Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013
…
2 pages
1 file
While a number of data privacy techniques have been proposed in the recent years, a few frameworks have been suggested for the implementation of the data privacy process. Most of the proposed approaches are tailored towards implementing a specific data privacy algorithm but not the overall data privacy engineering and design process. Therefore, as a contribution, this study proposes SIED (Specification, Implementation, Evaluation, and Dissemination), a conceptual framework that takes a holistic approach to the data privacy engineering procedure by looking at the specifications, implementation, evaluation, and finally, dissemination of the privatized datasets.
Indonesian Journal of Electrical Engineering and Computer Science, 2024
Data sharing and publication have been popular in recent years due to the abundance of options. Evaluating and extracting data from sizable valuable databases i.e., data mining has various challenges which include issues with security, privacy, and data integrity. Anonymized data is used in the majority of privacy preserving data publication approaches, depending on a few utilitarian measures. However, applications that have particular needs for the data they utilize might not be able to use the anonymized data. Practical data anonymization must work to accomplish two opposing objectives: to maintain the data's usefulness and to satisfy a specific privacy need. The utility loss when data is anonymized is frequently measured using generic utility metrics, such as the specific values generalized in a specific ontology. As a need for an application, we suggest equivalent specification, a technique that enables a data user to characterize some properties of the anonymized data. We also introduce the "split-and-mould" algorithm, a heuristic anonymization algorithm that applies a generalization method to the user-provided parameters. Our preliminary results indicate that the specification format and procedure can improve significantly the utility of the anonymized data for data mining that develop predictive models, like decision trees (DTs) and Naïve Bayes.
2015 IEEE Security and Privacy Workshops, 2015
Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software. However, on the technical plane, a profusion of privacy-oriented guidelines and approaches coexists, which provides partial solutions to the overall problem and aids engineers during different stages of the system development lifecycle. As a result, engineers find difficult to understand what they should do to make their systems abide by privacy by design, thus hindering the adoption of privacy engineering practices. This paper reviews existing best practices in the analysis and design stages of the system development lifecycle, introduces a systematic methodology for privacy engineering that merges and integrates them, leveraging their best features whilst addressing their weak points, and describes its alignment with current standardization efforts.
2024
The Data Privacy Vocabulary (DPV), developed by the W3C Data Privacy Vocabularies and Controls Community Group (DPVCG), enables the creation of machine-readable, interoperable, and standardsbased representations for describing the processing of personal data. The group has also published extensions to the DPV to describe specific applications to support legislative requirements such as the EU's GDPR. The DPV fills a crucial niche in the state of the art by providing a vocabulary that can be embedded and used alongside other existing standards such as W3C ODRL, and which can be customised and extended for adapting to specifics of use-cases or domains. This article describes the version 2 iteration of the DPV in terms of its contents, methodology, current adoptions and uses, and future potential. It also describes the relevance and role of DPV in acting as a common vocabulary to support various regulatory (e.g. EU's DGA and AI Act) and community initiatives (e.g. Solid) emerging across the globe.
2015
This report contributes to bridging the gap between the legal framework and the available technological implementation measures by providing an inventory of existing approaches, privacy design strategies, and technical building blocks of various degrees of maturity from research and development. Starting from the privacy principles of the legislation, important elements are presented as a first step towards a design process for privacy-friendly systems and services. The report sketches a method to map legal obligations to design strategies, which allow the system designer to select appropriate techniques for implementing the identified privacy requirements. Furthermore, the report reflects limitations of the approach. It concludes with recommendations on how to overcome and mitigate these limits.
2014
While a number of agent-based software engineering frameworks have been proposed in the recent years, a few have been suggested specifically for the data privacy procedure. Yet still, one of the challenges in designing agent-based data privacy frameworks is that the very definition of privacy remains ambiguous and a case-by-case approach would have to be adopted. Therefore, as a contribution, we take a look at the literature on agent-based software engineering and present SIED (Specifications, Implementation, Evaluation, Dissemination), a conceptual framework that takes a holistic approach to the data privacy engineering process by looking at the Specifications, Implementation, Evaluation, and finally, Dissemination of the privatized datasets by autonomous intelligent agents.
IEEE Transactions on Software Engineering, 2009
In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline's topics. First, we discuss privacy requirements grounded in both historic and contemporary perspectives on privacy. We use a three-layer model of user privacy concerns to relate them to system operations (data transfer, storage, and processing) and examine their effects on user behavior. In the second part of this paper, we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." The privacy-bypolicy approach focuses on the implementation of the notice and choice principles of fair information practices, while the privacy-byarchitecture approach minimizes the collection of identifiable personal data and emphasizes anonymization and client-side data storage and processing. We discuss both approaches with a view to their technical overlaps and boundaries as well as to economic feasibility. This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.
