tassa, Tal Grinshpoun & Avishay Yanai - 2021 - Artificial Intelligence 297 (C):103501.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  21
    Medical Records: Enhancing Privacy, Preserving the Common Good.Amitai Etzioni - 1999 - Hastings Center Report 29 (2):14.
    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19. "265." Medical Records: Enhancing Privacy, Preserving the Common Good," The Hastings Center Report, March-April 1999, pp. 14-23". [REVIEW]Unauthorized Use - forthcoming - Hastings Center Report.
     
    Export citation  
     
    Bookmark  
  20.  41
    A logical framework for privacy-preserving social network publication.Tsan-Sheng Hsu, Churn-Jung Liau & Da-Wei Wang - 2014 - Journal of Applied Logic 12 (2):151-174.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  17
    Secure and user privacy-preserving searching in peer-to-peer networks.J. Sen - 2013 - Logic Journal of the IGPL 21 (4):603-629.
  22.  13
    Machine learning based privacy-preserving fair data trading in big data market.Y. Zhao, Y. Yu, Y. Li, G. Han & X. Du - 2019 - Information Sciences 478.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Informational privacy, data mining, and the internet.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (2):137-145.
    Privacy concerns involving data mining are examined in terms of four questions: What exactly is data mining? How does data mining raise concerns for personal privacy? How do privacy concerns raised by data mining differ from those concerns introduced by traditional information-retrieval techniques in computer databases? How do privacy concerns raised by mining personal data from the Internet differ from those concerns introduced by mining such data from data warehouses? It (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  24. Data mining to combat terrorism and the roots of privacy concerns.Frans A. J. Birrer - 2005 - Ethics and Information Technology 7 (4):211-220.
    Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  25. Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  22
    A client-side approach for privacy-preserving identity federation.Sébastien Canard, Eric Malville & Jacques Traoré - 2009 - Identity in the Information Society 2 (3):269-295.
    Providing Single Sign-On (SSO) between service providers and enabling service providers to share user personal attributes are critical for both users to benefit from a seamless access to their services, and service providers to realize new business opportunities. Today, however, the users have several independent, partial identities spread over different service providers. Providing SSO and attribute sharing requires that links (federations) are established between (partial) identities. In SAML 2.0 (Maler et al. 2003), the links between identities are stored and managed (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  27.  6
    No free lunch theorem for privacy-preserving LLM inference.Xiaojin Zhang, Yahao Pang, Yan Kang, Wei Chen, Lixin Fan, Hai Jin & Qiang Yang - 2025 - Artificial Intelligence 341 (C):104293.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  9
    A novel heuristic algorithm for privacy preserving of associative classification.Nattapon Harnsamut & Juggapong Natwichai - 2008 - In Tu-Bao Ho & Zhi-Hua Zhou, PRICAI 2008: Trends in Artificial Intelligence. Springer. pp. 273--283.
    Direct download  
     
    Export citation  
     
    Bookmark  
  29.  17
    Width-based search for multi agent privacy-preserving planning.Alfonso E. Gerevini, Nir Lipovetzky, Francesco Percassi, Alessandro Saetti & Ivan Serina - 2023 - Artificial Intelligence 318 (C):103883.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  31. Mining Privacy and Pattern Matching.Neha Jain & Rajesh Shrivastava - 2012 - In Zdravko Radman, The Hand. MIT Press. pp. 1--5.
     
