Internet of Everything (Ioe): Analysing the Individual Concerns Over Privacy Enhancing Technologies (Pets)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 3
Abstract
This paper aims to investigate the effectiveness of the provision of privacy of individuals through privacy enhancing technologies (PETs). The successful evolution and emergence of cyberspace with the real world through “Internet of Everything (IoE)” has led to the speedy progress in research and development of predictive analysis of big data. The individual’s privacy has gained a considerable momentum in both industry and academia since privacy-enhancing technologies (PETs) constitute a technical means to protect information. Privacy regulations and state of law deemed this as an integral part in order to protect the individual’s private sphere when the infrastructure of Information Communication Technologies (ICT) is laid out. Modern organisations use consent forms to gather individual’s sensitive personal information for a specific purpose. The law prohibits using the person’s information for purposes other than that of when the consent was initially established. The infrastructure of ICT should be developed in alliance with the privacy laws and made compliant as well intelligent which learn by itself from the environment. This extra layer embedded in the system would educate the ICT structure and help system to authenticate as well as communicate with the perspective users. The existing literature on protecting individuals’ privacy through privacy-enhancing technologies (PETs) is still embryonic and does conclude that the individual’s concerns about privacy are not fully considered in the technological sense. Among other contributions, this research paper will devise a conceptual model to improve individual’s privacy.
Authors and Affiliations
Asim Majeed, Rehan Bhana, Anwar Haq, Imani Kyaruzi, Shaheed Pervaz, Mike-Lloyd Williams
A Short Review of Gender Classification based on Fingerprint using Wavelet Transform
In some cases, knowing the gender of fingerprint owner found in criminal or disaster scene is advantageous. Theoretically, if the number of the male and female fingerprints in a database is equal, then the identification...
A New Approach of Trust Relationship Measurement Based on Graph Theory
The certainty trust relationship of network node behavior has been presented based on graph theory, and a measurement method of trusted-degree is proposed. Because of the uncertainty of trust relationship, this paper has...
Information System Quality: Managers Perspective
To evaluate Information System Quality (ISQ) quantitatively, a model was constructed based on sub-models related to the five Information System (IS) components, namely, Human Resources, Hardware, Software and application...
Towards Adaptive user Interfaces for Mobile-Phone in Smart World
All applications are developed for context adaptation and provide communication with users through their interfaces. These applications offer new opportunities for developers as well as users by collecting context data a...
Empirical Study of Segment Particle Swarm Optimization and Particle Swarm Optimization Algorithms
In this paper, the performance of segment particle swarm optimization (Se-PSO) algorithm was compared with that of original particle swarm optimization (PSO) algorithm. Four different benchmark functions of Sphere, Rosen...