Showing 1 - 19 results of 19 for search '"privacy"', query time: 0.06s Refine Results
  1. 1

    Privacy and the American citizen by Bloomsburgh, Peter

    Published 2009
    Subjects: “…Privacy, Right of…”
    Get full text
    Working Paper
  2. 2

    Privacy, technology, and the American citizen by Williams, Stephen Joseph

    Published 2009
    Subjects: “…Privacy, Right of…”
    Get full text
    Working Paper
  3. 3
  4. 4

    Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy by Carback, Richard, Chaum, David, Clark, Jeremy, Conway, John, Essex, Aleksander, Herrnson, Paul S., Mayberry, Travis, Popoveniuc, Stefan, Rivest, Ronald L., Shen, Emily, Sherman, Alan T., Vora, Poorvi L.

    Published 2015
    “…On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system—the first time any end-to-end (e2e) voting system with ballot privacy has been used in any binding governmental election. …”
    Get full text
    Working Paper
  5. 5

    Practical Provably Correct Voter Privacy Protecting End-to-End Voting Employing Multiparty Computations and Split Value Representations of Votes by Rivest, Ronald L., Rabin, Michael O.

    Published 2015
    “…In the present note voter privacy protection is achieved by use of a simple form of Multi Party Computations (MPC). …”
    Get full text
    Working Paper
  6. 6
  7. 7
  8. 8

    Policy Analytics for Cybersecurity of Cyber-Physical Systems by Choucri, Nazli, Agarwal, Gaurav

    Published 2022
    Subjects: “…Science of Security & Privacy…”
    Get full text
    Get full text
    Working Paper
  9. 9

    Cybersecurity White Paper by Draffin, Cyril

    Published 2021
    “…Widespread connection of distributed energy resources, smart appliances, and more complex electricity markets increases the importance of cybersecurity and heightens privacy concerns. • Robust regulatory standards for cybersecurity and privacy are needed for all components of an interconnected electricity network…”
    Get full text
    Working Paper
  10. 10

    Determinants and Role of Trust in E-Business: A Large Scale Empirical Study by Sultan, Fareena, Urban, Glen, Shankar, Venkatesh, Bart, Iakov

    Published 2003
    “…Web site characteristics such as privacy and security, navigation, presentation, brand, and advice account for as much as 98% of this explained variance in Web site trust. …”
    Get full text
    Working Paper
  11. 11

    The Interplay of Web Aggregation and Regulation by Zhu, Hongwei, Madnick, Stuart E., Siegel, Michael D.

    Published 2016
    “…The aggregator's capability of transparently extracting web data has raised challenging issues in database and privacy protection. Consequently, new regulations are introduced or being proposed. …”
    Get full text
    Working Paper
  12. 12

    Voting Technology and the Election Experience: The 2009 Gubernatorial Races in New Jersey and Virginia by Stewart III, Charles H., Alvarez, R. Michael, Hall, Thad E.

    Published 2015
    “…We find that voters are sensitive to the voting mode they use—in person voting compared to absentee voting—as well as to whether they get to vote on the technology they prefer (paper versus electronic). Finally, the privacy that voters feel in the voting process is also important in shaping the voter’s confidence.…”
    Get full text
    Working Paper
  13. 13

    Can Healthcare IT Save Babies? by Tucker, Catherine, Miller, Amalia

    Published 2011
    “…We identify this effect through variations in state medical privacy laws that distort the usefulness of healthcare IT. …”
    Get full text
    Working Paper
  14. 14

    Resilient and virtually perfect revenue from perfectly informed players by Chen, Jing, Hassidim, Avinatan, Micali, Silvio

    Published 2022
    “…We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is perfectly resilient to the problems of collusion, complexity, and privacy; and • Works for any number of players n > 1.…”
    Get full text
    Working Paper
  15. 15
  16. 16
  17. 17

    Application of Lean Management Principles to Election Systems by Posner, Tomer

    Published 2015
    “…By following a structured approach based on Lean, the efforts to advance voting solutions in the US can gain in efficiency, security, privacy and credibility over their current state. …”
    Get full text
    Working Paper
  18. 18

    Managing Shared Access to a Spectrum Commons by Lehr, William Herndon, Crowcroft, Jon

    Published 2016
    “…This includes: (1) No transmit only devices; (2) Power restrictions; (3) Common channel signaling; (4) Mechanism for handling congestion and allocating resources among users/uses in times of congestion; (5) Mechanism to support enforcement (e.g., established procedures to verify protocol is in conformance); (6) Mechanism to support reversibility of policy; and (7) Protection for privacy and security. We explain why each is necessary, examine their implications for current policy, and suggest ways in which they might be implemented. …”
    Get full text
    Working Paper
  19. 19

    Parental physical discipline in Singapore: a study of context, practice, and perception by Won, Ying Qing, Sudo, Mioko, Tiemeier, Henning, Setoh, Peipei

    Published 2024
    “…Further, they recalled emotional and physical reactions to physical discipline, perceived parents’ emotions, implement, immediacy, privacy, and predictability of physical discipline. …”
    Get full text
    Working Paper