    Export citation  
     
    Bookmark  
  32. Privacy, Bulk Collection and "Operational Utility".Tom Sorell - 2021 - In Seumas Miller, Mitt Regan & Patrick Walsh, National Security Intelligence and Ethics. Routledge. pp. 141-155.
    In earlier work, I have expressed scepticism about privacy-based criticisms of bulk collection for counter-terrorism ( Sorell 2018 ). But even if these criticisms are accepted, is bulk collection nonetheless legitimate on balance – because of its operational utility for the security services, and the overriding importance of the purposes that the security services serve? David Anderson’s report of the Bulk Powers review in the United Kingdom suggests as much, provided bulk collection complies with strong legal safeguards ( (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  27
    Privacy concerns in educational data mining and learning analytics.Isak Potgieter - 2020 - International Review of Information Ethics 28.
    Education at all levels is increasingly augmented and enhanced by data mining and analytics, catalysed by the growing prevalence of automated distance learning. With an unprecedented capacity to scale both horizontally and vertically, data mining and analytics are set to be a transformative part of the future of education. We reflect on the assumptions behind data mining and the potential consequences of learning analytics, with reference to an issue brief prepared for the U.S. Department of Education entitled (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  15
    Mining correlated high-utility itemsets using various measures.Philippe Fournier-Viger, Yimin Zhang, Jerry Chun-Wei Lin, Duy-Tai Dinh & Hoai Bac Le - 2020 - Logic Journal of the IGPL 28 (1):19-32.
    Discovering high-utility itemsets (HUIs) consists of finding sets of items that yield a high profit in customer transaction databases. An important limitation of traditional high-utility itemset mining (HUIM) is that only the utility measure is used for assessing the interestingness of patterns. This leads to finding several itemsets that have a high profit but contain items that are weakly correlated. To address this issue, this paper proposes to integrate the concept of correlation in HUIM to find (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  13
    PUC: parallel mining of high-utility itemsets with load balancing on spark.Geetha Maiya, Harish Sheeranalli Venkatarama & Anup Bhat Brahmavar - 2022 - Journal of Intelligent Systems 31 (1):568-588.
    Distributed programming paradigms such as MapReduce and Spark have alleviated sequential bottleneck while mining of massive transaction databases. Of significant importance is mining High Utility Itemset that incorporates the revenue of the items purchased in a transaction. Although a few algorithms to mine HUIs in the distributed environment exist, workload skew and data transfer overhead due to shuffling operations remain major issues. In the current study, Parallel Utility Computation algorithm has been proposed with novel grouping and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  56
    Mean utility preserving increases in risk for state dependent utility functions.Michel Demers - 1987 - Theory and Decision 23 (2):113-128.
  37. A Framework Proposal for Developing Historical Video Games Based on Player Review Data Mining to Support Historic Preservation.Sarvin Eshaghi, Sepehr Vaez Afshar & Mahyar Hadighi - 2023 - In Saif Haq, Adil Sharag-Eldin & Sepideh Niknia, ARCC 2023 CONFERENCE PROCEEDING: The Research Design Interface. Architectural Research Centers Consortium, Inc.. pp. 297-305.
    Historic preservation, which is a vital act for conveying people’s understanding of the past, such as events, ideas, and places to the future, allows people to preserve history for future generations. Additionally, since the historic properties are currently concentrated in urban areas, an urban-oriented approach will contribute to the issue. Hence, public awareness is a key factor that paves the way for this conservation. Public history, a history with a public audience and special methods of representation, can serve society in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Would you mind being watched by machines? Privacy concerns in data mining.Vincent C. Müller - 2009 - AI and Society 23 (4):529-544.
    "Data mining is not an invasion of privacy because access to data is only by machines, not by people": this is the argument that is investigated here. The current importance of this problem is developed in a case study of data mining in the USA for counterterrorism and other surveillance purposes. After a clarification of the relevant nature of privacy, it is argued that access by machines cannot warrant the access to further information, since the analysis (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39. KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.
    The present study examines certain challenges that KDD (Knowledge Discovery in Databases) in general and data mining in particular pose for normative privacy and public policy. In an earlier work (see Tavani, 1999), I argued that certain applications of data-mining technology involving the manipulation of personal data raise special privacy concerns. Whereas the main purpose of the earlier essay was to show what those specific privacy concerns are and to describe how exactly those concerns have (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  40.  42
    The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  24
    Agents preserving privacy on intelligent transportation systems according to EU law.Javier Carbo, Juanita Pedraza & Jose M. Molina - forthcoming - Artificial Intelligence and Law:1-34.
