Current Search: privacy (x)
-
-
Title
-
THE COST OF CONVENIENCE: THE EXTENT OF THE REASONABLE EXPECTATION OF PRIVACY IN THE INTERNET AGE.
-
Creator
-
Karpf, Justin, Wood, Robert, University of Central Florida
-
Abstract / Description
-
Though the Internet and social media are fairly recent developments, the legal principles and issues embodied in them are well-represented in the Constitution. Take, for example, the freedom of expression enumerated in the First Amendment. Though traditionally in print, pamphlets, and film, recent developments in technology such as Facebook and blogs have become the new standard forms of communication. Like the physical mediums that arose before them, issues arise of what limits, if any,...
Show moreThough the Internet and social media are fairly recent developments, the legal principles and issues embodied in them are well-represented in the Constitution. Take, for example, the freedom of expression enumerated in the First Amendment. Though traditionally in print, pamphlets, and film, recent developments in technology such as Facebook and blogs have become the new standard forms of communication. Like the physical mediums that arose before them, issues arise of what limits, if any, should be placed on the speech. Given the guise of anonymity, people on the Internet have less accountability in the comments they make, which has led to things ranging from passionate political speech to what is known as cyber-bullying, which is online harassment that has led people to suicide. This thesis, however, will primarily focus on the Fourth Amendment's reasonable expectation of privacy. Because the information involved with the Internet and social media is digital, it is more difficult to identify when privacy has been breached. With a paper envelope, for example, one can tell if the seal was broken and the contents were potentially disclosed to an unwanted party. Electronically, however, no such seal exists to notify the sender or recipient of a communication. Furthermore, the Government has found itself under stricter scrutiny for searches with these new developments in technology; the lack of physical intrusion poses difficult questions for courts that must decide how far a reasonable expectation of privacy goes in the social media age. The thesis will also address how private companies obtain and use individuals' information through the services they provide and the issues that arise from them. Private companies have fewer restrictions than the Government, and both perspectives are important to keep in mind when trying to understand the policy implications rapid technological growth has brought about. The thesis will conclude by identifying issues that courts and legislatures will have to address in the coming years to adequately deliver justice in a dynamic society that is prone to powerful technological change.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFH0004399, ucf:44992
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004399
-
-
Title
-
Risk in Privacy Breach Determination: The Application of Prospect Theory to Healthcare Privacy Officers.
-
Creator
-
Walden, Amanda, Cortelyou-Ward, Kendall, Noblin, Alice, Gabriel, Meghan, Knox, Claire, University of Central Florida
-
Abstract / Description
-
A significant concern in healthcare is that of patient privacy and how organizations protect against unauthorized access to protected health information. The federal government has responded by instituting policies and guidelines on requirements for protection. However, the policy language leaves areas open to interpretation by those following the guidelines. Reporting to the Office for Civil Rights and/or the patient can open an organization to risk of financial and possible criminal...
Show moreA significant concern in healthcare is that of patient privacy and how organizations protect against unauthorized access to protected health information. The federal government has responded by instituting policies and guidelines on requirements for protection. However, the policy language leaves areas open to interpretation by those following the guidelines. Reporting to the Office for Civil Rights and/or the patient can open an organization to risk of financial and possible criminal penalties. There is a risk of harm to their reputation which could impact patient visits and market share. Therefore, Privacy Officers might view risk in different ways and therefore handle breach reporting differently. Privacy Officers are responsible for determining an individual organization's breach reportability status. Their processes may vary dependent on their knowledge of the policy, the status of previous reported breaches, and their framing of an incident. This research aims to explore the following factors: (1) personal and organizational knowledge, (2) prior breach status, (3) and scenario framing, to explore if Prospect Theory is applicable to the choices a Privacy Officer makes regarding breach determination. The study uses primary data collection through a survey that includes loss and gain scenarios in accordance with Prospect Theory. Individuals listed as Privacy Officers within the American Health Information Management Association (AHIMA) were the target audience for the survey. Univariate, Bivariate, Multivariate, and Post Regression techniques were used to analyze the data collected. The findings of the study supported the theoretical framework and provided industry and public affairs implications. These findings show that there is a gap where Privacy Officers have to make their own decisions and there is a difference in the types of decisions they are making on a day to day basis. Future guidance and policies need to address these gaps and can use the insight provided by this study.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007382, ucf:52076
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007382
-
-
Title
-
SOCIAL MEDIA AND ITS EFFECT ON PRIVACY.
