首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
随着智慧医疗的不断发展与普及,RFID作为其重要技术所引发的安全与隐私问题越来越突出,但目前国内缺乏针对具体安全与隐私威胁的保护方案。首先从一般到特殊分析智慧医疗中RFID安全与隐私风险,然后分析了RFID技术中的伦理及法律,最后比较目前RFID安全防护技术的优缺点与美国、欧盟等国际上对RFID安全与隐私的保障实践。得出RFID安全与隐私全生命周期保护模型SRCE,并对模型中的各个阶段进行了详细说明,可作为政府、医院或相关部门开展 RFID安全与隐私保护的参考和借鉴。  相似文献   

2.
This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.  相似文献   

3.
The implementation of digital contact tracing applications around the world to help reduce the spread of the COVID-19 pandemic represents one of the most ambitious uses of massive-scale citizen data ever attempted. There is major divergence among nations, however, between a “privacy-first” approach which protects citizens’ data at the cost of extremely limited access for public health authorities and researchers, and a “data-first” approach which stores large amounts of data which, while of immeasurable value to epidemiologists and other researchers, may significantly intrude upon citizens’ privacy. The lack of a consensus on privacy protection in the contact tracing process creates risks of non-compliance or deliberate obfuscation from citizens who fear revealing private aspects of their lives – a factor greatly exacerbated by recent major scandals over online privacy and the illicit use of citizens’ digital information, which have heightened public consciousness of these issues and created significant new challenges for any collection of large-scale public data. While digital contact tracing for COVID-19 remains in its infancy, the lack of consensus around best practices for its implementation and for reassuring citizens of the protection of their privacy may already have impeded its capacity to contribute to the pandemic response.  相似文献   

4.
形式化构建了在多用户环境和随机数复用多用户环境下的匿名性安全模型,并证明了其安全性;同时提出了2种针对匿名性的可复制测试.基于这些结果,构造了一个通用的密文长度缩短的匿名广播加密算法.  相似文献   

5.
电子政府信息公开隐私权保护制度   总被引:1,自引:0,他引:1  
隐私信息是政府信息公开的例外,但有时政府信息公开又在无形中侵害公民隐私权。公民既要保护自己的隐私权,免受他人获取、公开和传播隐私信息,又希望政府信息全面公开,以充分保障自己的知情权。尤其在人们越来越注重保护个人隐私权的数字时代。因此,政府机关在公开政府信息的同时,如何能够做到既合理公开政府信息又保护公民的隐私权就值得思考。  相似文献   

6.
Remote data integrity checking is of great importance to the security of cloud-based information systems. Previous works generally assume a trusted third party to oversee the integrity of the outsourced data, which may be invalid in practice. In this paper, we utilize the blockchain to construct a novel privacy-preserving remote data integrity checking scheme for Internet of Things (IoT) information management systems without involving trusted third parties. Our scheme leverages the Lifted EC-ElGamal cryptosystem, bilinear pairing, and blockchain to support efficient public batch signature verifications and protect the security and data privacy of the IoT systems. The results of the experiment demonstrate the efficiency of our scheme.  相似文献   

7.
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The influential Chinese social media platform WeChat is taken as a case study, and the ease of connection, communication and transaction combined with issues of commercialisation and surveillance are discussed in the framework of the privacy paradox. Protective behaviour and tactics are examined through different perceptions of privacy in the digital age. The findings of this study suggest that users possess certain amount of freedoms on WeChat. However, users’ individual privacy attitudes and behaviour in practice suggest they have a declined sense of their own freedom and right to privacy. A privacy paradox exists when users, while holding a high level of concerns, in reality do little to further the protection of their personal information on WeChat. We argue that once a user has ingrained part of their social engagement within the WeChat system, the incentive for them to remain a part of the system outweighs their requirement to secure their privacy online as their decision-making is largely based on a simple cost-benefit analysis. The power and social capital yielded via WeChat is too valuable to give up as WeChat is widely used not only for private conversations, but also for study or work-related purposes. It further blurs the boundaries between the public, the professional and the private, which is a rather unique case compared with other social media around the world.  相似文献   

8.
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and systems business.  相似文献   

9.
Federated learning (FL), as a popular distributed machine learning paradigm, has driven the integration of knowledge in ubiquitous data owners under one roof. Although designed for privacy-preservation by nature, the supposed well-sanitized parameters still convey sensitive information (e.g., reconstruction attack), while existing technical countermeasures provide weak explainability for privacy understanding and protection practices of general users. This work investigates these privacy concerns with an exploratory study and elaborates on data owners’ expectations in FL. Based on the analysis, we design the first interactive visualization system for FL privacy that supports intelligible privacy inspection and adjustment for data owners. Specifically, our proposal facilitates sample recommendation for joint privacy–performance training at cold start. Then it provides visual interpretation and attention rendering of privacy risks in view of multiple attacking channels and a holistic view. Further it supports interactive privacy enhancement involving both user initiative and differential privacy technique, and iterative trade-off with real-time inference accuracy estimation. We evaluate the effectiveness of the system and collect qualitative feedbacks from users. The results demonstrate that 96.7% of users acknowledge the benefits to privacy inspection and adjustment and 90.3% are willing to use our system. More importantly, 87.1% increase the willingness of contributing data for FL.  相似文献   