    Intelligent Transportation Systems are expected to automate how parking slots are booked by trucks. The intrinsic dynamic nature of this problem, the need of explanations and the inclusion of private data justify an agent-based solution. Agents solving this problem act with a Believe Desire Intentions reasoning, and are implemented with JASON. Privacy of trucks becomes protected sharing a list of parkings ordered by preference. Furthermore, the process of assigning parking slots takes into account legal requirements on breaks and driving (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  33
    Policymaking to preserve privacy in disclosure of public health data: a suggested framework.Mehrdad A. Mizani & Nazife Baykal - 2015 - Journal of Medical Ethics 41 (3):263-267.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  43. Privacy versus Public Health? A Reassessment of Centralised and Decentralised Digital Contact Tracing.Lucie White & Philippe van Basshuysen - 2021 - Science and Engineering Ethics 27 (2):1-13.
    At the beginning of the COVID-19 pandemic, high hopes were placed on digital contact tracing. Digital contact tracing apps can now be downloaded in many countries, but as further waves of COVID-19 tear through much of the northern hemisphere, these apps are playing a less important role in interrupting chains of infection than anticipated. We argue that one of the reasons for this is that most countries have opted for decentralised apps, which cannot provide a means of rapidly informing users (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  44.  11
    Privacy, due process and the computational turn.Mireille Hildebrandt & Katja de Vries (eds.) - 2013 - Abingdon, Oxon, [England] ; New York: Routledge.
    Privacy, Due process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology engages with the rapidly developing computational aspects of our world including data mining, behavioural advertising, iGovernment, profiling for intelligence, customer relationship management, smart search engines, personalized news feeds, and so on in order to consider their implications for the assumptions on which our legal framework has been built. The contributions to this volume focus on the issue of privacy, which is often (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  45. HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.Adelaide Conti, Paola Delbon, Laura Laffranchi, Corrado Paganelli & Francesco De Ferrari - 2012 - Journal of Medical Ethics 38 (6):386-388.
    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in accordance with the current (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  46.  14
    The War on Privacy – or, Privacy as a Strategy for Liberty.Andrea Togni - 2023 - Rivista Italiana di Filosofia Politica 3:243-259.
    In the last chapter of The Ethics of Liberty, Rothbard discusses his theory of strategy for liberty, and recommends tools such as education that libertarians can lean on to attain the highest political goal of freedom. Building on Rothbard’s shoulders, the main thesis of this paper is that an effective theory of strategy for liberty cannot dispense with privacy, which needs to be understood as a condition for the enjoyment of liberty and not as a right per se. In (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Brain Privacy and the Case of Cannibal Cop.Mark Tunick - 2017 - Res Publica 23 (2):179-196.
    In light of technology that may reveal the content of a person’s innermost thoughts, I address the question of whether there is a right to ‘brain privacy’—a right not to have one’s inner thoughts revealed to others–even if exposing these thoughts might be beneficial to society. I draw on a conception of privacy as the ability to control who has access to information about oneself and to an account that connects one’s interest in privacy to one’s interests (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  52
    Patron Privacy in the "2.0" Era.Michael Zimmer - 2013 - Journal of Information Ethics 22 (1):44-59.
    As libraries begin to embrace Web 2.0 technologies to serve patrons—ushering in the era of Library 2.0—unique dilemmas arise in the realm of information ethics, especially regarding patron privacy. The norms of Web 2.0 promote the open sharing of information—often personal information—and the design of many Library 2.0 services capitalize on access to patron information and might require additional tracking, collection, and aggregation of patron activities. Thus, embracing Library 2.0 potentially threatens the traditional ethics of librarianship, where protecting patron (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  26
    Probability and utility of endangered species preservation programs.Michael L. DeKay & Gary H. McClelland - 1996 - Journal of Experimental Psychology: Applied 2 (1):60.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50.  89
    Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech’s newfound role as global health policy makers.Tamar Sharon - 2020 - Ethics and Information Technology 23 (S1):45-57.
    Since the outbreak of COVID-19, governments have turned their attention to digital contact tracing. In many countries, public debate has focused on the risks this technology poses to privacy, with advocates and experts sounding alarm bells about surveillance and mission creep reminiscent of the post 9/11 era. Yet, when Apple and Google launched their contact tracing API in April 2020, some of the world’s leading privacy experts applauded this initiative for its privacy-preserving technical specifications. In an (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   24 citations  
1 — 50 / 979