-
Creator
-
Adams, Brittney, Flammia, Madelyn, University of Central Florida
-
Abstract / Description
-
While research has been conducted on social media, few comparisons have been made in regards to the privacy issues that exist within the most common social media networks, such as Facebook, Google Plus, and Twitter. Most research has concentrated on technical issues with the networks and on the effects of social media in fields such as medicine, law, and science. Although the effects on these fields are beneficial to the people related to them, few studies have shown how everyday users are...
Show moreWhile research has been conducted on social media, few comparisons have been made in regards to the privacy issues that exist within the most common social media networks, such as Facebook, Google Plus, and Twitter. Most research has concentrated on technical issues with the networks and on the effects of social media in fields such as medicine, law, and science. Although the effects on these fields are beneficial to the people related to them, few studies have shown how everyday users are affected by the use of social media. Social media networks affect the privacy of users because the networks control what happens to user contact information, posts, and other delicate disclosures that users make on those networks. Social media networks also have the ability to sync with phone and tablet applications. Because the use of these applications requires additional contact information from users, social media networks are entrusted with keeping user information secure. This paper analyzes newspaper articles, magazine articles, and research papers pertaining to social media to determine what effects social media has on the user's privacy and how much trust should be placed in social media networks such as Facebook. It provides a comprehensive view of the most used social media networks in 2012 and offers methods and suggestions for users to help protect themselves against privacy invasion.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFH0004242, ucf:44895
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004242
-
-
Title
-
Examining Users' Application Permissions On Android Mobile Devices.
-
Creator
-
Safi, Muhammad, Wisniewski, Pamela, Leavens, Gary, Hughes, Charles, University of Central Florida
-
Abstract / Description
-
Mobile devices have become one of the most important computing platforms. The platform's portability and highly customized nature raises several privacy concerns. Therefore, understanding and predicting user privacy behavior has become very important if one is to design software which respects the privacy concerns of users. Various studies have been carried out to quantify user perceptions and concerns [23,36] and user characteristics which may predict privacy behavior [21,22,25]. Even though...
Show moreMobile devices have become one of the most important computing platforms. The platform's portability and highly customized nature raises several privacy concerns. Therefore, understanding and predicting user privacy behavior has become very important if one is to design software which respects the privacy concerns of users. Various studies have been carried out to quantify user perceptions and concerns [23,36] and user characteristics which may predict privacy behavior [21,22,25]. Even though significant research exists regarding factors which affect user privacy behavior, there is gap in the literature when it comes to correlating these factors to objectively collected data from user devices. We designed an Android application which administered surveys to collect various perceived measures, and to scrape past behavioral data from the phone. Our goal was to discover variables which help in predicting user location sharing decisions by correlating what we collected from surveys with the user's decision to share their location with our study application. We carried out logistic regression analysis with multiple measured variables and found that perceived measures and past behavioral data alone were poor predictors of user location sharing decisions. Instead, we discovered that perceived measures in the context of past behavior helped strengthen prediction models. Asking users to reflect on whether they were comfortable sharing their location with apps that were already installed on their mobile device was a stronger predictor of location sharing behavior than general measures regarding privacy concern or past behavioral data scraped from their phones. This work contributes to the field by correlating existing privacy measures with objective data, and uncovering a new predictor of location sharing decisions.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007363, ucf:52085
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007363
-
-
Title
-
PRIVACY, SURVEILLANCE AND THE STATE: A COMPARISON OF U.S. AND BRITISH PRIVACY RIGHTS.
-
Creator
-
Lander, Angelina, Kinsey, Barbara Sgouraki, University of Central Florida
-
Abstract / Description
-
This study investigates the effects of institutional structure on the privacy rights regimes in the United States and the United Kingdom, from 2000-2006. The goal of this research is to analyze how variation in the institutional arrangements across these two countries allowed for more or less protection of privacy rights for citizens. Domestic terrorist attacks during the time period represent a catalyst for changes in police and government surveillance activities. Veto points literature...
