Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computing Milieux (K) > Computers And Society (K.4) > Public Policy Issues (K.4.1) > Privacy (K.4.1...)  
 
Options:
 
  1-10 of 225 Reviews about "Privacy (K.4.1...)": Date Reviewed
  Android platform-based individual privacy information protection system
Zhang W., Li X., Xiong N., Vasilakos A.  Personal and Ubiquitous Computing 20(6): 875-884, 2016. Type: Article

I’m not impressed by this paper. On one hand, the remote short message service (SMS) command feature it describes sounds potentially useful. On the other hand, remote commands are not new and do not constitute a “privacy information pr...

Nov 7 2017
  Data protection and privacy: (in)visibilities and infrastructures
Leenes R., van Brakel R., Gutwirth S., De Hert P.,  Springer International Publishing, New York, NY, 2017. 295 pp. Type: Book (978-3-319507-95-8)

This work was selected from materials presented at the 9th International Conference on Computers, Privacy, and Data Protection, held in Brussels in January 2016. The ten chapters were selected from the 80 panels and 343 speakers who presented at t...

Oct 25 2017
  Fog computing for the Internet of Things: security and privacy issues
Alrawais A., Alhothaily A., Hu C., Cheng X.  IEEE Internet Computing 21(2): 34-42, 2017. Type: Article

Connecting everything to the Internet is attractive because it can bring efficiency and convenience in many areas. However, security and privacy issues can also occur. The problem is that it is difficult to apply existing security and privacy solu...

Sep 7 2017
  The European Union as guardian of Internet privacy: the story of Art 16 TFEU
Hijmans H.,  Springer International Publishing, New York, NY, 2016. 604 pp. Type: Book (978-3-319340-89-0)

The European Union (EU) treats data protection and personal privacy as fundamental rights, unlike the US. Any business operating in Europe must understand a number of privacy-related treaties and directives, including Article 16. Article 16(1) rea...

Mar 23 2017
  Practical approximate k-nearest neighbor queries with location and query privacy
Yi X., Paulet R., Bertino E., Varadharajan V.  IEEE Transactions on Knowledge and Data Engineering 28(6): 1546-1559, 2016. Type: Article

Location-based services (LBS) have been used as a Trojan horse to reveal users’ private data. Since they run on mobile applications, individuals can share real-time and historical location information online....

Sep 20 2016
  Taking back control of privacy: a novel framework for preserving cloud-based firewall policy confidentiality
Kurek T., Niemiec M., Lason A.  International Journal of Information Security 15(3): 235-250, 2016. Type: Article

Would you intentionally make your firewall leak packets that are supposed to be blocked? This paper presents an interesting argument for when this might be desired....

Sep 12 2016
   Safeguarding users’ sensitive data in the cloud and the browser
Brad Karp. YouTube, 00:53:52, published on May 4, 2016, The Alan Turing Institute, https://www.youtube.com/watch?v=vws4xF6gXmU. Type: Video

In this 54-minute video presentation, Brad Karp of University College London talks about “safeguarding users’ sensitive data in the cloud and the browser.” The title is very inviting to those who want to know how to protect sensi...

Sep 6 2016
  Digital alienation as the foundation of online privacy concerns
Dainow B.  ACM SIGCAS Computers and Society 45(3): 109-117, 2015. Type: Article

The issue of digital alienation, or alienation online, is discussed in this paper, specifically in terms of the Marxist concept of alienation, historically based on the realm of the factory, where labor activity is “coerced into alienated fo...

Aug 1 2016
  Privacy protection for preventing data over-collection in smart city
Li Y., Dai W., Ming Z., Qiu M.  IEEE Transactions on Computers 65(5): 1339-1350, 2016. Type: Article

The personal devices (and apps) we carry around have the ability to collect lots of data from and about us. Some of this data is useful for personal productivity, while some borders on the verge of over-collection and possible privacy intrusion. T...

Jul 22 2016
  Anonymizing mobility data using semantic cloaking
Barak O., Cohen G., Toch E.  Pervasive and Mobile Computing 28(C): 102-112, 2016. Type: Article

Outside of a sci-fi reference, semantic cloaking is an approach for obscuring a user’s location and ensuring identity anonymity while still supporting many online location services. With increased and harmful data breaches, this approach can...

Jul 20 2016
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy