首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
With the continuous development of comprehensive technologies in various fields, the cyber-physical systems has been successfully applied in many fields in a large scale. The privacy and security issues in the system have gradually become the focus of attention. This article focuses on privacy protection issues in the area of Internet of Vehicles (IoV). IoV has developed rapidly and come into public consciousness quickly. Radio Frequency Identification (RFID) technology is a safe and reliable sensor data processing system, which is widely used in IoV. However, RFID system often suffers some risks of privacy disclosure. For example the owners are reluctant to disclose their private information such as their precise location information to the public network. Faced with those security risks, it is of great importance for the RFID system applied to IoV to protect private information. In this paper, we propose a cloud-based mutual authentication protocol aiming at ensuring efficient privacy preserving in IoV system, which enables people the efficiently and intelligently travel mode while protecting their privacy from divulging. Moreover, that the anonymity of tag is implemented not only protects the privacy data of the owners, but also prevents the malicious tracking from outside attackers. As to the proposed scheme, the proof based on BAN logic indicates it is of logic security. Security analysis and performance evaluation show that the scheme can be a good security solution for IoV with the feature of good safety and reliability.  相似文献   

2.
This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social implications (ELSI) program requirements that were established to guide researchers working on the Human Genome Project (HGP). Next I consider a case illustration involving deCODE Genetics, a privately owned genetic company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. The deCODE case also illustrates some ways in which an ICT technique known as data mining has both aided and posed special challenges for researchers working in the field of population genomics. On the one hand, data-mining tools have greatly assisted researchers in mapping the human genome and in identifying certain "disease genes" common in specific populations (which, in turn, has accelerated the process of finding cures for diseases tha affect those populations). On the other hand, this technology has significantly threatened the privacy of research subjects participating in population genomics studies, who may, unwittingly, contribute to the construction of new groups (based on arbitrary and non-obvious patterns and statistical correlations) that put those subjects at risk for discrimination and stigmatization. In the final section of this paper I examine some ways in which the use of data mining in the context of population genomics research poses a critical challenge for the principle of informed consent, which traditionally has played a central role in protecting the privacy interests of research subjects participating in epidemiological studies.  相似文献   

3.
基于大数据的图书馆用户个性化隐私保护策略   总被引:1,自引:0,他引:1  
马晓亭  李凌 《现代情报》2014,34(3):60-62,67
近年来,用户隐私保护问题已成为大数据时代图书馆的研究热点,用户数据隐私保护的意义显得尤为重要。本文介绍了大数据时代图书馆用户隐私保护问题的研究背景,提出了一种基于大数据的图书馆用户个性化隐私保护策略,从隐私政策、隐私保护技术、数据可用性分析和图书馆监管4个重要方面,对图书馆用户的隐私保护问题进行了分析与总结。  相似文献   

4.
黄丽佳  袁勤俭 《现代情报》2017,37(10):114-121
通过对相关文献的回顾,本文对国际网络隐私研究进行了计量分析,发现现有的研究主题集中在"基于移动位置服务的隐私问题研究"、"隐私保护算法研究"、"隐私保护技术研究"、"云计算的隐私安全研究"、"网络隐私权限控制研究"、"社交网站和电子商务中的用户隐私态度与行为研究"、"青少年敏感信息的隐私与安全保护研究"、"数据公开共享策略与国家治理研究"8个方面。研究发现当前研究中存在"利用数据纵向分析网络隐私主题随时间发展变化的研究较少"、"对于一些发展中国家的隐私问题关注度较低"、"国家的治理与业界的隐私政策相对独立缺乏联系"等问题,"大数据时代移动信息和社交信息挖掘过程中的隐私问题"、"在线医疗的隐私问题"等是未来研究值得关注的领域。  相似文献   

5.
In the public debate, social implications of information technology are mainly seen through the privacy lens. Impact assessments of information technology are also often limited to privacy impact assessments, which are focused on individual rights and well-being, as opposed to the social environment. In this article, I argue that this perspective is too narrow, in terms of understanding the complexity of the relation between information technology and society, as well as in terms of directions for managing this relation. I use systems theory to show that current approaches focus mostly on individual impact of information technology developments rather than their mediating role in society itself. I argue that this should be complemented by an analysis of impact on individuals (psychic systems) via co-construction of the environment (social system). I then take up the question of what the role of information technology in social systems would look like in terms of the social relations of trust and power, and how this can complement privacy in discussions on impacts of information technology.  相似文献   

6.
Modern public transportation companies often record large amounts of information. Privacy can be safeguarded by discarding nominal tickets, or introducing anonymization techniques. But is anonymity at all possible when everything is recorded? In this paper we discuss travel information management in the public transport scenario and we present a revealing case study (relative to the city of Cesena, Italy), showing that even anonymous 10-ride bus tickets may betray a user's privacy expectations. We also propose a number of recommendations for the design and management of public transport information systems, aimed at preserving the users’ privacy, while retaining the useful analysis features enabled by the e-ticketing technology.  相似文献   