Show moreThis study investigates the effects of institutional structure on the privacy rights regimes in the United States and the United Kingdom, from 2000-2006. The goal of this research is to analyze how variation in the institutional arrangements across these two countries allowed for more or less protection of privacy rights for citizens. Domestic terrorist attacks during the time period represent a catalyst for changes in police and government surveillance activities. Veto points literature provides the framework for institutional comparison. The first part of the research provides a discussion of the historical evolution of privacy rights in both states, focusing on government and police surveillance and investigations. The second part of the research, based on veto points theory, compares the institutional arrangements of the United States and the United Kingdom, and suggests that the number of veto points and the ideological proximity of veto players have had an effect on the formulation of policy. Laws governing surveillance, investigations and privacy in the year 2000 provide a benchmark for analyzing how policies change over time.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002772, ucf:48095
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002772
-
-
Title
-
QUERY PROCESSING IN LOCATION-BASED SERVICES.
-
Creator
-
Liu, Fuyu, Hua, Kien, University of Central Florida
-
Abstract / Description
-
With the advances in wireless communication technology and advanced positioning systems, a variety of Location-Based Services (LBS) become available to the public. Mobile users can issue location-based queries to probe their surrounding environments. One important type of query in LBS is moving monitoring queries over mobile objects. Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication...
Show moreWith the advances in wireless communication technology and advanced positioning systems, a variety of Location-Based Services (LBS) become available to the public. Mobile users can issue location-based queries to probe their surrounding environments. One important type of query in LBS is moving monitoring queries over mobile objects. Due to the high frequency in location updates and the expensive cost of continuous query processing, server computation capacity and wireless communication bandwidth are the two limiting factors for large-scale deployment of moving object database systems. To address both of the scalability factors, distributed computing has been considered. These schemes enable moving objects to participate as a peer in query processing to substantially reduce the demand on server computation, and wireless communications associated with location updates. In the first part of this dissertation, we propose a distributed framework to process moving monitoring queries over moving objects in a spatial network environment. In the second part of this dissertation, in order to reduce the communication cost, we leverage both on-demand data access and periodic broadcast to design a new hybrid distributed solution for moving monitoring queries in an open space environment. Location-based services make our daily life more convenient. However, to receive the services, one has to reveal his/her location and query information when issuing location-based queries. This could lead to privacy breach if these personal information are possessed by some untrusted parties. In the third part of this dissertation, we introduce a new privacy protection measure called query l-diversity, and provide two cloaking algorithms to achieve both location k-anonymity and query l-diversity to better protect user privacy. In the fourth part of this dissertation, we design a hybrid three-tier architecture to help reduce privacy exposure. In the fifth part of this dissertation, we propose to use Road Network Embedding technique to process privacy protected queries.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003487, ucf:48949
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003487
-
-
Title
-
AN ARCHITECTURE FOR HIGH-PERFORMANCE PRIVACY-PRESERVING AND DISTRIBUTED DATA MINING.
-
Creator
-
Secretan, James, Georgiopoulos, Michael, University of Central Florida
-
Abstract / Description
-
This dissertation discusses the development of an architecture and associated techniques to support Privacy Preserving and Distributed Data Mining. The field of Distributed Data Mining (DDM) attempts to solve the challenges inherent in coordinating data mining tasks with databases that are geographically distributed, through the application of parallel algorithms and grid computing concepts. The closely related field of Privacy Preserving Data Mining (PPDM) adds the dimension of privacy to...
Show moreThis dissertation discusses the development of an architecture and associated techniques to support Privacy Preserving and Distributed Data Mining. The field of Distributed Data Mining (DDM) attempts to solve the challenges inherent in coordinating data mining tasks with databases that are geographically distributed, through the application of parallel algorithms and grid computing concepts. The closely related field of Privacy Preserving Data Mining (PPDM) adds the dimension of privacy to the problem, trying to find ways that organizations can collaborate to mine their databases collectively, while at the same time preserving the privacy of their records. Developing data mining algorithms for DDM and PPDM environments can be difficult and there is little software to support it. In addition, because these tasks can be computationally demanding, taking hours of even days to complete data mining tasks, organizations should be able to take advantage of high-performance and parallel computing to accelerate these tasks. Unfortunately there is no such framework that is able to provide all of these services easily for a developer. In this dissertation such a framework is developed to support the creation and execution of DDM and PPDM applications, called APHID (Architecture for Private, High-performance Integrated Data mining). The architecture allows users to flexibly and seamlessly integrate cluster and grid resources into their DDM and PPDM applications. The architecture is scalable, and is split into highly de-coupled services to ensure flexibility and extensibility. This dissertation first develops a comprehensive example algorithm, a privacy-preserving Probabilistic Neural Network (PNN), which serves a basis for analysis of the difficulties of DDM/PPDM development. The privacy-preserving PNN is the first such PNN in the literature, and provides not only a practical algorithm ready for use in privacy-preserving applications, but also a template for other data intensive algorithms, and a starting point for analyzing APHID's architectural needs. After analyzing the difficulties in the PNN algorithm's development, as well as the shortcomings of researched systems, this dissertation presents the first concrete programming model joining high performance computing resources with a privacy preserving data mining process. Unlike many of the existing PPDM development models, the platform of services is language independent, allowing layers and algorithms to be implemented in popular languages (Java, C++, Python, etc.). An implementation of a PPDM algorithm is developed in Java utilizing the new framework. Performance results are presented, showing that APHID can enable highly simplified PPDM development while speeding up resource intensive parts of the algorithm.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002853, ucf:48076
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002853
-
-
Title
-
UNCERTAINTY, IDENTIFICATION, AND PRIVACY: EXPERIMENTS IN INDIVIDUAL DECISION-MAKING.
