Six usable privacy heuristics.
André de Lima SalgadoPatrick C. K. HungRenata P. M. FortesPublished in: IHC (2023)
Keyphrases
- privacy preserving
- privacy protection
- personal information
- sensitive information
- search algorithm
- security issues
- heuristic search
- location privacy
- privacy policies
- privacy preserving data mining
- identity management
- privacy aware
- heuristic rules
- personal data
- privacy preservation
- database views
- privacy concerns
- private information
- statistical databases
- information loss
- search strategies
- differential privacy
- lower bound