Vehicle-to-Everything (V2X) communication is receiving growing attention from industry and academia as multiple pilot projects explore its capabilities and feasibility. With about 50% of global road ...vehicle exports coming from the European Union (EU), and within the context of EU legislation around security and data protection, V2X initiatives must consider security and privacy aspects across the system stack, in addition to road safety. Contrary to this principle, our survey of relevant standards, research outputs, and EU pilot projects indicates otherwise; we identify multiple security- and privacy-related shortcomings and inconsistencies across the standards. We conduct a root cause analysis of the reasons and difficulties associated with these gaps, and categorize the identified security and privacy issues relative to these root causes. As a result, our comprehensive analysis sheds lights on a number of areas that require improvements in the standards, which are not explicitly identified in related work. Our analysis fills gaps left by other related surveys, which are focused on specific technical areas but do not necessarily point out underlying root issues in standard specifications. We bring forward recommendations to address these gaps for the overall improvement of security and safety in vehicular communication.
Understanding differential privacy Kurz, Christoph
Significance (Oxford, England),
June 2021, 2021-06-01, 20210601, Volume:
18, Issue:
3
Journal Article
Differential privacy promises to strike a balance between the protection of privacy for individuals and the generation of insights from data. But how exactly does it work? Christoph F. Kurz works ...through a simple hypothetical example
Differential privacy promises to strike a balance between the protection of privacy for individuals and the generation of insights from data. But how exactly does it work? Christoph F. Kurz works through a simple hypothetical example.
Agruparlos ha sido un convencionalismo sólo sugerido por una historicidad que trabaja como vínculo en cada uno de ellos, porque como lector pueden estudiarse sin mayor orden que el aleatorio interés ...personal. El segundo, Eficiencia, comprende el mayor número de textos. La sociología, la antropología y la psicología social, entre otras disciplinas, forman ya parte de la reflexión sobre la casa y su relación con su todo que es la ciudad. Esta decisión, y al preferir continuar citando autores, tomándolos como aliados -o como apoderados interpósitos- para hablar por ella, nos priva de conocer su versión, su opinión y, con ello, quizá para evadir sus propias cuitas, la autora nos las endosa adjuntas al horror vacui que parece haberle producido la escritura de este libro.
The legal domain distinguishes between different types of data and attaches a different level of protection to each of them. Thus, non-personal data are left largely unregulated, while privacy and ...data protection rules apply to personal data or personal information. There are stricter rules for processing sensitive personal data than for ‘ordinary’ personal data, and metadata or communications data are regulated differently than content communications data. Technological developments challenge these legal categorisations on at least three fronts: First, the lines between the categories are becoming harder to draw and more fluid. Second, working with various categories of data works well when the category a datum or dataset falls into is relatively stable. However, this is less and less so. Third, scholars increasingly question the rationale behind the various legal categorisations. This book assesses to what extent either of these strategies is feasible and to what extent alternative approaches could be developed by combining insights from three fields: technology, practice and law.
Technological innovations are increasingly helping people expand their social capital through online networks by offering new opportunities for sharing personal information. Online social networks ...are perceived to provide individuals new benefits and have led to a surge of personal data uploaded, stored, and shared. While privacy concerns are a major issue for many users of social networking sites, studies have shown that their information disclosing behavior does not align with their concerns. This gap between behavior and concern is called the privacy paradox. Several theories have been explored to explain this, but with inconsistent and incomplete results. This study investigates the paradox using a construal level theory lens. We show how a privacy breach, not yet experienced and psychologically distant, has less weight in everyday choices than more concrete and psychologically-near social networking activities and discuss the implications for research and practice.
•An explanation of the information privacy paradox using Construal Level Theory.•Intentions mediate the relationship between privacy concerns and self-disclosure behavior.•Social Rewards predict online behavior through near-future intentions.•Privacy Concerns relate to distant-future intentions, but do not directly affect the online behavior.•Privacy concerns indirectly affect online behavior through near-future intentions.
Modern healthcare systems now rely on advanced computing methods and technologies, such as Internet of Things (IoT) devices and clouds, to collect and analyze personal health data at an unprecedented ...scale and depth. Patients, doctors, healthcare providers, and researchers depend on analytical models derived from such data sources to remotely monitor patients, early-diagnose diseases, and find personalized treatments and medications. However, without appropriate privacy protection, conducting data analytics becomes a source of a privacy nightmare. In this article, we present the research challenges in developing practical privacy-preserving analytics in healthcare information systems. The study is based on kHealth-a personalized digital healthcare information system that is being developed and tested for disease monitoring. We analyze the data and analytic requirements for the involved parties, identify the privacy assets, analyze existing privacy substrates, and discuss the potential tradeoff among privacy, efficiency, and model quality.
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system and the amount of protection offered by privacy-enhancing technologies. In this way, privacy metrics ...contribute to improving user privacy in the digital world. The diversity and complexity of privacy metrics in the literature make an informed choice of metrics challenging. As a result, instead of using existing metrics, new metrics are proposed frequently, and privacy studies are often incomparable. In this survey, we alleviate these problems by structuring the landscape of privacy metrics. To this end, we explain and discuss a selection of over 80 privacy metrics and introduce categorizations based on the aspect of privacy they measure, their required inputs, and the type of data that needs protection. In addition, we present a method on how to choose privacy metrics based on nine questions that help identify the right privacy metrics for a given scenario, and highlight topics where additional work on privacy metrics is needed. Our survey spans multiple privacy domains and can be understood as a general framework for privacy measurement.
The aim of this article is to propose a theoretical framework for studying digital resignation, the condition produced when people desire to control the information digital entities have about them ...but feel unable to do so. We build on the growing body of research that identifies feelings of futility regarding companies’ respect for consumer privacy by suggesting a link between these feelings and the activities of the companies they benefit. We conceptualize digital resignation as a rational response to consumer surveillance. We further argue that routine corporate practices encourage this sense of helplessness. Illuminating the dynamics of this sociopolitical phenomenon creates a template for addressing important questions about the forces that shape uneven power relationships between companies and publics in the digital age.