- Browse by Subject
Browsing by Subject "privacy"
Now showing 1 - 10 of 29
Results Per Page
Sort Options
Item Broadband and Health Care: Legal and Policy Issues with Personal Health Records (PHR)(2010-10-14) Hook, Sara Anne; Jones, JosetteThis session will discuss the security, privacy and accessibility of PHRs and how the 2009 ARRA stimulus provisions (HITECH Act) and the 2010 National Broadband Plan facilitate, hamper or leave gaps in the implementation of PHRs for managing health information. It will also highlight unsettled legal issues with PHRs and the impact of state and federal legislation and government agencies.Item Chapter 13: Intellectual Property Issues Raised by Email(2012) Hook, Sara Anne; Dossa, Aly; Smith, Michael B.Item Conceptualization and operationalization: utility of communication privacy management theory(Elsevier, 2020-02) Petronio, Sandra; Child, Jeffrey T.; Communication Studies, School of Liberal ArtsCommunication Privacy Management (CPM) theory explains one of the most important, yet challenging social processes in everyday life, that is, managing disclosing and protecting private information. The CPM privacy management system offers researchers, students, and the public a comprehensive approach to the complex and fluid character of privacy management in action. Following an overview of Communication Privacy Management framework, this review focuses on recent research utilizing CPM concepts that cross a growing number of contexts and illustrates the way people navigate privacy in action. Researchers operationalize the use of privacy rules and other core concepts that help describe and explain the ups and downs of privacy management people encounter.Item Do They Even Care? Measuring Instructor Value of Student Privacy in the Context of Learning Analytics(AIS, 2021) Jones, Kyle M. L.; VanScoy, Amy; Bright, Kawanna; Harding, Alison; Library and Information Science, School of Informatics and ComputingLearning analytics tools are becoming commonplace in educational technologies, but extant student privacy issues remain largely unresolved. It is unknown whether or not faculty care about student privacy and see privacy as valuable for learning. The research herein addresses findings from a survey of over 500 full-time higher education instructors. The findings detail faculty perspectives of their own privacy, students’ privacy, and the high degree to which they value both. Data indicate that faculty believe that privacy is important to intellectual behaviors and learning. This work reports initial findings of a multi-phase, grant-funded research project that will further uncover instructor views of learning analytics and its student privacy issues.Item Enhanced Internet Mobility and Privacy Using Public Cloud(Hindawi, 2017-06) Zhang, Ping; Durresi, Mimoza; Durresi, Arjan; Computer and Information Science, School of ScienceInternet mobile users are concerned more and more about their privacy nowadays as both researches and real world incidents show that leaking of communication and location privacy can lead to serious consequence, and many research works have been done to anonymize individual user from aggregated location data. However, just the communication itself between the mobile users and their peers or website could collect considerable privacy of the mobile users, such as location history, to other parties. In this paper, we investigated the potential privacy risk of mobile Internet users and proposed a scalable system built on top of public cloud services that can hide mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.Item Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning(ACM, 2019) Phillips, Tyler; Zou, Xukai; Li, Feng; Li, Ninghui; Computer and Information Science, School of ScienceIn recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based authentication systems. Though these systems demonstrate remarkable performance and have seen wide acceptance, they present unique and pressing security and privacy concerns. One proposed method which addresses these concerns is the elegant, fusion-based BioCapsule method. The BioCapsule method is provably secure, privacy-preserving, cancellable and flexible in its secure feature fusion design. In this work, we extend BioCapsule to face-based recognition. Moreover, we incorporate state-of-art deep learning techniques into a BioCapsule-based facial authentication system to further enhance secure recognition accuracy. We compare the performance of an underlying recognition system to the performance of the BioCapsule-embedded system in order to demonstrate the minimal effects of the BioCapsule scheme on underlying system performance. We also demonstrate that the BioCapsule scheme outperforms or performs as well as many other proposed secure biometric techniques.Item Excerpt from Chapter 13: Intellectual Property Issues Raised by Email(2011) Hook, Sara AnneItem Genetic Data Aren't So Special: Causes and Implications of Reidentification(Wiley, 2020-10-23) Kasperbauer, T.J.; Schwartz, Peter H.; Philosophy, School