-
Creator
-
Rivenbark, David, Harrison, Glenn, University of Central Florida
-
Abstract / Description
-
The alleged privacy paradox states that individuals report high values for personal privacy, while at the same time they report behavior that contradicts a high privacy value. This is a misconception. Reported privacy behaviors are explained by asymmetric subjective beliefs. Beliefs may or may not be uncertain, and non-neutral attitudes towards uncertainty are not necessary to explain behavior. This research was conducted in three related parts. Part one presents an experiment in individual...
Show moreThe alleged privacy paradox states that individuals report high values for personal privacy, while at the same time they report behavior that contradicts a high privacy value. This is a misconception. Reported privacy behaviors are explained by asymmetric subjective beliefs. Beliefs may or may not be uncertain, and non-neutral attitudes towards uncertainty are not necessary to explain behavior. This research was conducted in three related parts. Part one presents an experiment in individual decision making under uncertainty. EllsbergÃÂ's canonical two-color choice problem was used to estimate attitudes towards uncertainty. Subjects believed bets on the color ball drawn from EllsbergÃÂ's ambiguous urn were equally likely to pay. Estimated attitudes towards uncertainty were insignificant. Subjective expected utility explained subjectsÃÂ' choices better than uncertainty aversion and the uncertain priors model. A second treatment tested Vernon SmithÃÂ's conjecture that preferences in EllsbergÃÂ's problem would be unchanged when the ambiguous lottery is replaced by a compound objective lottery. The use of an objective compound lottery to induce uncertainty did not affect subjectsÃÂ' choices. The second part of this dissertation extended the concept of uncertainty to commodities where quality and accuracy of a quality report were potentially ambiguous. The uncertain priors model is naturally extended to allow for potentially different attitudes towards these two sources of uncertainty, quality and accuracy. As they relate to privacy, quality and accuracy of a quality report are seen as metaphors for online security and consumer trust in e-commerce, respectively. The results of parametric structural tests were mixed. Subjects made choices consistent with neutral attitudes towards uncertainty in both the quality and accuracy domains. However, allowing for uncertainty aversion in the quality domain and not the accuracy domain outperformed the alternative which only allowed for uncertainty aversion in the accuracy domain. Finally, part three integrated a public-goods game and punishment opportunities with the Becker-DeGroot-Marschak mechanism to elicit privacy values, replicating previously reported privacy behaviors. The procedures developed elicited punishment (consequence) beliefs and information confidentiality beliefs in the context of individual privacy decisions. Three contributions are made to the literature. First, by using cash rewards as a mechanism to map actions to consequences, the study eliminated hypothetical bias as a confounding behavioral factor which is pervasive in the privacy literature. Econometric results support the ÃÂ"privacy paradoxÃÂ" at levels greater than 10 percent. Second, the roles of asymmetric beliefs and attitudes towards uncertainty were identified using parametric structural likelihood methods. Subjects were, in general, uncertainty neutral and believed ÃÂ"badÃÂ" events were more likely to occur when their private information was not confidential. A third contribution is a partial test to determine which uncertain process, loss of privacy or the resolution of consequences, is of primary importance to individual decision-makers. Choices were consistent with uncertainty neutral preferences in both the privacy and consequences domains.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003251, ucf:48539
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003251
-
-
Title
-
Scene Understanding for Real Time Processing of Queries over Big Data Streaming Video.