7.
This paper begins with a discussion of the value of privacy,especially for medical records in an age of advancing technology.I then examine three alternative approaches to protection ofmedical records: reliance on governmental guidelines, the useof corporate self-regulation, and my own third hybrid view onhow to maintain a presumption in favor of privacy with respectto medical information, safeguarding privacy as vigorously andcomprehensively as possible, without sacrificing the benefitsof new information technology in medicine. None of the threemodels I examine are unproblematic, yet it is crucial to weighthe strengths and weaknesses of these alternative approaches.  相似文献   

8.
陆雪梅  古春生 《现代情报》2016,36(11):66-70
针对大数据环境下用户信息隐私泄露问题,论文首先分析当前用户信息隐私保护的现状与趋势,并指出当前用户信息隐私保护存在的问题;然后通过典型案例、统计分析和系统分析等手段,研究大数据环境下用户信息隐私泄露的发生机制和成因;最后聚焦用户信息隐私泄露的成因,分析研究用户信息隐私保护的关键社会方法与技术方法,并构建用户信息隐私保护的社会技术模型以及优化策略。  相似文献   

9.
To better understand ethical issues involved in the field of human genetics and promote debate within the scientific community, the author surveyed scientists who engage in human genetics research about the pros, cons, and ethical implications of genetic testing. This study contributes systematic data on attitudes of scientific experts. The survey finds respondents are highly supportive of voluntary testing and the right to know one's genetic heritage. The majority consider in utero testing and consequent pregnancy termination acceptable for cases involving likelihood of serious disease but disapprove for genetic reasons they consider arbitrary, leaving a gray area of distinguishing between treatment of disorders and enhancement still to be resolved. While safeguarding patient confidentiality versus protecting at-risk third parties (kin, reproductive partners) presents a dilemma, preserving privacy from misuse by institutional third parties (employers, insurers) garners strong consensus for legislation against discrimination. Finally, a call is made for greater genetic literacy.  相似文献   

10.
To better understand ethical issues involved in the field of human genetics and promote debate within the scientific community, the author surveyed scientists who engage in human genetics research about the pros, cons, and ethical implications of genetic testing. This study contributes systematic data on attitudes of scientific experts. The survey finds respondents are highly supportive of voluntary testing and the right to know one's genetic heritage. The majority consider in utero testing and consequent pregnancy termination acceptable for cases involving likelihood of serious disease but disapprove for genetic reasons they consider arbitrary, leaving a gray area of distinguishing between treatment of disorders and enhancement still to be resolved. While safeguarding patient confidentiality versus protecting at-risk third parties (kin, reproductive partners) presents a dilemma, preserving privacy from misuse by institutional third parties (employers, insurers) garners strong consensus for legislation against discrimination. Finally, a call is made for greater genetic literacy.  相似文献   

11.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

12.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

13.
In this article, I summarise the ontological theory of informational privacy (an approach based on information ethics) and then discuss four types of interesting challenges confronting any theory of informational privacy: (1) parochial ontologies and non-Western approaches to informational privacy; (2) individualism and the anthropology of informational privacy; (3) the scope and limits of informational privacy; and (4) public, passive and active informational privacy. I argue that the ontological theory of informational privacy can cope with such challenges fairly successfully. In the conclusion, I discuss some of the work that lies ahead.  相似文献   

14.
The Internet of Things (IoT) is an emerging global infrastructure that employs wireless sensors to collect, store, and exchange data. Increasingly, applications for marketing and advertising have been articulated as a means to enhance the consumer shopping experience, in addition to improving efficiency. However, privacy advocates have challenged the mass aggregation of personally-identifiable information in databases and geotracking, the use of location-based services to identify one’s precise location over time. This paper employs the framework of contextual integrity related to privacy developed by Nissenbaum (Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, Stanford, 2010) as a tool to understand citizen response to implementation IoT-related technology in the supermarket. The purpose of the study was to identify and understand specific changes in information practices brought about by the IoT that may be perceived as privacy violations. Citizens were interviewed, read a scenario of near-term IoT implementation, and were asked to reflect on changes in the key actors involved, information attributes, and principles of transmission. Areas where new practices may occur with the IoT were then highlighted as potential problems (privacy violations). Issues identified included the mining of medical data, invasive targeted advertising, and loss of autonomy through marketing profiles or personal affect monitoring. While there were numerous aspects deemed desirable by the participants, some developments appeared to tip the balance between consumer benefit and corporate gain. This surveillance power creates an imbalance between the consumer and the corporation that may also impact individual autonomy. The ethical dimensions of this problem are discussed.  相似文献   

