5 research outputs found

    Privacy Protection in Tourism: Where We Are and Where We Should Be Heading For

    Get PDF
    The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism

    De-identification for privacy protection in multimedia content : A survey

    Get PDF
    This document is the Accepted Manuscript version of the following article: Slobodan Ribaric, Aladdin Ariyaeeinia, and Nikola Pavesic, ‘De-identification for privacy protection in multimedia content: A survey’, Signal Processing: Image Communication, Vol. 47, pp. 131-151, September 2016, doi: https://doi.org/10.1016/j.image.2016.05.020. This manuscript version is distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives License CC BY NC-ND 4.0 (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is properly cited, and is not altered, transformed, or built upon in any way.Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio-video surveillance. Each of these can potentially provide the means for privacy intrusion. De-identification is one of the main approaches to privacy protection in multimedia contents (text, still images, audio and video sequences and their combinations). It is a process for concealing or removing personal identifiers, or replacing them by surrogate personal identifiers in personal information in order to prevent the disclosure and use of data for purposes unrelated to the purpose for which the information was originally obtained. Based on the proposed taxonomy inspired by the Safe Harbour approach, the personal identifiers, i.e., the personal identifiable information, are classified as non-biometric, physiological and behavioural biometric, and soft biometric identifiers. In order to protect the privacy of an individual, all of the above identifiers will have to be de-identified in multimedia content. This paper presents a review of the concepts of privacy and the linkage among privacy, privacy protection, and the methods and technologies designed specifically for privacy protection in multimedia contents. The study provides an overview of de-identification approaches for non-biometric identifiers (text, hairstyle, dressing style, license plates), as well as for the physiological (face, fingerprint, iris, ear), behavioural (voice, gait, gesture) and soft-biometric (body silhouette, gender, age, race, tattoo) identifiers in multimedia documents.Peer reviewe

    Privacy protection and trust models

    No full text
    The SAITS project, a cooperation between SICS, Stockholm University and others, will investigate technical aspects of privacy protection. Trust models is one of the techniques be evaluated

    Privacy protection in tourism: Where we are and where we should be heading for

    No full text
    The link between information privacy concerns and privacy behaviours has been a focus of extensive investigation in various disciplines. However, little attention has been devoted to this issue in the tourism literature. Spurred by technological development and shaped by tourism-related environments, emerging privacy issues call for comprehensive yet context-specific studies to ensure tourists are making beneficial privacy choices. This paper first presents a comprehensive review of state-of-the-art research on privacy concerns and behaviours. Then, it suggests a list of overarching research priorities, merging social and technical aspects of privacy protection approaches as they apply to tourism. The priorities include research to measure tourists’ privacy concerns, explore specific biases in tourists’ privacy decisions, experiment with privacy nudges, and explore how to integrate privacy nudges in system design. Thus, this paper contributes to guiding the direction of future research on privacy protection in tourism

    Design and Evaluation of Anonymity Solutions for Mobile Networks

    No full text
    Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication. Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested. Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner
    corecore