Searched for: subject:"Privacy"
(1 - 20 of 55)

Pages

document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
Dekker, F.W. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Rawat, A. (author)
Governments across the world looking to implement Open Government Data (OGD) initiatives undergo many problems. One such problem is the risk to privacy from opening data sets as most of the data is at a microdata level which corresponds to specific individuals. A solution to such a predicament is the application of Statistical Disclosure Control...
master thesis 2020
document
Vlasblom, Nina (author)
Skopje is city of architecture with a strong emphasis on their exterior. Looking at the image of the city, the variety of architecture present can seem a bit overwhelming; each type of architecture seems to claim that they are thé image of Skopje. Since Skopje is filled with these different types of 'loud speaking architecture', the image of the...
master thesis 2020
document
Govers, Jurriaan (author)
This thesis is focused on protecting sensitive data in optimization-based control methods. We propose a novel Privacy-preserving Model Predictive Controller (PMPC) where multiple agents are controlled by an untrusted external coordinator. By using the Paillier additively Homomorphic Encryption (HE) scheme, our PMPC allows the coordinator to...
master thesis 2020
document
Ho-Sam-Sooi, Nick (author)
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security and privacy on IoT device purchase behaviour and assessed whether...
master thesis 2020
document
Enthoven, David (author)
With the increasing number of data collectors such as smartphones, immense amounts of data are available. These data have great value for training machine learning models. Federated learning is a distributed machine learning approach that allows a machine learning model to train on a distributed data-set without transferring any data and...
master thesis 2019
document
Ferreras Chumillas, Pablo (author)
The recently introduced General Data Protection Regulation (GDPR) allows universities to use WiFi Access data for their research activities. The richness, ubiquity, and scalability of WiFi tracking make it an extremely relevant resource for studying the behavior and mobility patterns of groups and social systems. However, it is also a sensitive...
master thesis 2019
document
Rovers, Tim (author)
This master thesis explores to what degree information about a company's commitment to privacy can be extracted from a privacy statement. To do this, firstly a new database of more than 1500 privacy statements is created using Amazon Mechanical Turk. Next, 72 different aspects related to privacy of the statements are enumerated by using natural...
master thesis 2019
document
Çalış, Metin (author)
Consensus problem has been a topic of interest for many research areas allowing multiple agents to reach an agreement through local information exchange. The explicit share of the state variables, however, may cause privacy issues due to the confidentiality of the initial values. In this work, asynchronous privacy-preserving consensus average...
master thesis 2019
document
Sabée, Wendo (author)
Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some privacy, however, Tor is slow in both bandwidth and latency. It uses a TCP-based connection to multiplex different circuits between nodes and this causes different independent circuits...
master thesis 2019
document
Prasad, Nivedita (author)
People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...
master thesis 2019
document
Shriram, Sharad (author)
Modern web information systems use machine learning models to provide personalized user services and experiences. However, machine learning models require annotated data for training, and creating annotated data is done through crowdsourcing tasks. The content used in annotation crowdsourcing tasks like medical records and images might contain...
master thesis 2019
document
de Jong, Alex (author)
This study aims to provide insight into how factors relating to privacy and incentives influence people's willingness to participate in sharing their vehicle based sensing data with governmental parties for the purposes of improved dynamic traffic management in the Netherlands. Through the use of a stated preference experiment data is gathered...
master thesis 2019
document
van der Meulen, Sietske (author)
Digitalization and automation brings many amazing things; games, social media, navigation. However, it also makes us more vulnerable. The facelessness of cyber space and the emancipation of place makes it hard to grasp. Additionally, our personal data becomes more valuable and thereby more lucrative to criminalize. The combination of these...
master thesis 2019
document
Quaedvlieg, Felix (author)
As more consumer products and services are getting intelligent and collect data about the user, privacy has become an important topic of debate in society. New rules and legislation are being implemented to safeguard the user’s privacy. In addition, from a technological perspective, developments like the creation of the seven principles of ...
master thesis 2019
document
Łęcka, Agnieszka (author)
In the times of emerging technologies and rising individuals’ awareness more light is shed on privacy and associated risks. This does not go unnoticed by regulators, that develop and enforce tighter requirements towards organisations. Simultaneously, outsourcing relationships develop and offshoring as well as nearshoring are still popular among...
master thesis 2018
document
Välling, Rasmus (author)
Recently we have been witnesses to a string of controversial elections: the 2016 US Presidential election, the 2016 Brexit referendum, the 2018 Russian presidential election, the 2018 Zimbabwe elections. The controversies surrounding elections are seemingly endless.<br/><br/>Why are these examples relevant? In the 21st century, we are still...
master thesis 2018
document
Manikandan, Hari (author)
In less than a century, the Internet has morphed from being a communication channel to a medium of existence for people. Meanwhile, attacks over the Internet have been growing both qualitatively and quantitatively, with losses transcending the financial kind and threatening the well-being of human lives. This trend fuels the need for Cyber...
master thesis 2018
document
Turcios Rodriguez, Elsa (author)
Tracking is a pervasive mechanism across the web which is capable to trace and collect users’ online data. One of the most widely used mechanisms for tracking are cookies, and they are used to deliver online behavioral advertisement. Since these mechanisms pose a threat to privacy, the E-Privacy Directive was created as the regional legal...
master thesis 2018
Searched for: subject:"Privacy"
(1 - 20 of 55)

Pages