ScholarWorksIndianapolis
  • Communities & Collections
  • Browse ScholarWorks
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    or
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Subject

Browsing by Subject "privacy"

Now showing 1 - 10 of 29
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Broadband and Health Care: Legal and Policy Issues with Personal Health Records (PHR)
    (2010-10-14) Hook, Sara Anne; Jones, Josette
    This session will discuss the security, privacy and accessibility of PHRs and how the 2009 ARRA stimulus provisions (HITECH Act) and the 2010 National Broadband Plan facilitate, hamper or leave gaps in the implementation of PHRs for managing health information. It will also highlight unsettled legal issues with PHRs and the impact of state and federal legislation and government agencies.
  • Loading...
    Thumbnail Image
    Item
    Chapter 13: Intellectual Property Issues Raised by Email
    (2012) Hook, Sara Anne; Dossa, Aly; Smith, Michael B.
  • Loading...
    Thumbnail Image
    Item
    Conceptualization and operationalization: utility of communication privacy management theory
    (Elsevier, 2020-02) Petronio, Sandra; Child, Jeffrey T.; Communication Studies, School of Liberal Arts
    Communication Privacy Management (CPM) theory explains one of the most important, yet challenging social processes in everyday life, that is, managing disclosing and protecting private information. The CPM privacy management system offers researchers, students, and the public a comprehensive approach to the complex and fluid character of privacy management in action. Following an overview of Communication Privacy Management framework, this review focuses on recent research utilizing CPM concepts that cross a growing number of contexts and illustrates the way people navigate privacy in action. Researchers operationalize the use of privacy rules and other core concepts that help describe and explain the ups and downs of privacy management people encounter.
  • Loading...
    Thumbnail Image
    Item
    Do They Even Care? Measuring Instructor Value of Student Privacy in the Context of Learning Analytics
    (AIS, 2021) Jones, Kyle M. L.; VanScoy, Amy; Bright, Kawanna; Harding, Alison; Library and Information Science, School of Informatics and Computing
    Learning analytics tools are becoming commonplace in educational technologies, but extant student privacy issues remain largely unresolved. It is unknown whether or not faculty care about student privacy and see privacy as valuable for learning. The research herein addresses findings from a survey of over 500 full-time higher education instructors. The findings detail faculty perspectives of their own privacy, students’ privacy, and the high degree to which they value both. Data indicate that faculty believe that privacy is important to intellectual behaviors and learning. This work reports initial findings of a multi-phase, grant-funded research project that will further uncover instructor views of learning analytics and its student privacy issues.
  • Loading...
    Thumbnail Image
    Item
    Enhanced Internet Mobility and Privacy Using Public Cloud
    (Hindawi, 2017-06) Zhang, Ping; Durresi, Mimoza; Durresi, Arjan; Computer and Information Science, School of Science
    Internet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.
  • Loading...
    Thumbnail Image
    Item
    Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning
    (ACM, 2019) Phillips, Tyler; Zou, Xukai; Li, Feng; Li, Ninghui; Computer and Information Science, School of Science
    In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based authentication systems. Though these systems demonstrate remarkable performance and have seen wide acceptance, they present unique and pressing security and privacy concerns. One proposed method which addresses these concerns is the elegant, fusion-based BioCapsule method. The BioCapsule method is provably secure, privacy-preserving, cancellable and flexible in its secure feature fusion design. In this work, we extend BioCapsule to face-based recognition. Moreover, we incorporate state-of-art deep learning techniques into a BioCapsule-based facial authentication system to further enhance secure recognition accuracy. We compare the performance of an underlying recognition system to the performance of the BioCapsule-embedded system in order to demonstrate the minimal effects of the BioCapsule scheme on underlying system performance. We also demonstrate that the BioCapsule scheme outperforms or performs as well as many other proposed secure biometric techniques.
  • Loading...
    Thumbnail Image
    Item
    Excerpt from Chapter 13: Intellectual Property Issues Raised by Email
    (2011) Hook, Sara Anne
  • Loading...
