Essays about: "Privacy preservation"

Showing result 1 - 5 of 21 essays containing the words Privacy preservation.

  1. 1. GDPR Compliance in EU-US Data Transfers - Examining the impact of the EU Commission’s 2023 adequacy decision on surveillance risks

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Linda Kidwell; [2024]
    Keywords : General Data Protection Regulation; Adequacy Decision; EU Commission; Surveillance law; Third country data transfers; US intelligence agencies; Law and Political Science;

    Abstract : International data transfers serve to support the global economy, facilitating international collaboration and economic expansion. However this increased productivity comes at a cost, namely amplified personal data privacy and security risks. READ MORE

  2. 2. Quality Characteristics of Surveillance Systems

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Brwa Sultan; [2023]
    Keywords : Internet of Things; IoT; Quality Characteristics of Surveillance Systems; quality characteristics; surveillance systems; reliability; security; privacy;

    Abstract : The Internet of Things (IoT) has transformed our technological landscape by seamlessly connecting devices, sensors, and systems, with surveillance systems being one of its prominent applications. These systems offer advanced monitoring, control, and analysis capabilities, enabling their deployment in diverse domains such as security, transportation, healthcare, and smart cities. READ MORE

  3. 3. Extremal Mechanisms for Pointwise Maximal Leakage

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Leonhard Grosse; [2023]
    Keywords : Privacy; mechanism design; information leakage; convex optimization; information-theoretic utility; Integritet; Mekanismdesign; informationsläckage; konvex optimering; informationsteoretisk användbarhet.;

    Abstract : In order to implement privacy preservation for individuals, systems need to utilize privacy mechanisms that privatize sensitive data by randomization. The goal of privacy mechanism design is to find optimal tradeoffs between maximizing the utility of the privatized data while providing a strict sense of privacy defined by a chosen privacy measure. READ MORE

  4. 4. Cloud Computing and the GLAM sector : A case study of the new Digital Archive Project of Åland Maritime Museum.

    University essay from Uppsala universitet/Institutionen för ABM

    Author : Ubaid Ali Faruqi; [2023]
    Keywords : Cloud computing technology; Amazon Web Services AWS ; Data storage; AWS Simple Storage Service S3 ; Low-cost-high-storage; Prototype creation; Preservation and access; Sustainable Digitization; Scalability; Readiness for adapting; GLAM sector; User Experience UX ;

    Abstract : This thesis examines the benefits and drawbacks of cloud computing technology within the GLAM (Galleries, Libraries, Archives, and Museums) sector of Sweden and Finland. It employs the case study of the recently developed and launched Digital Archive Project at Åland Maritime Museum which leveraged the Amazon Web Services (AWS) technology stack to provide a cloud-based digital platform for the museum's archival materials. READ MORE

  5. 5. Privacy preserving data access mechanism for health data

    University essay from KTH/Hälsoinformatik och logistik

    Author : Najiib Abdi Dahir; Ikran Dahir Ali; [2023]
    Keywords : Secure data sharing; synthetic data; privacy preservation; healthcare; machine learning.; Säker datadelning; syntetiska data; integritetsbevarande; hälso- och sjukvård; maskininlärning;

    Abstract : Due to the rise of digitalization and the growing amount of data, ensuring the integrity and security of patient data has become increasingly vital within the healthcare industry, which has traditionally managed substantial quantities of sensitive patient and personal information. This bachelor's thesis focused on designing and implementing a secure data sharing infrastructure to protect the integrity and confidentiality of patient data. READ MORE