2014
DOI: 10.1007/978-3-319-06749-0_11
|View full text |Cite
|
Sign up to set email alerts
|

My Data, Your Data, Our Data: Managing Privacy Preferences in Multiple Subjects Personal Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…The adversary, typically an online service provider (or an external observer who has access to this information, e.g., another user of the social network), has access to the observed locations and co-locations of one or several users and seeks to locate users, at a given time instant, namely, carry out a localization attack 3 . Because of the co-location 2.…”
Section: Adversarymentioning
confidence: 99%
See 1 more Smart Citation
“…The adversary, typically an online service provider (or an external observer who has access to this information, e.g., another user of the social network), has access to the observed locations and co-locations of one or several users and seeks to locate users, at a given time instant, namely, carry out a localization attack 3 . Because of the co-location 2.…”
Section: Adversarymentioning
confidence: 99%
“…Similarly, users who connect from the same IP address are likely to be attached to the same Internet access point, thus providing evidence of their co-location. Such data falls into the category of multiple-subjects personal data [3].…”
Section: Introductionmentioning
confidence: 99%
“…Very limited individual capability to manage one's own data (Tene and Wolf, 2014;Gnesi et al, 2014) The framework shall guarantee the individual's right to manage and control personal data.…”
Section: Management Of Individual Datamentioning
confidence: 99%
“…Low level of individual expertise to analyze and manage complex privacy policies (Tene and Wolf, 2014;Gnesi et al, 2014) The framework shall provide comprehensible policies (Gnesi et al, 2014). management during 2016-2018.…”
Section: Privacy Policiesmentioning
confidence: 99%
“…The standard unraveling argument holds that giving up personal and private information also affects the privacy of other individuals as these are interdependent problems (so-called "privacy externality"). The inter-dependent information relating to multiple transaction parties as been termed "multiple subjects' personal data" (Gnesi et al 2014).…”
Section: Information Externalitiesmentioning
confidence: 99%