Searched for:
(1 - 20 of 37)

Pages

document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Han, Rui (author), Li, Dong (author), Ouyang, Junyan (author), Liu, Chi Harold (author), Wang, Guoren (author), Wu, Dapeng Oliver (author), Chen, Y. (author)
To enable insight extractions without the risk of information leakage, deep learning (DL) models are increasingly built on federated edge participants holding local data, in combination with differential privacy (DP). The core theme is to tradeoff learning accuracy by adding statistically calibrated noises, particularly to local gradients of...
journal article 2021
document
Dekker, F.W. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020
document
van de Poel, I.R. (author)
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and accountability. Each cluster consists of a range of further values, which can be...
book chapter 2020
document
Ishmaev, G. (author)
Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the...
journal article 2020
document
Bentinck, S.A. (author), van Oel, C.J. (author), van Dorst, M.J. (author)
Informal face-to-face communication and chance encounters encourage knowledge sharing. This Post-Occupancy Evaluation (POE) examines how well a new building of a Dutch University Institute (DI) supported interaction and perceived privacy among faculty members. The study is designed as a qualitative research project with in-depth interviews...
journal article 2020
document
Rovers, Tim (author)
This master thesis explores to what degree information about a company's commitment to privacy can be extracted from a privacy statement. To do this, firstly a new database of more than 1500 privacy statements is created using Amazon Mechanical Turk. Next, 72 different aspects related to privacy of the statements are enumerated by using natural...
master thesis 2019
document
Prasad, Nivedita (author)
People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...
master thesis 2019
document
Shriram, Sharad (author)
Modern web information systems use machine learning models to provide personalized user services and experiences. However, machine learning models require annotated data for training, and creating annotated data is done through crowdsourcing tasks. The content used in annotation crowdsourcing tasks like medical records and images might contain...
master thesis 2019
document
de Jong, Alex (author)
This study aims to provide insight into how factors relating to privacy and incentives influence people's willingness to participate in sharing their vehicle based sensing data with governmental parties for the purposes of improved dynamic traffic management in the Netherlands. Through the use of a stated preference experiment data is gathered...
master thesis 2019
document
van der Meulen, Sietske (author)
Digitalization and automation brings many amazing things; games, social media, navigation. However, it also makes us more vulnerable. The facelessness of cyber space and the emancipation of place makes it hard to grasp. Additionally, our personal data becomes more valuable and thereby more lucrative to criminalize. The combination of these...
master thesis 2019
document
Ishmaev, G. (author)
This paper looks at the development of blockchain technologies that promise to bring new tools for the management of private data, providing enhanced security and privacy to individuals. Particular interest presents solutions aimed at reorganizing data flows in the Internet of Things (IoT) architectures, enabling the secure and decentralized...
journal article 2019
document
Kraaij, Wessel (author), Verberne, Suzan (author), Koldijk, Saskia (author), de Korte, E.M. (author), van Dantzig, Saskia (author), Sappelli, Maya (author), Hulsebosch, Bob (author), Wabeke, Thymen (author), Neerincx, M.A. (author)
Recent advances in wearable sensor technology and smartphones enable simple and affordable collection of personal analytics. This paper reflects on the lessons learned in the SWELL project that addressed the design of user-centered ICT applications for self-management of vitality in the domain of knowledge workers. These workers often have a...
journal article 2019
document
Strucks, Christopher (author), Slokom, M. (author), Larson, M.A. (author)
Past research has demonstrated that removing implicit gender information from the user-item matrix does not result in substantial performance losses. Such results point towards promising solutions for protecting users’ privacy without compromising prediction performance, which are of particular interest in multistakeholder environments. Here,...
conference paper 2019
document
Turcios Rodriguez, Elsa (author)
Tracking is a pervasive mechanism across the web which is capable to trace and collect users’ online data. One of the most widely used mechanisms for tracking are cookies, and they are used to deliver online behavioral advertisement. Since these mechanisms pose a threat to privacy, the E-Privacy Directive was created as the regional legal...
master thesis 2018
document
van de Kamp, Lars (author)
Machine learning techniques receive significant responsibilities, despite growing privacy concerns. Early-stage autonomous vehicles are increasingly appearing on the streets, carrying the burden of transporting human-lives to their destination. Meanwhile, doctors are involving Artificial Intelligence (AI) in their medical diagnoses, basing...
master thesis 2018
document
Kitkauskas, Mantas (author)
Armenia faces international conflicts especially with Azerbaijan and Turkey. There is always a chance of a sudden intensification of conflicts what results in extreme militarization of country as well as strengthened social control. Social control gains new level as the relation between government and society is also complicated. As a...
master thesis 2018
document
Dijkhuis, Sander (author), van Wijk, R. (author), Dorhout, Hidde (author), Bharosa, N. (author)
As a frequent participant in eSociety, Willeke is often preoccupied with paperwork because there is no easy to use, affordable way to act as a qualified person in the digital world. Confidential interactions take place over insecure channels like e-mail and post. This situation poses risks and costs for service providers, civilians and...
conference paper 2018
Searched for:
(1 - 20 of 37)

Pages