Privacy, 5G and Economics
Permanent URI for this collection
Browse
Recent Submissions
Item I’m supposed to see that?' AdChoices Usability in the Mobile Environment(2018-01-03) Garlach, Stacia; Suthers, Daniel D.The Digital Advertising Alliance (DAA) recently adapted its self-regulatory notice-and-choice program to the mobile environment by creating a mobile version of its existing opt-out webpage and a new mobile app. Its AdChoices icon remains the primary means on the mobile Web of alerting consumers to the presence of behaviorally-targeted advertising. Previous research has uncovered major usability flaws in the desktop versions, so evaluating the mobile tools is prudent. Mobile devices also present unique usability challenges and afford greater opportunity for tracking consumers. A qualitative study was conducted in which participants (n=18) were given test smartphones and asked to complete three tasks corresponding to the AdChoices icon, webpage, and app. Major usability problems were found that could impact a user’s mental model of how these tools work, and the extent to which their privacy is protected. This paper presents findings from the first usability task about the AdChoices icon.Item Protecting Privacy When Releasing Search Results from Medical Document Data(2018-01-03) Li, Xiaobai; Qin, JialunHealth information technologies have greatly facilitated sharing of personal health data for secondary use, which is critical to medical and health research. However, there is a growing concern about privacy due to data sharing and publishing. Medical and health data typically contain unstructured text documents, such as clinical narratives, pathology reports, and discharge summaries. This study concerns privacy-preserving extraction, summary, and release of information from medical documents. Existing studies on privacy-preserving data mining and publishing focus mostly on structured data. We propose a novel approach to enable privacy-preserving extract, summarize, query and report patients’ demographic, health and medical information from medical documents. The extracted data is represented in a semi-structured, set-valued data format, which can be stored in a health information system for query and analysis. The privacy preserving mechanism is based on the cutting-edge idea of differential privacy, which offers rigorous privacy guarantee.Item Putting a Price Tag on Personal Information - A Literature Review(2018-01-03) Wagner, Amina; Wessels, Nora; Buxmann, Peter; Krasnova, HannaIn the digital age, personal information is claimed to be the new commodity with a rising market demand and profitability for businesses. Simultaneously, people are becoming aware of the value of their personal information while being concerned about their privacy. This increases the demand of direct compensation or protection. In response to the commodification of privacy and the increased demand for compensation, a number of scholars have shed light on the value people assign to their personal information. However, these findings remain controversial as their results differ tremendously due to different research methods and contexts. To address this gap, we conducted a systematic literature review to gain insights into the current research state and to identify further research avenues. By synthesizing and analyzing 37 publications, we provide an integrative framework along with seven contextual factors affecting individuals’ valuation of privacy.Item Security In The Internet Of Things - A Systematic Mapping Study(2018-01-03) Porras, Jari; Pänkäläinen, Jouni; Knutas, Antti; Khakurel, JaydenThe Internet of Things (IoT) concept is emerging and evolving rapidly. Various technical solutions for multiple purposes have been proposed for its implementation. The rapid evolution and utilization of IoT technologies has raised security concerns and created a feeling of uncertainty among IoT adopters. The purpose of this paper is to examine the current research trends related to security concerns of the IoT concept and provide a detailed understanding of the topic. We thus applied systematic mapping study as the methodological approach. Based on the chosen search strategy, 38 articles (of close to 3500 articles in the field) were selected for a closer examination. Out of these articles, the concerns, solutions and research gaps for the security in the IoT concept were extracted. The mapping study identifies nine main concerns and 11 solutions. However, the findings also reveal challenges, such as secure privacy management and cloud integration that still require efficient solutions.Item Introduction to the Minitrack on Privacy, 5G and Economics(2018-01-03) Skouby, Knud Erik; Sorensen, Lene; Khajuria, Samant