搜索结果: 1-15 共查到“国际动态 Privacy”相关记录16条 . 查询时间(0.097 秒)


Mobile App Behavior Often Appears at Odds With Privacy Policies
Mobile App Odds Privacy Policies
2016/11/29
How a mobile app says it will collect or share a user’s personal information with third parties often appears to be inconsistent with how the app actually behaves, a new automated analysis system deve...
Statement from France Cordova in support of the National Privacy Research Strategy
France Cordova National Privacy Research Strategy
2016/7/15
"The National Science Foundation (NSF) has long supported fundamental research on approaches that enhance privacy in the digital era," said France Córdova, NSF director. "The National Privacy Research...
It's Automatic:CMU Smartphone App Manages Your Privacy Preferences
CMU Smartphone App Manages Privacy Preferences
2016/7/15
Chalk up one more task a smartphone app may do better than you: figuring out your privacy settings.A field study suggests that a personalized privacy assistant app being developed at Carnegie Mellon U...
As the world grows more social and connects more online, privacy management is becoming more collaborative, according to Penn State researchers."This is a paradigm shift, in a lot of ways, because mos...
Researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences have developed a technique that can quickly change the opacity of a window, turning it cloudy, clear or...
Rutgers Bitcoin Study Reveals False Beliefs on Ease of Use and Privacy
Rutgers Bitcoin False Beliefs Ease of Use Privacy
2016/2/22
People who have used Bitcoin, and those who don’t have any experience with it, have something in common: Both groups share misconceptions about how the controversial digital currency actually works.Pe...
Theoretical computer science provides answers to data privacy problem
Theoretical computer science data privacy problem
2015/10/13
The promise of big data lies in researchers' ability to mine massive datasets for insights that can save lives, improve services and inform our understanding of the world.These data may be generated b...

Leading researchers to discuss privacy and security in a connected age(图)
discuss privacy and security connected age
2014/12/2
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Leading researchers to discuss privacy and security in a connected age
Internet era banks electrical grids
2014/10/30
As we increasingly rely on the Internet to connect to everything from banks and electrical grids to medical devices and autonomous vehicles, we are exposed to new vulnerabilities that threaten our sec...
Carnegie Mellon, Microsoft Research automate privacy compliance for big data systems
Carnegie Mellon Microsoft Research automate privacy compliance big data systems
2014/6/12
PITTSBURGH—Web services companies, such as Facebook, Google and Microsoft, all make promises about how they will use personal information they gather. But ensuring that millions of lines of code in th...

American Association for the Advancement of Science S&T Policy Forum Explores Privacy in an Era of Powerful Surveillance Tools(图)
Surveillance Tools
2007/5/15