7 results on '"Chiara Braghin"'
Search Results
2. Online Privacy
- Author
-
Chiara Braghin and Marco Cremonini
- Subjects
business.industry ,Privacy policy ,Internet privacy ,Relevance (law) ,The Internet ,Dimension (data warehouse) ,business ,Centrality ,Online advertising ,Personally identifiable information ,Bounded rationality - Abstract
Privacy has often gained the headlines on the media in the last few years, due to the revelation of appalling invasions of what many citizens perceive as the private space of their own communications, behavior, and lifestyle. Privacy is especially in the spotlight when the online dimension is concerned with the almost endless stream of personal information that travels on the Internet. However, the apparent importance that online privacy has gained in the public discourse should not be taken as a demonstration that privacy problems are going to be solved any time soon. Furthermore, it could not be even taken as a proof of maturity in the comprehension of the problems. In fact, many privacy problems are becoming more intractable now in the modern online ecosystem than decades ago, when privacy emerged as a problem of industrialized societies. Online privacy is enmeshed with the dynamics of technology innovations, and with the shape of today's IT market, it is also entangled with the often fragile economics of the online advertising sector. At present, privacy depends to customers bounded rationality and, to put it simple, to the fact that for an individual, to manage her own online privacy specifically and timely without sacrificing to reap the benefits of the online ecosystem would be just overwhelming in the current setting. In this chapter, we discuss some particularly critical factors contributing to the problem of managing today's online privacy, followed by an introduction to some technical issues. In particular, we present in more details the case of the data broker industry, rather than the much more publicized cases of governmental surveillance and Internet-based data-centric corporations, because of its relatively lesser media exposition combined with an indisputable relevance for citizens' privacy. The problem of the informed consent and the dubbed privacy control paradox is discussed too for its centrality in almost all privacy policies and still underrated weakness. This leads us to show the complex and multidimensional nature of online privacy and the implication on policy making. In the section on privacy and technologies, we address the problem of online privacy both at the application level—by describing the current techniques used to collect a user's browsing history—and at the communication level—by discussing the methods available to defend against traffic analysis. Then, we highlight the security and privacy issues of mobile health applications.
- Published
- 2017
3. Contributors
- Author
-
Edward G. Amoroso, Jeffrey S. Bardin, Cataldo Basile, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Matteo Maria Casalino, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Rozita Dara, Christopher Day, Sabrina De Capitani di Vimercati, Tewfiq El Maliki, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Angelo Genovese, Anna Granova, William F. Gross, Yong Guan, Cem Gurkok, Feng Hao, Tarfa Hamed, James T. Harmening, Rich Hoffman, Emin Huseynov, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, John Benjamin Khan, Larry Korba, Kameswari Kotapati, Stefan C. Kremer, Thomas F. LaPorta, Jean Lencrenon, Keith Lewis, Peng Liu, Giovanni Livraga, John R. Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Nailah Mims, Simone Mutti, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, James Pooley, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Pierangela Samarati, Marco Santambrogio, Mario Santana, Steve Schneider, Fabio Scotti, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Michael A. West, Dan Wing, George O.M. Yee, Liang Yan, Roman Zabicki, Gansen Zhao, and Zhe Zias
- Published
- 2017
4. Privacy on the Internet
- Author
-
Marco Cremonini, Claudio Agostino Ardagna, and Chiara Braghin
- Subjects
Information privacy ,Privacy by Design ,business.industry ,Privacy software ,Privacy policy ,Internet privacy ,Privacy laws of the United States ,Computer security ,computer.software_genre ,Identity theft ,business ,Personally identifiable information ,computer ,Anonymity - Abstract
In recent years, large-scale computer networks have become an essential aspect of our daily computing environment. We often rely on a global information infrastructure for ebusiness activities such as home banking, ATM transactions, or shopping online. One of the main scientific and technological challenges in this setting has been to provide security to individuals who operate in possibly untrusted and unknown environments. However, beside threats directly related to computer intrusions, epidemic diffusion of malwares, and outright frauds conducted online, a more subtle though increasing erosion of individuals’ privacy has progressed and multiplied. Such an escalating violation of privacy has some direct harmful consequences—for example, identity theft has spread in recent years—and negative effects on the general perception of insecurity that many individuals now experience when dealing with online services. Nevertheless, protecting personal privacy from the many parties—business, government, social, or even criminal—that examine the value of personal information is an old concern of modern society, now increased by the features of the digital infrastructure. In this chapter, we address these privacy issues in the digital society from different points of view, investigating: The various aspects of the notion of privacy and the debate that the intricate essence of privacy has stimulated; the most common privacy threats and the possible economic aspects that may influence the way privacy is (and especially is not, in its current status) managed in most firms; the efforts in the computer science community to face privacy threats, especially in the context of distributed networks; and, the network-based technologies available to date to provide anonymity in user communications over a private network.
