17,219 research outputs found

    Preserve data-while-sharing: An Efficient Technique for Privacy Preserving in OSNs

    Get PDF
    Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationships, sharing personal experiences, and providing other services. Rapid growth in Social Network has attracted various groups like the scientific community and business enterprise to use these huge social network data to serve their various purposes. The process of disseminating extensive datasets from online social networks for the purpose of conducting diverse trend analyses gives rise to apprehensions regarding privacy, owing to the disclosure of personal information disclosed on these platforms. Privacy control features have been implemented in widely used online social networks (OSNs) to empower users in regulating access to their personal information. Even if Online Social Network owners allow their users to set customizable privacy, attackers can still find out users’ private information by finding the relationships between public and private information with some background knowledge and this is termed as inference attack. In order to defend against these inference attacks this research work could completely anonymize the user identity. This research work designs an optimization algorithm that aims to strike a balance between self-disclosure utility and their privacy. This research work proposes two privacy preserving algorithms to defend against an inference attack. The research work design an Privacy-Preserving Algorithm (PPA) algorithm which helps to achieve high utility by allowing users to share their data with utmost privacy. Another algorithm-Multi-dimensional Knapsack based Relation Disclosure Algorithm (mdKP-RDA) that deals with social relation disclosure problems with low computational complexity. The proposed work is evaluated to test the effectiveness on datasets taken from actual social networks. According on the experimental results, the proposed methods outperform the current methods. &nbsp

    Opportunity Creation in Innovation Networks: Interactive Revealing Practices

    Get PDF
    Innovating in networks with partners that have diverse knowledge is challenging. The challenges stem from the fact that the commonly used knowledge protection mechanisms often are neither available nor suitable in early stage exploratory collaborations. This article focuses on how company participants in heterogeneous industry networks share private knowledge while protecting firm-specific appropriation. We go beyond the prevailing strategic choice perspectives to discuss interactive revealing practices that sustain joint opportunity creation in the fragile phase of early network formation.Center for Business, Technology and La

    Invisible Dis/abilities: To Disclose or Not Disclose?

    Get PDF
    Approximately 56.7 million people currently live with a disability in the United States (United States Census Bureau, 2012). Many of these disabilities are invisible to others, which make disclosure necessary to gain support. Through the analysis of open-ended questionnaires, I investigated disclosure decision-making factors and outcomes for individuals living with invisible disabilities. Factors considered for disclosure included: (a) support; (b) fear of negative response; (c) perceived appropriateness; and (d) no choice or perceived obligation. Disclosure outcomes included: (a) relief; (b) closeness in relationship; (c) loss of relationship; (d) differential treatment; and (e) no change or negative outcome. Theoretically, the findings help extend our understanding of the Revelation Risk Model (Afifi & Steuber, 2009) in terms of the disclosure process for people living with IDs. Additionally, I explore practical implications for better supporting those with IDs through the disclosure process

    Adult children of alcoholics\u27 perceptions of communicative exchanges with family members and outsiders

    Get PDF
    Millions of children grow up in alcoholic homes. For these children, their lives are changed forever. As a result of being socialized in a home in which at least one parent is an alcoholic, the children suffer with a number of negative consequences. Children of alcoholics (COAs) have cognitive difficulty and often do not excel in scholastic endeavors. It is also difficult for COAs to form lasting relationships with others outside the family. Because they are often socialized in a home in which secrecy is advocated, creating relationships and fully disclosing about experiences proves to be challenging. As a result, COAs often experience lowered levels of relationship trust and satisfaction. Thus, COAs have difficulties forming meaningful relationships in which they can disclose about their experiences and do not, as a consequence, experience the benefits of social support. The present study used a Communication Privacy Management (CPM) Theory framework to understand how COAs control access to their private information. I examined COAs\u27 relationships, what information they reveal, why they reveal the information they do, and to whom information is then revealed. Using qualitative data collection methods, I conducted 20 interviews with COAs who had an alcoholic father or stepfather. Interviews lasted approximately 90 minutes. All interviews were guided by questions grounded in CPM. CPM maintains that individuals own private information. As a result of this ownership, individuals make careful decisions about how to give others access to the information. Private information can thus be thought of as a commodity with individuals granting access. Results of the interviews indicated that COAs (a) developed privacy rules for access based on motivation and context, (b) were socialized in homes in which secrecy is advocated, (c) experienced trigger events that alter their privacy rules, (d) shared information with family and non-family members, (e) told others a set of standby stories, (f) did not have explicit discussions with confidants about what can be done with the information, and (g) did not experience boundary turbulence as a result of sharing. Overall, COAs carefully considered the types of information they revealed to individuals

    Routes for breaching and protecting genetic privacy

    Full text link
    We are entering the era of ubiquitous genetic information for research, clinical care, and personal curiosity. Sharing these datasets is vital for rapid progress in understanding the genetic basis of human diseases. However, one growing concern is the ability to protect the genetic privacy of the data originators. Here, we technically map threats to genetic privacy and discuss potential mitigation strategies for privacy-preserving dissemination of genetic data.Comment: Draft for comment

