Searched for:
(1 - 20 of 39)

Pages

document
Nasrullah, I.H. (author)
Detecting and tracking of objects by a tracking device can be considered a breach of privacy when an unauthorised party can associate certain tracking information outputted by the tracker to the identity of an individual. Therefore, when this privacy-sensitive information is stored in a database, it is desired that this is done in a secure...
master thesis 2009
document
Keyser, S. (author), Velzeboer, T. (author)
The RFID guardian is an embedded device to protect the privacy of people using their RFID (Radio Frequency IDentification) enabled products. This BSc. project is about how version 2 of the RFID Guardian hardware was designed. Besides the description about the hardware it handles some obligatory paperwork for the design flow which was used during...
bachelor thesis 2009
document
Erkin, Z. (author)
Recent advances in technology provided a suitable environment for the people in which they can benefit from online services in their daily lives. Despite several advantages, online services also constitute serious privacy risks for their users as the main input to algorithms are privacy sensitive such as demographic information, shopping...
doctoral thesis 2010
document
Gedrojc, B. (author)
The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints. For privacy reasons the user does not want to...
doctoral thesis 2011
document
Blenn, N. (author), Doerr, C. (author), Shadravan, N. (author), Van Mieghem, P. (author)
After the early land rush and fast exponential growth of online social networking platforms, concerns about how data placed in online social networks may be exploited and abused have begun to appear among mainstream users. Social networking sites have responded to these new public sentiments by introducing privacy filters to their site, allowing...
conference paper 2012
document
Nagtegaal, M.A. (author)
I propose an implementation of the quantum private query protocol as described in an article using a photon to encode a question and reflectionor transmission of the photon as answer options. Each question is represented by a photon in a transmission line with both ends returning to the user, and the answer is represented by reflection or...
bachelor thesis 2015
document
Van Bergen, A.T.M. (author)
While travelling with their RV, campers want to have the same comfort as their home. That includes the use of toilets. European RVs use a system where the human-wastes are contained in a waste-holding tank until those wastes are dumped. The dumping needs to be done manually, the RV user has to remove the tank from the RV, bring the tank to a...
master thesis 2015
document
Nateghizad, M. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart...
journal article 2016
document
Christen, Markus (author), Gordijn, Bert (author), Weber, Karsten (author), van de Poel, I.R. (author), Yaghmaei, E. (author)
Cybersecurity is of capital importance in a world where economic and social processes increasingly rely on digital technology. Although the primary ethical motivation of cybersecurity is prevention of informational or physical harm, its enforcement can also entail conflicts with other moral values. This contribution provides an outline of value...
journal article 2017
document
Bierens, R.H. (author), Klievink, A.J. (author), van den Berg, J. (author)
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the...
conference paper 2017
document
van Driel, Ronald (author), van der Hout, Justin (author), van der Wel, Marissa (author), Houtman, Marco (author)
As of this moment there is a lack of data about rainfall in cities. To collect such data, IBM has started the Sense Umbrella Connection and Desensitisation project. For this project an umbrella was equipped with a piezoelectric sensor and a Bluetooth device to record the rain that falls on the surface of this umbrella. One downside of this...
bachelor thesis 2017
document
Prahesa Kusuma Setia, Prahesa (author)
Current interconnected society provides us with numerous devices communicating with one another. Exchange of data thus become an integral part in our live. Data become valuable commodity in today's setting because of their usage by individual and other interested parties. Several parties may be interested in computing a function over their data...
master thesis 2017
document
Domanski, Rob (author), Estevez, Elsa (author), Styrin, Evgeny (author), Alfano, M.R. (author), Harrison, Teresa M. (author)
In this panel, scholars discuss involving data, computational analysis, and information technology that hasthe potential to present ethical quandaries in the course of decision making related to digital government. More specifically, the presentations focus on algorithm-based decision making, personally identifiable information, and the...
conference paper 2018
document
Yin, Y. (author), Zuiderwijk-van Eijk, A.M.G. (author), Van Ossenbruggen, Jacco (author), Jeffery, Keith (author), Luthfi, A. (author), Janssen, M.F.W.H.A. (author)
Governments and publicly-funded research institutions increasingly open up data collected and created through research. One way to share and use data obtained through research is through Virtual Research Environments (VREs). Insights obtained through open data use in VREs can subsequently provide input for policy making. However, this process...
conference paper 2018
document
Luthfi, A. (author), Janssen, M.F.W.H.A. (author), Crompvoets, Joep (author)
Open government data initiatives result in the expectation of having open data available. Nevertheless, some potential risks like sensitivity, privacy, ownership, misinterpretation, and misuse of the data result in the reluctance of governments to open their data. At this moment, there is no comprehensive overview nor a model to understand the...
conference paper 2018
document
Shishkov, Boris (author), Janssen, M.F.W.H.A. (author)
Networked physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity, allow for run-time acquisition of user data. This in turn can enable information systems which capture the “current” user state and act accordingly. The use of this data would result in context...
conference paper 2018
document
Dijkhuis, Sander (author), van Wijk, R. (author), Dorhout, Hidde (author), Bharosa, N. (author)
As a frequent participant in eSociety, Willeke is often preoccupied with paperwork because there is no easy to use, affordable way to act as a qualified person in the digital world. Confidential interactions take place over insecure channels like e-mail and post. This situation poses risks and costs for service providers, civilians and...
conference paper 2018
document
Mahieu, R.L.P. (author), van Eck, Nees Jan (author), van Putten, D.C. (author), van den Hoven, M.J. (author)
Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical problems emerge. The academic field that addresses these problems—which we tentatively call ‘digital ethics’—can be an important intellectual resource for policy making and regulation. This is why it is important to understand how the new...
journal article 2018
document
Kitkauskas, Mantas (author)
Armenia faces international conflicts especially with Azerbaijan and Turkey. There is always a chance of a sudden intensification of conflicts what results in extreme militarization of country as well as strengthened social control. Social control gains new level as the relation between government and society is also complicated. As a...
master thesis 2018
document
van de Kamp, Lars (author)
Machine learning techniques receive significant responsibilities, despite growing privacy concerns. Early-stage autonomous vehicles are increasingly appearing on the streets, carrying the burden of transporting human-lives to their destination. Meanwhile, doctors are involving Artificial Intelligence (AI) in their medical diagnoses, basing...
master thesis 2018
Searched for:
(1 - 20 of 39)

Pages