- Published
- 2013
5. Contributors
- Author
-
Claudio Agostino Ardagna, Jeffrey Bardin, Sanjay Bavisi, Stefan Berthold, Gerald Beuchelt, Rahul Bhaskar, Chiara Braghin, Albert Caballero, Erdal Cayirci, Thomas M. Chen, Hongbing Cheng, Lauren Collins, Marco Cremonini, Samuel J.J. Curry, Christopher Day, Sabrina De Capitani Di Vimercati, Scott R. Ellis, Michael Erbschloe, Simone Fischer-Hbner, Sara Foresti, Errin W. Fulp, Anna Granova, Yong Guan, Cem Gurkok, Feng Hao, James T. Harmening, Markus Jakobsson, Ravi Jhawar, Almantas Kakareka, Bhushan Kapoor, Sokratis K. Katsikas, Dalia Khader, Larry Korba, Kameswari Kotapati, Thomas F. LaPorta, Jean Lancrenon, Peng Liu, Tewfiq El Maliki, John Mallery, Bill Mansoor, Luther Martin, John McDonald, John McGowan, Peter F. Nicoletti, Kevin Noble, Pramod Pandya, Harsh Kupwade Patil, Stefano Paraboschi, Thea Peacock, Ken Perkins, Vincenzo Piuri, Henrik Plate, Daniel Ramsbrock, Chunming Rong, Robert Rounsavall, Peter Y.A. Ryan, Mario Santana, Steve Schneider, Jean-Marc Seigneur, Marco Slaviero, Daniel S. Soper, Terence Spies, William Stallings, Alex Tsow, Jesse Walker, Patrick J. Walsh, Xinyuan Wang, Michael West, Dan Wing, Zhe Xia, George O.M. Yee, Liang Yan, and Gansen Zhao
- Published
- 2013
6. NET Privacy
- Author
-
Marco Cremonini, Chiara Braghin, and Claudio Agostino Ardagna
- Subjects
business.industry ,Computer science ,Perspective (graphical) ,Internet privacy ,Viewpoints ,computer.software_genre ,Information sensitivity ,Middleware (distributed applications) ,The Internet ,Sensibility ,business ,computer ,Mobile device ,Personally identifiable information - Abstract
Publisher Summary This chapter discusses net privacy from different viewpoints, from historical to technological. The very nature of the concept of privacy requires such an enlarged perspective because it often appears indefinite, being constrained into the tradeoff between the undeniable need of protecting personal information and the evident utility, in many contexts, of the availability of the same information. The digital society and the global interconnected infrastructure eased accessing and spreading of personal information; therefore, developing technical means and defining norms and fair usage procedures for privacy protection are now more demanding than in the past. This chapter also presents some of the more advanced solutions that research has developed to date, either for anonymizing stored data, hiding sensitive information in artificially inaccurate clusters, or introducing third parties and middleware in charge of managing online transactions and services in a privacy-aware fashion. Location privacy is a topic that has gained importance in recent years with the advent of mobile devices. Privacy over the Net and in the digital society does not look to be in good shape; the augmented sensibility of individuals to its erosion, the many scientific and technological efforts to introduce novel solutions, and a better knowledge of the problem with the help of fresh data contribute to stimulating the need for better protection and fairer use of personal information.
- Published
- 2009
7. Information Leakage Detection in Boundary Ambients
- Author
-
Chiara, Braghin, Cortesi, Agostino, and Focardi, Riccardo
- Subjects
Access control ,Information flow ,Information leakage ,Mobile ambient calculus - Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.