Searched for: subject:"Privacy"
(1 - 20 of 126)

Pages

document
Ho-Sam-Sooi, Nick (author), Pieters, W. (author), Kroesen, M. (author)
Given the significant privacy and security risks of Internet-of-Things (IoT) devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account in the purchase decision. In order to support this goal, this study examines the effect of security and privacy on IoT device purchase behaviour and...
journal article 2021
document
Benchaya-Gans, R. (author), Ubacht, J. (author), Janssen, M.F.W.H.A. (author)
Whereas part of the world can benefit from the wonders of digital technologies, undocumented migrants, asylum seekers,and refugees are facing the rough reality of being “invisible” in society and ignored by governments. During the COVID-19 pandemic, the economic impact of the closure of the service industry and the impossibility to keep most of...
journal article 2020
document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
Dekker, F.W. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Rawat, A. (author)
Governments across the world looking to implement Open Government Data (OGD) initiatives undergo many problems. One such problem is the risk to privacy from opening data sets as most of the data is at a microdata level which corresponds to specific individuals. A solution to such a predicament is the application of Statistical Disclosure Control...
master thesis 2020
document
Bisogni, F. (author)
In response to evolving cybersecurity challenges, global spending on information security has grown steadily, and could eventually reach a level that is inefficient and unaffordable. A better understanding of new socio-technical-economic complexities around information security is urgently needed, which requires both reconsideration of...
doctoral thesis 2020
document
Li, Qiongxiu (author), Coutino, Mario (author), Leus, G.J.T. (author), Christensen, M. Graesboll (author)
With an increasingly interconnected and digitized world, distributed signal processing and graph signal processing have been proposed to process its big amount of data. However, privacy has become one of the biggest challenges holding back the widespread adoption of these tools for processing sensitive data. As a step towards a solution, we...
conference paper 2020
document
Çalış, M. (author), Heusdens, R. (author), Hendriks, R.C. (author)
Average consensus algorithms are used in many distributed systems such as distributed optimization, sensor fusion and the control of dynamic systems. Consensus algorithms converge through an explicit exchange of state variables. In some cases, however, the state variables are confidential. In this paper, a privacy-preserving asynchronous...
conference paper 2020
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, M. Graesboll (author)
Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization...
conference paper 2020
document
Vlasblom, Nina (author)
Skopje is city of architecture with a strong emphasis on their exterior. Looking at the image of the city, the variety of architecture present can seem a bit overwhelming; each type of architecture seems to claim that they are thé image of Skopje. Since Skopje is filled with these different types of 'loud speaking architecture', the image of the...
master thesis 2020
document
Govers, Jurriaan (author)
This thesis is focused on protecting sensitive data in optimization-based control methods. We propose a novel Privacy-preserving Model Predictive Controller (PMPC) where multiple agents are controlled by an untrusted external coordinator. By using the Paillier additively Homomorphic Encryption (HE) scheme, our PMPC allows the coordinator to...
master thesis 2020
document
Ho-Sam-Sooi, Nick (author)
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security and privacy on IoT device purchase behaviour and assessed whether...
master thesis 2020
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020
document
Rook, L. (author), Sabic, Adem (author), Zanker, Markus (author)
The present research explored to what extent user engagement in proactive recommendation scenarios is influenced by the accuracy of recommendations, concerns with information privacy, and trait personality. We hypothesized that people’s self-reported information privacy concerns would matter more when they received accurate (vs. inaccurate)...
journal article 2020
document
Hafeez, Ibbad (author), Antikainen, Markku (author), Ding, Aaron Yi (author), Tarkoma, Sasu (author)
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IoT-Keeper, a lightweight system which...
journal article 2020
document
Bentinck, S.A. (author), van Oel, C.J. (author), van Dorst, M.J. (author)
Informal face-to-face communication and chance encounters encourage knowledge sharing. This Post-Occupancy Evaluation (POE) examines how well a new building of a Dutch University Institute (DI) supported interaction and perceived privacy among faculty members. The study is designed as a qualitative research project with in-depth interviews...
journal article 2020
document
Muravyeva, Ekaterina (author), Janssen, José (author), Specht, M.M. (author), Custers, Bart (author)
Personal data use is increasingly permeating our everyday life. Informed consent for personal data use is a central instrument for ensuring the protection of personal data. However, current informed consent practices often fail to actually inform data subjects about the use of personal data. This article presents the results of a requirements...
journal article 2020
document
Ishmaev, G. (author)
Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty' in this context can be understood as the...
journal article 2020
document
Li, Qiongxiu (author), Heusdens, R. (author), Christensen, Mads Græsbøll (author)
In many applications of wireless sensor networks, it is important that the privacy of the nodes of the network be protected. Therefore, privacy-preserving algorithms have received quite some attention recently. In this paper, we propose a novel convex optimization-based solution to the problem of privacy-preserving distributed average consensus....
conference paper 2020
document
Verhelst, H.M. (author), Stannat, A.W. (author), Mecacci, G. (author)
Rapid advancements in machine learning techniques allow mass surveillance to be applied on larger scales and utilize more and more personal data. These developments demand reconsideration of the privacy-security dilemma, which describes the tradeoffs between national security interests and individual privacy concerns. By investigating mass...
journal article 2020
Searched for: subject:"Privacy"
(1 - 20 of 126)

Pages