    Thumbnail Image
    Item
    Genetic Data Aren't So Special: Causes and Implications of Reidentification
    (Wiley, 2020-10-23) Kasperbauer, T.J.; Schwartz, Peter H.; Philosophy, School of Liberal Arts
    Genetic information is widely thought to pose unique risks of reidentifying individuals. Genetic data reveals a great deal about who we are and, the standard view holds, should consequently be treated differently from other types of data. Contrary to this view, we argue that the dangers of reidentification for genetic and nongenetic data—including health, financial, and consumer information—are more similar than has been recognized. Before different requirements are imposed around sharing genetic information, proponents of the standard view must show that they are in fact necessary. We further argue that the similarities between genetic and nongenetic information have important implications for communicating risks during consent for health care and research. While patients and research participants need to be more aware of pervasive data-sharing practices, consent forms are the wrong place to provide this education. Instead, health systems should engage with patients throughout patient care to educate them about data-sharing practices.
  • Loading...
    Thumbnail Image
    Item
    Implications of smartphone user privacy leakage from the advertiser’s perspective
    (Elsevier, 2019-02) Wang, Yan; Chen, Yingying; Ye, Fan; Liu, Hongbo; Yang, Jie; Computer Information and Graphics Technology, School of Engineering and Technology
    Many smartphone apps routinely gather various private user data and send them to advertisers. Despite recent study on protection mechanisms and analysis on apps’ behavior, the understanding of the consequences of such privacy losses remains limited. In this paper, we investigate how much an advertiser can infer about users’ social and community relationships. After one month’s user study involving about 190 most popular Android apps, we find that an advertiser can infer 90% of the social relationships. We further propose a privacy leakage inference framework and use real mobility traces and Foursquare data to quantify the consequences of privacy leakage. We find that achieving 90% inference accuracy of the social and community relationships requires merely 3 weeks’ user data. Finally, we present a real-time privacy leakage visualization tool that captures and displays the spatial–temporal characteristics of the leakages. The discoveries underscore the importance of early adoption of privacy protection mechanisms.
  • Loading...
    Thumbnail Image
    Item
    Interpretations of Communication Experiences of Pharmaceutical-Sponsored Clinical Educators
    (2020-08) Barshinger, Timothy Allen; Bute, Jennifer J.; Matthias, Marianne; Petronio, Sandra G.; Jones, Josette
    This qualitative study explored the communication experiences of clinical educators who provide patient education on behalf of pharmaceutical company sponsors. It investigated how these educators navigate a medical encounter within the domain of three regulatory drivers—on-label compliance, fair-balance presentation, and adverse event reporting. The study used the ecological model of communication in medical encounters and the theory of Communication Privacy Management (CPM) as the lenses for interpreting the data. The main data were telephonic interviews with twenty-six clinical educators who delivered education services for pharmaceutical companies. Member checking, in the form of three post-interview focus groups, was also used. Seven themes emerged: (a) political/legal contexts factors greatly influenced clinical educators’ communication with patients; (b) the influence of factors within this contexts would frequently force educators to experience ethical dilemmas; (c) a new context, the disease and treatment context, emerged from the interviews as having significant influence in the conversation dynamics; (d) educators employed communication strategies to better navigate within the political/legal and disease and treatment context ecological factors; (e) educators believed they needed to establish and maintain trust throughout the engagement process for them to successfully solicit meaningful patient disclosures; (f) educators managed the information disclosed to them by patients using routinized rules as well as changing rules; and (g) educators managed multiple types of confidant roles with patients including stakeholder, deliberate, and reluctant. A main implication for this study is that educators feel ethically and morally bound to do whatever was necessary to avoid breaching the trust they established with patients. For some, this attitude prevailed over their obligation to deliver a compliant educational engagement. Hence, pharmaceutical companies need to recognize that for many of their clinical educators, the question of whether to be compliant is not a legal or policy matter. It is a moral and ethical issue. That being said, educators were also skilled at using communication strategies to navigate through the compliance and disease and treatment barriers that functioned as self-management barriers. Many of those skills often served to influence the way educators created privacy rules and managed privacy decisions related to their patient engagements.
  • «
  • 1 (current)
  • 2
  • 3
  • »
About IU Indianapolis ScholarWorks
  • Accessibility
  • Privacy Notice
  • Copyright © 2025 The Trustees of Indiana University