    An ecological approach on the role of nondisclosure in urban African American youth exposed to community violence: using mediation and moderated mediation approaches

    Get PDF
    African American youth residing in high risk neighborhoods, characterized by violence, crime, and poverty have been shown to be at increased risk for exposure to violence and psychological symptoms, and there has been little investigation of mediating processes that might explain these association. Due to the poor current state of mental health of low income ethnic minority youth, it is important to investigate the role of nondisclosure as a risk factor affecting psychological outcomes in urban African American adolescents from high risk neighborhoods. Nondisclosure among urban African American adolescents from neighborhoods affected by violence is associated with adverse psychological outcomes and can serve as a barrier to adult intervention and protection. Strong relationships with parents and/or extended family and community member may promote disclosure and better psychological adjustment, and buffer the adverse effects of violence experience by adolescents. This study tested conceptual models in which adolescents\u27 nondisclosure to adults mediates the relation between community exposure to violence (CETV) and internalizing and externalizing symptoms. In addition, moderated mediation analysis were conducted in order to test the hypotheses that parent-child attachment and social support from extended kin and non-kin adults would attenuate the hypothesized relations among variables proposed in the mediation models. Structural equation modeling was used to conduct mediation and moderated mediation analysis. SEM analysis revealed that nondisclosure fully mediated the relation between CETV and internalizing symptoms, and partially mediated the relation between CETV and externalizing symptoms. However, calculation of decomposition of total effects, revealed that nondisclosure did not fully account for the relation between CETV and internalizing symptoms. Results of moderated mediation path analysis suggested that parent-child attachment and social support did not moderate the mediating role of nondisclosure between CETV and internalizing and externalizing symptoms. This research provides empirical support regarding the role of nondisclosure in urban African American adolescents. Particularly, this study revealed the disadvantages of adolescents\u27 nondisclosure to adults, and provided insight about development and relationship factors influencing adolescent\u27s nondisclosure to adults. The findings from this study have implications for intervention and prevention programs aimed to improve adolescent and adult communications and to minimize the effects of CETV

    An ecological perspective on the role of nondisclosure in urban african american adolescents exposed to community violence: Using mediation and moderated mediation approaches

    Get PDF
    The present study examines Community Exposure to Violence, Nondisclosure, Parent- Child Attachment, and Social Support, as potential risk and protective factors in a school-based sample of urban African American adolescents. This study also presents an ecological perspective on the role of Nondisclosure in urban African American early adolescents. The Ecological Systems Theory (Bronfenbrenner, 1979) examines a child’s development within the context of systems of relationships that form his or her environment, such as the microsystem (i.e., a system in which the adolescent has direct contact). Particularly, this study tested conceptual models in which adolescents’ nondisclosure to adults (a microsystem occuring at the interpersonal level between adolescents and parents and/or adults) mediates the relation between Community Exposure to Violence (an exosystem system occuring at the environmental level) and psychological symptoms. In addition, moderated mediation analyses were conducted, to determine if the following microsystems, Parent-Child Attachment, and Social Support (from extended kinship and/or non-kinship adults in the neighborhood) are potential protective factors, which are expected to attenuate Nondisclosure mediating the relation between Community Exposure to Violence and Internalizing and Externalizing Symptoms

    Cybersecurity Safeguards: What Cybersecurity Safeguards Could Have Prevented the Intelligence/Data Breach by a Member of the Air National Guard

    Get PDF
    Jack Teixeira, a 21-year-old IT specialist Air National Guard found himself on the wrong side of the US law after sharing what is considered classified and extremely sensitive information about USA\u27s operations and role in Ukraine and Russia war. Like other previous cases of leakage of classified intelligence, the case of Teixeira raises concerns about the weaknesses and vulnerability of federal agencies\u27 IT systems and security protocols governing accessibility to classified documents. Internal leakages of such classified documents hurt national security and can harm the country, especially when such secretive intelligence finds its way into the hands of enemies. Unauthorized disclosure of secretive documents and information is a result of rarely noticeable insider threats. Addressing such threats requires highly sophisticated technology such as Zero Trust Architecture based on multi-authentication and continuous monitoring of the behaviors of users of the IT system. A Zero Trust Architecture (ZTA) is recommended as the best solution to assist federal agencies and departments such as the Air National Guard in curbing unauthorized disclosure of intelligence with significant harm to national security. This solution is based on multi-authentication and authorization of users, devices, applications, networks, and links before accessing or using an IT system. Therefore, for the agency, implementing ZTA will offer it an identity-centered access control and continuous monitoring of the behaviors of users to identify anomalies and other suspicious activities that can contribute to leaking classified intelligence. ZTA is the best solution in these federal agencies because despite individuals having security clearance to classified information, they will still be required to be validated, authenticated, and authorized before accessing the systems and other Sensitive Compartmented Information Storage (SCIS). Apart from multiple-authentication, behavioral analytics will be used to analyze and monitor their actions and behaviors while interacting with IT systems and sensitive data storage areas

    R&D openness configuration - the role of appropriability, competence level and culture

    Get PDF
    • …
    corecore