勋章 发表于 2025-3-25 07:08:10

http://reply.papertrans.cn/43/4294/429366/429366_21.png

coagulation 发表于 2025-3-25 08:54:45

http://reply.papertrans.cn/43/4294/429366/429366_22.png

下垂 发表于 2025-3-25 13:38:01

Introduction to Human Privacy in Virtual and Physical Worlds,nspire privacy researchers to broaden their research perspectives beyond the limitations of a single disciplinary lens. This introductory chapter sets up the tripartite structure for the entire book: foundations of human privacy, technical views on privacy, and domain-specific views of privacy. In a

Anonymous 发表于 2025-3-25 16:56:14

http://reply.papertrans.cn/43/4294/429366/429366_24.png

Isthmus 发表于 2025-3-25 23:49:41

What’s So Special About Private Parts? How Anthropology Questions the Public–Private Dichotomyience varies enormously. Privacy is not an objective, consistent quality of an activity or situation, because privacy is always rooted in the specific socio-economic structures of each society. It is not a case of societies and groups being more private than others, but having contrasting views on w

Tailor 发表于 2025-3-26 02:10:14

Privacy in the Digital Age: Navigating the Risks and Benefits of Cybersecurity Measurespotential attacks, discusses relevant standards, and offers concluding remarks. Privacy differs from cybersecurity because individuals control the policy. The dynamic protections apply through user consent, data labeling, and contextual access management. We explore how systems align privacy control

bonnet 发表于 2025-3-26 07:56:59

Data Governance, Privacy, and Ethicsurces (private, public, and government data bases; the web, etc.), understanding data governance, privacy, and ethics surrounding the availability and use of data is more important than ever. Nearly every day, new data breaches by and effecting individuals and organizations come to light. Nearly eve

faultfinder 发表于 2025-3-26 11:48:34

Web2 Versus Web3 Information Privacy: An Information Systems Discipline Perspectivelars are concerned with . and have discovered that individuals have serious information privacy concerns. These concerns, however, do not prevent individuals from disclosing personal identifiable information (PII) with centralized platform providers, a phenomenon called the .. We highlight four comm

键琴 发表于 2025-3-26 15:21:18

Multi-party Computation: Privacy in Coopetition) empowers users to select their friends. Privacy environments often approach privacy as a binary property, but MPC offers more privacy granularity, a choice of when to participate, and the ability to initiate a session with a selection of peers. Also, privacy protection occurs at a transaction leve

猛击 发表于 2025-3-26 17:01:30

Zero-Knowledge Proofs and Privacy: A Technical Look at Privacypeople and companies from various parts of the planet. Zero-Knowledge (ZK) technology is a powerful enabler of this trust. It allows a person to demonstrate they know something, have something, or can do something without revealing the actual information or process. We describe the fundamental conce
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Human Privacy in Virtual and Physical Worlds; Multidisciplinary Pe Mary C. Lacity,Lynda Coon Book‘‘‘‘‘‘‘‘ 2024 The Editor(s) (if applicable