-
Creator
-
Aved, Alexander, Hua, Kien, Foroosh, Hassan, Zou, Changchun, Ni, Liqiang, University of Central Florida
-
Abstract / Description
-
With heightened security concerns across the globe and the increasing need to monitor, preserve and protect infrastructure and public spaces to ensure proper operation, quality assurance and safety, numerous video cameras have been deployed. Accordingly, they also need to be monitored effectively and efficiently. However, relying on human operators to constantly monitor all the video streams is not scalable or cost effective. Humans can become subjective, fatigued, even exhibit bias and it is...
Show moreWith heightened security concerns across the globe and the increasing need to monitor, preserve and protect infrastructure and public spaces to ensure proper operation, quality assurance and safety, numerous video cameras have been deployed. Accordingly, they also need to be monitored effectively and efficiently. However, relying on human operators to constantly monitor all the video streams is not scalable or cost effective. Humans can become subjective, fatigued, even exhibit bias and it is difficult to maintain high levels of vigilance when capturing, searching and recognizing events that occur infrequently or in isolation.These limitations are addressed in the Live Video Database Management System (LVDBMS), a framework for managing and processing live motion imagery data. It enables rapid development of video surveillance software much like traditional database applications are developed today. Such developed video stream processing applications and ad hoc queries are able to "reuse" advanced image processing techniques that have been developed. This results in lower software development and maintenance costs. Furthermore, the LVDBMS can be intensively tested to ensure consistent quality across all associated video database applications. Its intrinsic privacy framework facilitates a formalized approach to the specification and enforcement of verifiable privacy policies. This is an important step towards enabling a general privacy certification for video surveillance systems by leveraging a standardized privacy specification language.With the potential to impact many important fields ranging from security and assembly line monitoring to wildlife studies and the environment, the broader impact of this work is clear. The privacy framework protects the general public from abusive use of surveillance technology; success in addressing the (")trust(") issue will enable many new surveillance-related applications. Although this research focuses on video surveillance, the proposed framework has the potential to support many video-based analytical applications.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004648, ucf:49900
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004648
-
-
Title
-
A COMPARATIVE ANALYSIS OF THE USA PATRIOT ACT OF 2001 TO THE USA FREEDOM ACT OF 2015: BALANCING SECURITY WITH LIBERTY.
-
Creator
-
Russo, Richard, Slaughter, David, University of Central Florida
-
Abstract / Description
-
Freedom and safety are two ideals that American citizens value greatly; however, the balance between privacy and security determines whether or not both can be achieved in a reasonable manner. Security and privacy are not mutually exclusive; however, they tend to exhibit an inverse correlation with regards to maintaining individual liberties. Security and privacy are highly beneficial, but when one is given too much weight, the other most often suffers. When the United States citizens are...
Show moreFreedom and safety are two ideals that American citizens value greatly; however, the balance between privacy and security determines whether or not both can be achieved in a reasonable manner. Security and privacy are not mutually exclusive; however, they tend to exhibit an inverse correlation with regards to maintaining individual liberties. Security and privacy are highly beneficial, but when one is given too much weight, the other most often suffers. When the United States citizens are given too much privacy through regulations, the citizens risk their well-being by not allowing the government the ability to prevent dangerous activities being done by criminals. Citizens are unable to defend themselves against foreign and domestic threats of terrorism that affect large amounts of people such as bombings in public settings; however, the federal government can help to prevent such attacks in public settings through surveillance of public areas and monitoring of internet and intracellular communications. When the United States federal government is given too much discretion in security powers through legislation, citizens are at risk of losing their civil rights granted in the Bill of Rights and in Supreme Court cases. The United States of America has had a dangerous imbalance of power in favor of national security since the adoption of the USA PATRIOT Act in 2001, and the imbalance has continued to the present even after the passage of the USA FREEDOM Act in 2015.This thesis will be a comparative analysis of the USA PATRIOT Act of 2001 to the USA FREEDOM Act of 2015. This thesis will show what specific powers are granted through provisions of the acts, whether or not the provisions are unconstitutional, how the privacy and security of American citizens will change due to the provisions in the USA FREEDOM Act, and suggestions for how the United States federal government can continue to tilt the balance between security and liberty to ensure more protection for civil liberties and a decrease in national security powers. The suggestions will include three options for gaining the protection of civil liberties and the elimination of certain national security powers and the options are through Supreme Court cases on national security laws pertaining to individual cases or states, Congress passing concurring minor bills with the proposed plan to fully repeal granted national security powers without disturbing congressional alliances on other measures, and Congress passing a single act called the State Surveillance Repeal Act in order to fully repeal the USA PATRIOT Act provisions that would still be in effect after the passage of the USA FREEDOM Act.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFH0004862, ucf:45466
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004862
-
-
Title
-
AN INVESTIGATION OF THE ECONOMIC VIABILITY AND ETHICAL RAMIFICATIONS OF VIDEO SURVEILLANCE IN THE ICU.
