Ostkamp et al., 2015 - Google Patents
Towards a privacy threat model for public displaysOstkamp et al., 2015
View PDF- Document ID
- 17218464372420483902
- Author
- Ostkamp M
- Kray C
- Bauer G
- Publication year
- Publication venue
- Proceedings of the 7th ACM SIGCHI Symposium on Engineering Interactive Computing Systems
External Links
Snippet
While public displays have proliferated in many areas, passersby frequently do not perceive the contents shown as useful. One way to provide relevant content is to show personalized information or to let users personalize displays interactively. However, this approach raises …
- 230000002452 interceptive 0 abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0277—Online advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sotirakopoulos et al. | On the challenges in usable security lab studies: Lessons learned from replicating a study on SSL warnings | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
CA2757290C (en) | Systems and methods for implementing and tracking identification tests | |
Sipior et al. | Online privacy concerns associated with cookies, flash cookies, and web beacons | |
McCrohan et al. | Influence of awareness and training on cyber security | |
Aldhafferi et al. | Personal information privacy settings of online social networks and their suitability for mobile internet devices | |
Gates et al. | Effective risk communication for android apps | |
US20100049803A1 (en) | Anonymity-preserving reciprocal vetting from a system perspective | |
Spagnoletti et al. | Online black-markets: An investigation of a digital infrastructure in the dark | |
Yanik et al. | Validity and reliability of the Turkish version of jefferson scale of empathy for nursing students | |
Nthala et al. | “If it’s urgent or it is stopping me from doing something, then I might just go straight at it”: a study into Home Data Security Decisions | |
Ostkamp et al. | Towards a privacy threat model for public displays | |
Goekce et al. | Toxoplasma gondii antibodies in type 1 diabetes mellitus | |
JP7250112B2 (en) | Using crowdsourcing to combat disinformation | |
Bhasin | Online privacy protection: Privacy seals and government regulations in select countries | |
Ramsey | A Critical Assessment of Blockchain’s Application in Digital Advertising | |
McGuire | Online surveillance and personal liberty | |
ÖRS et al. | The relationship between anthropometric, physical, technique components and three different agility tasks in soccer players | |
Babalola | The Impact of Privacy Issue and Data Exploitation in Achieving a Successful Mobile App | |
Burruss et al. | Pandemic and predation: an analysis of economic stressors and online scam susceptibility during COVID-19 | |
Pitre et al. | Cybersecurity Awareness Course for the Elderly | |
NEBİOĞLU | Examining the Activism Types of LGBTI+ Organizations in Different Cultures in the Context of Social Representations Theory | |
Karakaya et al. | The Importance of Reliable Data in Health Crises Management and Online Survey Applications | |
محمد سعد مصطفى et al. | Privacy Protection of Children in Cyberspace_ Compliance with GDPR Regulations | |
Connolly et al. | Enforcement and Reform of the EU-US Safe Harbor Agreement |