10.
王艳玮  陈恒 《现代情报》2011,31(3):89-92
应用故障树分析法对形成校园网信息系统的三大风险:物理环境安全风险﹑校内安全风险和网络安全风险建立故障树模型,深入挖掘形成风险的源头,为评估人员提出针对性的风险控制方案奠定良好的基础。同时,量化三大风险的等级大小,并取其中最大值作为校园网信息系统的总体风险级别,有效地完成了校园网信息系统风险评估的过程  相似文献   

11.
隐私权是自然人享有的使自己的隐私不受不合理的侵犯或在不违背公序良俗的前提下可自由处分的一种人格权.在与公权力发生冲突时,应以社会公益优先为原则,但在特别情况下,应当优先保护隐私权;在与私权利发生冲突时,应当优先保护隐私权.我国现行法律在立法思想、立法体系、立法定位和保护方式上仍存在不足,应当加快立法进程,建立起与社会发展和科技进步要求相匹配的法律保障.  相似文献   

12.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   

13.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

14.
Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American legal tradition focuses on a right to privacy, rather than a need for data protection. To answer these questions I begin by delineating the differences among privacy, security, and anonymity. I then discuss what information is transferred during Web browsing. I describe some of the available technology for privacy protection, including public and private key cryptography and Web proxies. I then describe the American tradition of privacy in common, statutory, and constitutional law. With the support of this tradition, I close by arguing that although privacy in Web browsing has no current legal protection in the United States, the right to privacy in the analogue equivalents has been recognized in the American legal tradition.  相似文献   

15.
Cloud computing is a popular outsourcing solution for organizations to support the information management during the life cycle of digital information goods. However, outsourcing management with a public provider results in a lack of control over digital products, which could produce incidents such as data unavailability during service outages, violations of confidentiality and/or legal issues. This paper presents a novel distribution model of digital products inspired by lean supply chain principles called CloudChain, which has been designed to support the information management during digital product lifecycle. This model enables connected networks of customers, partners and organizations to conduct the stages of digital product lifecycle as value chains. Virtual distribution channels are created over cloud resources for applications of organizations to deliver digital products to applications of partners through a seamless information flow. A configurable packing and logistic service was developed to ensure confidentiality and privacy in the product delivery by using encrypted packs. A chain management architecture enables organizations to keep tighter control over their value chains, distribution channels and digital products. CloudChain software instances were integrated to an information management system of a space agency. In an experimental evaluation CloudChain prototype was evaluated in a private cloud where the feasibility of applying supply chain principles to the delivery of digital products in terms of efficiency, flexibility and security was revealed.  相似文献   

16.
While recent developments in information and communication technologies have produced heightened concern over privacy issues, technology and privacy have a long history of interaction. The home has served as a key locus for this interaction. By distinguishing inside from outside, the home supports the allocation of particular behaviors and information to different areas, both physical and virtual. This article explores how different technologies, including structural elements, have affected and reflected over time the boundary represented by the home and how that boundary has helped shape the construction of privacy in the West. This illustrates how privacy might be conceptualized as a social condition arising from the interaction of various boundaries, including the principal one separating the public and the private.  相似文献   

17.
This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.  相似文献   

18.
在电子通讯中,签名私钥的安全性尤其重要,而解决这个问题的有效方法是把签名私钥分成若干部分并发放给多个私钥持有者.但是,通常来说在一般的门限签名中,要生成合法的签名,必然要有一定数量的私钥持有者参与签名.那么,这样的门限签名就不适用于服务器作为私钥持有者来参与门限签名.针对这个问题,本文提出一种高效的服务器协助门限签名方案.在该方案中,签名由用户提出,且用户持有的设备可以进行模指数运算.同时,只要新模集合能满足某些安全性质.方案中的模集合就能被新的模集合替换且不降低方案的安全性.  相似文献   

19.
吕璐 《情报探索》2014,(12):22-25
从政府信息公开的视角探析隐私权的涵义、特征、内容及其与知情权的关系。认为政府信息公开中对隐私权管理具有行政性、公权和私权冲突交叉、需要多种法律协调等特点。从知政权与隐私权、社会信息知情权与隐私权、隐私权保护的统一与均衡、法定知情权与隐私权等4个方面,探讨如何平衡知情权与隐私权的关系,提出应根据社会政治及公共利益、利益衡量、宽容协调、人格尊严等4项原则来协调,以实现二者的和谐。  相似文献   

20.
Privacy is a serious concern to radio frequency identification (RFID) technology. Worldwide, several companies scrapped RFID projects because of high resistance from consumers and their advocacy groups – which actually demand RFID-specific privacy policies. This concern is even more acute when RFID is used in public applications; because, in general case, citizens cannot refuse to provide data, and the data collected by a government agency would offer serious threats if are shared among third parties. Limited research has been performed in this specific issue; they all agree that perceived privacy increased RFID acceptance. But, what drives privacy perceptions are yet to be researched – this study closes this research gap. In order to conduct the current research, mixed method of research approach has been adopted. In the qualitative research stage, the authors conducted two focused-group discussion sessions and eight in-depth interviews in two different countries: Australia and Bangladesh; arguing that the status, and the perceptions and tolerance of the citizens on privacy are different in these two regions. The explored factors have been examined with empirical data obtained from these two countries. It is found that, there are distinct differences in perceptions in developed and developing countries. The detail findings offer practical suggestions to the agency managers so that they can ensure better privacy of the citizens. As a significant theoretical contribution, this study enhances existing literature identifying the antecedents of privacy, which play even different roles in different cultural backgrounds.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号