-
Creator
-
Bagge, Laura, Heglund, Stephen, University of Central Florida
-
Abstract / Description
-
The purpose of this review of literature is to investigate the various roles of video surveillance (VS) in the hospital's intensive care unit (ICU) as well as its legal and ethical implications. Today, hospitals spend more money on the ICU than on any other unit. By 2030, the population of those 65 and over is expected to double. 80% of older adults have at least one chronic diseases (Centers for Disease Control and Prevention, 2013). As a consequence, the demand for ICU services will likely...
Show moreThe purpose of this review of literature is to investigate the various roles of video surveillance (VS) in the hospital's intensive care unit (ICU) as well as its legal and ethical implications. Today, hospitals spend more money on the ICU than on any other unit. By 2030, the population of those 65 and over is expected to double. 80% of older adults have at least one chronic diseases (Centers for Disease Control and Prevention, 2013). As a consequence, the demand for ICU services will likely increase, which may burden hospital with additional costs.. Because of increasing economic pressures, more hospitals are using video surveillance to enhance quality care and reduce ICU costs (Goran, 2012). Research shows that VS enhances positive outcomes among patients and best practice compliance among hospital staff. The results are fewer reports of patient complications and days spent in the ICU, and an increase in reported hospital savings. In addition, VS is becoming an important tool for the families of newborns in the neonatal ICU (NICU). The belief is that the VS can facilitate parent-baby bonding. In the United States of America, privacy rights impose legal restrictions on VS. These rights come from the U.S. Constitution, Statutory law, Regulatory law, and State law. HIPPA authorizes the patient to control the use and disclosure of his or her health information. Accordingly, hospitals are under obligation to inform patients on their right to protected health information. It is appropriate that hospitals use VS for diagnostic purposes as long as they have obtained patient consent. According to modern day privacy experts Charles Fried and Alan Westin, a violation of a person's privacy equates a violation on their liberty and morality. However, if a physician suspects that a third party person is causing harm to the patient, than the use of covert VS is justifiable.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFH0004475, ucf:45138
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004475
-
-
Title
-
Networking and security solutions for VANET initial deployment stage.
-
Creator
-
Aslam, Baber, Zou, Changchun, Turgut, Damla, Bassiouni, Mostafa, Wang, Chung-Ching, University of Central Florida
-
Abstract / Description
-
Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called (")smart vehicles(")) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle...
Show moreVehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called (")smart vehicles(")) are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other hand, the vehicle to infrastructure (V2I) communication has infrastructure architecture where vehicles connect to access points deployed along roads. These access points are known as road side units (RSUs) and vehicles communicate with other vehicles/wired nodes through these RSUs. To provide various services to vehicles, RSUs are generally connected to each other and to the Internet. The direct RSU to RSU communication is also referred as I2I communication. The success of VANET depends on the existence of pervasive roadside infrastructure and sufficient number of smart vehicles. Most VANET applications and services are based on either one or both of these requirements. A fully matured VANET will have pervasive roadside network and enough vehicle density to enable VANET applications. However, the initial deployment stage of VANET will be characterized by the lack of pervasive roadside infrastructure and low market penetration of smart vehicles. It will be economically infeasible to initially install a pervasive and fully networked roadside infrastructure, which could result in the failure of applications and services that depend on V2I or I2I communications. Further, low market penetration means there are insufficient number of smart vehicles to enable V2V communication, which could result in failure of services and applications that depend on V2V communications. Non-availability of pervasive connectivity to certification authorities and dynamic locations of each vehicle will make it difficult and expensive to implement security solutions that are based on some central certificate management authority. Non-availability of pervasive connectivity will also affect the backend connectivity of vehicles to the Internet or the rest of the world. Due to economic considerations, the installation of roadside infrastructure will take a long time and will be incremental thus resulting in a heterogeneous infrastructure with non-consistent capabilities. Similarly, smart vehicles will also have varying degree of capabilities. This will result in failure of applications and services that have very strict requirements on V2I or V2V communications. We have proposed several solutions to overcome the challenges described above that will be faced during the initial deployment stage of VANET. Specifically, we have proposed: 1) a VANET architecture that can provide services with limited number of heterogeneous roadside units and smart vehicles with varying capabilities, 2) a backend connectivity solution that provides connectivity between the Internet and smart vehicles without requiring pervasive roadside infrastructure or large number of smart vehicles, 3) a security architecture that does not depend on pervasive roadside infrastructure or a fully connected V2V network and fulfills all the security requirements, and 4) optimization solutions for placement of a limited number of RSUs within a given area to provide best possible service to smart vehicles. The optimal placement solutions cover both urban areas and highways environments.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004186, ucf:48993
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004186
-
-
Title
-
Exploring Techniques for Providing Privacy in Location-Based Services Nearest Neighbor Query.