2009
Privacy has become increasingly important to the database community which is reflected by a noteworthy increase in research papers appearing in the literature. While researchers often assume that their definition of “privacy” is universally held by all readers, this is rarely the case; so many papers addressing key challenges in this domain have actually produced results that do not consider the same problem, even when using similar vocabularies. This paper provides an explicit definition of data privacy suitable for ongoing work in data repositories such as a DBMS or for data mining. The work contributes by briefly providing the larger context for the way privacy is defined legally and legislatively but primarily provides a taxonomy capable of thinking of data privacy technologically. We then demonstrate the taxonomy’s utility by illustrating how this perspective makes it possible to understand the important contribution made by researchers to the issue of privacy. The conclusion of this paper is that privacy is indeed multifaceted so no single current research effort adequately addresses the true breadth of the issues necessary to fully understand the scope of this important issue.
Beat one's self up: tự trách mình (khi dùng, thay one's self bằng mysel, yourself, himself, herself...) Break down: bị hư Break in: đột nhập vào nhà Break up with s.o: chia tay người yêu, cắt đứt quan hệ tình cảm với ai đó Bring s.th up: đề cập chuyện gì đó Bring s.o up: nuôi nấng (con cái) Brush up on s.th: ôn lại Call for sth: cần cái gì đó; Call for s.o : kêu người nào đó, cho gọi ai đó, yêu cầu gặp ai đó Carry out: thực hiện (kế hoạch) Catch up with s.o: theo kịp ai đó Check in: làm thủ tục vào khách sạn Check out: làm thủ tục ra khách sạn Check sth out: tìm hiểu, khám phá cái gì đó Clean s.th up: lau chùi Come across as: có vẻ (chủ ngữ là người) Come off: tróc ra, sút ra Come up against s.th: đối mặt với cái gì đó Come up with: nghĩ ra Cook up a story: bịa đặt ra 1 câu chuyện Cool down: làm mát đi, bớt nóng, bình tĩnh lại (chủ ngữ có thể là người hoặc vật) Count on s.o: tin cậy vào người nào đó Cut down on s.th: cắt giảm cái gì đó Cut off: cắt lìa, cắt trợ giúp tài chính Do away with s.th: bỏ cái gì đó đi không sử dụng cái gì đó Do without s.th: chấp nhận không có cái gì đó Dress up: ăn mặc đẹp Drop by: ghé qua
2.3. Resultados abstractos para formulaciones variacionales . . . . . . . . . . . . . 9 3. M´etodo de Ritz-Galerkin,10 4. Espacios de elementos finitos,11
International Journal for Multidisciplinary Research (IJFMR), 2024
AI in fraud detection and financial risk management has taken this role of prevention and combating fraud closely related to organizations and the losses they incur a next level. This paper aims to discuss the use of artificial intelligence models in the process of detecting frauds and preventing and reducing financial risks in such markets as banking, insurance, and fintech. Today, through machine learning algorithms, deep learning techniques, and data analysis, the AI improves the speed, accuracy and effectiveness of fraud detection. This paper discusses the current AI models and business use incorporating the success story and the business outcomes which has encountered sometime to have the best result. Furthermore, the paper examines other important issues of AI application management such as data security and liberation, and complete fairness control. Using examples as well as statistical data in this AI for business article, we show how corporations have managed to minimize their risks while lowering their expenses with the use of artificial intelligence technology. This research outlines ideas on how organizations can implement AI into fraud detection systems and what can be done in future to enhance the solutions. This paper adds to the emerging body of knowledge on AI's impact on finance and security, and demonstrates AI's ability to influence the future of the industry.
Psicoperspectivas. Individuo y Sociedad, 2016
Scientific Contributions Oil and Gas, 2020
Journal of Archaeological Science, 2020
Optics express, 2013
EXPLORE: The Journal of Science and Healing, 2007
International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 2024
2020, Daat: A Journal of Jewish Philosophy and Kabbalah, 2020
Emirates Journal of Food and Agriculture, 2017
Chemical Physics Letters, 2004
Acta Ophthalmologica, 2009
Pesquisa Agropecuaria Brasileira, 2000
Biomedicines, 2023
Indian Journal of Pharmacy Practice, 2012