[go: up one dir, main page]

Ostkamp et al., 2015 - Google Patents

Towards a privacy threat model for public displays

Ostkamp et al., 2015

View PDF
Document ID
17218464372420483902
Author
Ostkamp M
Kray C
Bauer G
Publication year
Publication venue
Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems

External Links

Snippet

While public displays have proliferated in many areas, passersby frequently do not perceive the contents shown as useful. One way to provide relevant content is to show personalized information or to let users personalize displays interactively. However, this approach raises …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0277Online advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
Sotirakopoulos et al. On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings
Nthala et al. Informal support networks: an investigation into home data security practices
CA2757290C (en) Systems and methods for implementing and tracking identification tests
Sipior et al. Online privacy concerns associated with cookies, flash cookies, and web beacons
McCrohan et al. Influence of awareness and training on cyber security
Aldhafferi et al. Personal information privacy settings of online social networks and their suitability for mobile internet devices
Gates et al. Effective risk communication for android apps
US20100049803A1 (en) Anonymity-preserving reciprocal vetting from a system perspective
Spagnoletti et al. Online black-markets: An investigation of a digital infrastructure in the dark
Yanik et al. Validity and reliability of the Turkish version of jefferson scale of empathy for nursing students
Nthala et al. “If it’s urgent or it is stopping me from doing something, then I might just go straight at it”: a study into Home Data Security Decisions
Ostkamp et al. Towards a privacy threat model for public displays
Goekce et al. Toxoplasma gondii antibodies in type 1 diabetes mellitus
JP7250112B2 (en) Using crowdsourcing to combat disinformation
Bhasin Online privacy protection: Privacy seals and government regulations in select countries
Ramsey A Critical Assessment of Blockchain’s Application in Digital Advertising
McGuire Online surveillance and personal liberty
ÖRS et al. The relationship between anthropometric, physical, technique components and three different agility tasks in soccer players
Babalola The Impact of Privacy Issue and Data Exploitation in Achieving a Successful Mobile App
Burruss et al. Pandemic and predation: an analysis of economic stressors and online scam susceptibility during COVID-19
Pitre et al. Cybersecurity Awareness Course for the Elderly
NEBİOĞLU Examining the Activism Types of LGBTI+ Organizations in Different Cultures in the Context of Social Representations Theory
Karakaya et al. The Importance of Reliable Data in Health Crises Management and Online Survey Applications
محمد سعد مصطفى et al. Privacy Protection of Children in Cyberspace_ Compliance with GDPR Regulations
Connolly et al. Enforcement and Reform of the EU-US Safe Harbor Agreement