of Liberal ArtsGenetic information is widely thought to pose unique risks of reidentifying individuals. Genetic data reveals a great deal about who we are and, the standard view holds, should consequently be treated differently from other types of data. Contrary to this view, we argue that the dangers of reidentification for genetic and nongenetic data—including health, financial, and consumer information—are more similar than has been recognized. Before different requirements are imposed around sharing genetic information, proponents of the standard view must show that they are in fact necessary. We further argue that the similarities between genetic and nongenetic information have important implications for communicating risks during consent for health care and research. While patients and research participants need to be more aware of pervasive data-sharing practices, consent forms are the wrong place to provide this education. Instead, health systems should engage with patients throughout patient care to educate them about data-sharing practices.Item Implications of smartphone user privacy leakage from the advertiser’s perspective(Elsevier, 2019-02) Wang, Yan; Chen, Yingying; Ye, Fan; Liu, Hongbo; Yang, Jie; Computer Information and Graphics Technology, School of Engineering and TechnologyMany smartphone apps routinely gather various private user data and send them to advertisers. Despite recent study on protection mechanisms and analysis on apps’ behavior, the understanding of the consequences of such privacy losses remains limited. In this paper, we investigate how much an advertiser can infer about users’ social and community relationships. After one month’s user study involving about 190 most popular Android apps, we find that an advertiser can infer 90% of the social relationships. We further propose a privacy leakage inference framework and use real mobility traces and Foursquare data to quantify the consequences of privacy leakage. We find that achieving 90% inference accuracy of the social and community relationships requires merely 3 weeks’ user data. Finally, we present a real-time privacy leakage visualization tool that captures and displays the spatial–temporal characteristics of the leakages. The discoveries underscore the importance of early adoption of privacy protection mechanisms.Item Interpretations of Communication Experiences of Pharmaceutical-Sponsored Clinical Educators(2020-08) Barshinger, Timothy Allen; Bute, Jennifer J.; Matthias, Marianne; Petronio, Sandra G.; Jones, JosetteThis qualitative study explored the communication experiences of clinical educators who provide patient education on behalf of pharmaceutical company sponsors. It investigated how these educators navigate a medical encounter within the domain of three regulatory drivers—on-label compliance, fair-balance presentation, and adverse event reporting. The study used the ecological model of communication in medical encounters and the theory of Communication Privacy Management (CPM) as the lenses for interpreting the data. The main data were telephonic interviews with twenty-six clinical educators who delivered education services for pharmaceutical companies. Member checking, in the form of three post-interview focus groups, was also used. Seven themes emerged: (a) political/legal contexts factors greatly influenced clinical educators’ communication with patients; (b) the influence of factors within this contexts would frequently force educators to experience ethical dilemmas; (c) a new context, the disease and treatment context, emerged from the interviews as having significant influence in the conversation dynamics; (d) educators employed communication strategies to better navigate within the political/legal and disease and treatment context ecological factors; (e) educators believed they needed to establish and maintain trust throughout the engagement process for them to successfully solicit meaningful patient disclosures; (f) educators managed the information disclosed to them by patients using routinized rules as well as changing rules; and (g) educators managed multiple types of confidant roles with patients including stakeholder, deliberate, and reluctant. A main implication for this study is that educators feel ethically and morally bound to do whatever was necessary to avoid breaching the trust they established with patients. For some, this attitude prevailed over their obligation to deliver a compliant educational engagement. Hence, pharmaceutical companies need to recognize that for many of their clinical educators, the question of whether to be compliant is not a legal or policy matter. It is a moral and ethical issue. That being said, educators were also skilled at using communication strategies to navigate through the compliance and disease and treatment barriers that functioned as self-management barriers. Many of those skills often served to influence the way educators created privacy rules and managed privacy decisions related to their patient engagements.
- «
- 1 (current)
- 2
- 3
- »