6,475 research outputs found
Digital Food Marketing to Children and Adolescents: Problematic Practices and Policy Interventions
Examines trends in digital marketing to youth that uses "immersive" techniques, social media, behavioral profiling, location targeting and mobile marketing, and neuroscience methods. Recommends principles for regulating inappropriate advertising to youth
Enhanced 911 Technology and Privacy Concerns: How Has the Balance Changed Since September 11?
E911 technology allows for the location of a cellular phone to be determined by the wireless service provider within several hundred feet. As a consequence, privacy groups have been extremely resistant to the implementation of E911. In the wake of the September 11 tragedies, however, the balance between privacy concerns and national security seems to have changed for many American citizens. This iBrief will explore the nature of the E911 technology, the FCC implementation requirements, the concerns of privacy groups regarding its implementation, and how the environment surrounding E911 has changed since September 11
Evaluación del rendimiento de una solución de cupones electrónicos para dispositivos móviles
El comercio electrónico móvil (m-commerce) representa ya una importante área de negocio con grandes oportunidades para consumidores y comerciantes. Sin embargo, todavía existen escenarios que requieren mejoras en cuanto a eficiencia, como son los cupones electrónicos. La eficiencia y el rendimiento de estas soluciones suele medirse únicamente considerando el coste de las operaciones criptográficas o realizando pruebas de laboratorio en entornos limitados, muchas veces una única máquina para ejecutar todo el escenario de pruebas (incluyendo consumidores y comerciantes). En este artículo presentamos un análisis del rendimiento de una solución de cupones electrónicos, mediante la cual comprobamos que no es suficiente analizar únicamente la carga debido a las operaciones criptográficas, sino que también deben considerarse otros factores, como el efecto de la red.Este trabajo ha sido parcialmente financiado por el Ministerio de Educación y Ciencia bajo el proyecto CONSOLIDERARES (CSD2007-00004)
Anonymous Single-Sign-On for n designated services with traceability
Anonymous Single-Sign-On authentication schemes have been proposed to allow
users to access a service protected by a verifier without revealing their
identity which has become more important due to the introduction of strong
privacy regulations. In this paper we describe a new approach whereby anonymous
authentication to different verifiers is achieved via authorisation tags and
pseudonyms. The particular innovation of our scheme is authentication can only
occur between a user and its designated verifier for a service, and the
verification cannot be performed by any other verifier. The benefit of this
authentication approach is that it prevents information leakage of a user's
service access information, even if the verifiers for these services collude
which each other. Our scheme also supports a trusted third party who is
authorised to de-anonymise the user and reveal her whole services access
information if required. Furthermore, our scheme is lightweight because it does
not rely on attribute or policy-based signature schemes to enable access to
multiple services. The scheme's security model is given together with a
security proof, an implementation and a performance evaluation.Comment: 3
Synergistic user ↔ context analytics
Various flavours of a new research field on (socio-)physical or personal analytics have emerged, with the goal of deriving semanticallyrich insights from people’s low-level physical sensing combined with their (online) social interactions. In this paper, we argue for more comprehensive data sources, including environmental and application-specific data, to better capture the interactions between users and their context, in addition to those among users. We provide some example use cases and present our ongoing work towards a synergistic analytics platform: a testbed based on mobile crowdsensing and IoT, a data model for representing the different sources of data and their connections, and a prediction engine for analyzing the data and producing insights
Privacy Threats in E-Shopping (Position Paper)
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-29883-2_14E-shopping has grown considerably in the last years, providing
customers with convenience, merchants with increased sales, and
financial entities with an additional source of income. However, it may
also be the source of serious threats to privacy. In this paper, we review
the e-shopping process, discussing attacks or threats that have been analyzed
in the literature for each of its stages. By showing that there exist
threats to privacy in each of them, we argue our following position: “It is
not enough to protect a single independent stage, as is usually done in
privacy respectful proposals in this context. Rather, a complete solution
is necessary spanning the overall process, dealing also with the required
interconnections between stages.” Our overview also reflects the diverse
types of information that e-shopping manages, and the benefits (e.g.,
such as loyalty programs and fraud prevention) that system providers
extract from them. This also endorses the need for solutions that, while
privacy preserving, do not limit or remove these benefits, if we want
prevent all the participating entities from rejecting it.This work was supported by project S2013/ICE-3095-CM (CIBERDINE) of the Comunidad de Madrid and MINECO TIN2010-19607, TIN2012-30883, TIN2014-54580-R. The work of Seung Geol Choi was supported in part by the Office of Naval Research under Grant Number N0001415WX01232. The work of Moti Yung was done in part while visiting the Simons Institute for Theory of Computing, UC Berkeley. The work of Jesus Diaz was done in part while visiting the Network Security Lab at Columbia University
End-to-End Privacy for Open Big Data Markets
The idea of an open data market envisions the creation of a data trading
model to facilitate exchange of data between different parties in the Internet
of Things (IoT) domain. The data collected by IoT products and solutions are
expected to be traded in these markets. Data owners will collect data using IoT
products and solutions. Data consumers who are interested will negotiate with
the data owners to get access to such data. Data captured by IoT products will
allow data consumers to further understand the preferences and behaviours of
data owners and to generate additional business value using different
techniques ranging from waste reduction to personalized service offerings. In
open data markets, data consumers will be able to give back part of the
additional value generated to the data owners. However, privacy becomes a
significant issue when data that can be used to derive extremely personal
information is being traded. This paper discusses why privacy matters in the
IoT domain in general and especially in open data markets and surveys existing
privacy-preserving strategies and design techniques that can be used to
facilitate end to end privacy for open data markets. We also highlight some of
the major research challenges that need to be address in order to make the
vision of open data markets a reality through ensuring the privacy of
stakeholders.Comment: Accepted to be published in IEEE Cloud Computing Magazine: Special
Issue Cloud Computing and the La
- …