How Sysadmins Can Protect Free Speech and Privacy on the Electronic Frontier.
Kevin BankstonPublished in: LISA (2005)
Keyphrases
- privacy enhancing
- privacy protection
- protect sensitive
- protection mechanisms
- speech recognition
- personal information
- privacy policies
- user privacy
- data protection
- privacy preserving
- disclosure control
- audio visual
- electronic transactions
- privacy preservation
- text to speech
- location privacy
- personal data
- speech synthesis
- speaker identification
- private data
- privacy aware
- private information
- speech signal
- sensitive information
- design automation
- spontaneous speech
- differential privacy
- privacy preserving data mining
- dialogue system
- electronic commerce
- data collection
- broadcast news
- data mining
- emotion recognition
- sensitive data
- emotional state
- electronic payment
- automatic speech recognition
- privacy concerns
- security issues
- audio stream
- hearing impaired