Optimising technological literacy acquirement to protect privacy and security.
Ron S. HirschprungShay TayroEti ReznikPublished in: Behav. Inf. Technol. (2022)
Keyphrases
- protection mechanisms
- privacy enhancing
- security issues
- user privacy
- privacy protection
- statistical databases
- personal data
- sensitive data
- security concerns
- protect sensitive
- data protection
- security mechanisms
- security and privacy issues
- privacy preserving
- privacy requirements
- personal information
- privacy issues
- preserving privacy
- data security
- security properties
- data privacy
- privacy preservation
- identity management
- security requirements
- security services
- security threats
- data encryption
- information security
- security risks
- privacy concerns
- unauthorized access
- access control
- electronic payment
- individual privacy
- privacy policies
- confidential information
- security measures
- security policies
- rfid systems
- sensitive information
- secure multiparty computation
- private information
- trusted third party
- network security
- biometric template
- outsourced databases
- intrusion detection
- high school
- third party
- data sharing
- authentication protocol
- mutual authentication
- data confidentiality
- information loss
- homomorphic encryption
- disclosure control
- role based access control
- policy enforcement
- cyber security
- privacy preserving data mining