15.
郦金花 《现代情报》2005,25(12):156-158
信息技术革命带来商业竞争情报战争,商业秘密作为知识产权的一种重要形式,越来越成为竞争者不正当竞争情报攫取的核心对象。本文通过介绍不正当竞争情报与商业秘密的涵义、异同点,阐述了我国企业保护商业秘密的途径。从而,为建立诚实信用的公平竞争市场秩序提供参考。  相似文献   

16.
隐私数据挖掘是数据挖掘的一个重要研究方向,它旨在研究在数据挖掘过程中如何保护私有的和敏感的数据不被泄露。文章阐述几种常用的隐私数据挖掘算法,分析它们的技术特点,文末对几种隐私数据挖掘技术进行总结与展望。  相似文献   

17.
祝娜  夏榆棋 《情报科学》2021,39(12):60-67
政府数据开放已经成为多学科交叉研究的热点。【目的/意义】为推进政府数据开放的降低公众隐私顾虑, 提高公众信息提供意愿。【方法/过程】本研究运用问卷调查法,同时采用相关性分析、逐步回归分析方法,从个体, 情境和平台三个层面剖析政府数据开放的公众隐私顾虑程度。【结果/结论】公众个人隐私保护教育经历越丰富,对 法律法规的满意度越高,对政府监管工作满意度越高,对政府数据开放平台的满意度越高,公众遭遇隐私侵犯经历 频率越低,其隐私顾虑程度越低。公众隐私顾虑程度越高,公众越注重保护隐私信息,公众信息披露意愿越低。【创 新/局限】本研究从公众视角出发,剖析公众隐私顾虑影响因素,探讨公众隐私顾虑对个人隐私信息提供意愿的作 用效果,从法律,监管,平台等层面,提出政府数据开放中公众隐私保护建议。  相似文献   

18.
随着我国互联网的高速发展,数据挖掘技术尤其是Web挖掘作为企业搜寻商业信息为客户提供个性化服务的重要手段,不可避免地触到隐私保护这块"雷区"。隐私权保护在网络环境下既是法律界同时也是电子商务研究的热点话题。隐私保护限制了web挖掘数据中数据的搜集及知识的共享和传播,如何在web挖掘和隐私保护之间进行权衡是文章研究的出发点。结合我国网络隐私权保护的现状,通过对隐私权的内容及可能造成侵权形式的研究,探讨了隐私保护面临的挑战,提出了隐私权保护的解决方案框架。  相似文献   

19.
This paper aims to provide new insights to debates on group privacy, which can be seen as part of a social turn in privacy scholarship. Research is increasingly showing that the classic individualistic understanding of privacy is insufficient to capture new problems in algorithmic and online contexts. An understanding of privacy as an “interpersonal boundary-control process” (Altman, The environment and social behavior, Brooks and Cole, Monterey, 1975) framing privacy as a social practice necessary to sustain intimate relationships is gaining ground. In this debate, my research is focused on what I refer to as “self-determined groups” which can be defined as groups whose members consciously and willingly perceive themselves as being part of a communicative network. While much attention is given to new forms of algorithmically generated groups, current research on group privacy fails to account for the ways in which self-determined groups are affected by changes brought about by new information technologies. In an explorative case study on self-organized therapy groups, I show how these groups have developed their own approach to privacy protection, functioning on the basis of social practices followed by all participants. This informal approach was effective in pre-digital times, but online, privacy threats have reached a new level extending beyond the scope of a group’s influence. I therefore argue that self-determined sensitive topic groups are left facing what I present as a dilemma: a tension between the seemingly irreconcilable need for connectivity and a low threshold, on the one hand, and the need for privacy and trust, on the other. In light of this dilemma, I argue that we need new sorts of political solutions.  相似文献   

20.
朱侯  张明鑫 《情报科学》2021,39(7):54-62
【目的/意义】在APP隐私泄露问题日趋严峻的环境下,移动应用提供的隐私设置功能为用户保护自身的隐 私信息提供了一种重要的途径,了解哪些因素会影响以及如何影响移动应用APP用户的隐私设置行为,有利于加 强用户个人隐私保护和改进隐私设置功能。【方法/过程】本研究基于保护动机理论与社会认知理论的基本思想,提 出七个条件变量并采用问卷调查法搜集数据,然后使用模糊集定性比较分析法对条件变量与用户隐私设置行为结 果变量之间的多元因果路径进行分析。【结果/结论】用户主体因素(感知风险、感知隐私控制、隐私关注和行为效 益)是用户隐私设置行为产生的必要条件;同时,用户隐私设置行为的条件组合路径包括了政策保障缺失型和隐私 泄露负面经历驱动型等五条不同路径。【创新/局限】研究问题和研究思路具有一定创新性,例如关注移动APP用户 隐私信息设置行为及其多元因果路径关系,但是也存在着研究变量数量较少,样本抽样方法值得改进等不足。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号