-
Creator
-
Asanya, John-Charles, Guha, Ratan, Turgut, Damla, Bassiouni, Mostafa, Zou, Changchun, Mohapatra, Ram, University of Central Florida
-
Abstract / Description
-
Increasing numbers of people are subscribing to location-based services, but as the popularity grows so are the privacy concerns. Varieties of research exist to address these privacy concerns. Each technique tries to address different models with which location-based services respond to subscribers. In this work, we present ideas to address privacy concerns for the two main models namely: the snapshot nearest neighbor query model and the continuous nearest neighbor query model. First, we...
Show moreIncreasing numbers of people are subscribing to location-based services, but as the popularity grows so are the privacy concerns. Varieties of research exist to address these privacy concerns. Each technique tries to address different models with which location-based services respond to subscribers. In this work, we present ideas to address privacy concerns for the two main models namely: the snapshot nearest neighbor query model and the continuous nearest neighbor query model. First, we address snapshot nearest neighbor query model where location-based services response represents a snapshot of point in time. In this model, we introduce a novel idea based on the concept of an open set in a topological space where points belongs to a subset called neighborhood of a point. We extend this concept to provide anonymity to real objects where each object belongs to a disjointed neighborhood such that each neighborhood contains a single object. To help identify the objects, we implement a database which dynamically scales in direct proportion with the size of the neighborhood. To retrieve information secretly and allow the database to expose only requested information, private information retrieval protocols are executed twice on the data. Our study of the implementation shows that the concept of a single object neighborhood is able to efficiently scale the database with the objects in the area.The size of the database grows with the size of the grid and the objects covered by the location-based services. Typically, creating neighborhoods, computing distances between objects in the area, and running private information retrieval protocols causes the CPU to respond slowly with this increase in database size. In order to handle a large number of objects, we explore the concept of kernel and parallel computing in GPU. We develop GPU parallel implementation of the snapshot query to handle large number of objects. In our experiment, we exploit parameter tuning. The results show that with parameter tuning and parallel computing power of GPU we are able to significantly reduce the response time as the number of objects increases. To determine response time of an application without knowledge of the intricacies of GPU architecture, we extend our analysis to predict GPU execution time. We develop the run time equation for an operation and extrapolate the run time for a problem set based on the equation, and then we provide a model to predict GPU response time.As an alternative, the snapshot nearest neighbor query privacy problem can be addressed using secure hardware computing which can eliminate the need for protecting the rest of the sub-system, minimize resource usage and network transmission time. In this approach, a secure coprocessor is used to provide privacy. We process all information inside the coprocessor to deny adversaries access to any private information. To obfuscate access pattern to external memory location, we use oblivious random access memory methodology to access the server. Experimental evaluation shows that using a secure coprocessor reduces resource usage and query response time as the size of the coverage area and objects increases.Second, we address privacy concerns in the continuous nearest neighbor query model where location-based services automatically respond to a change in object's location. In this model, we present solutions for two different types known as moving query static object and moving query moving object. For the solutions, we propose plane partition using a Voronoi diagram, and a continuous fractal space filling curve using a Hilbert curve order to create a continuous nearest neighbor relationship between the points of interest in a path. Specifically, space filling curve results in multi-dimensional to 1-dimensional object mapping where values are assigned to the objects based on proximity. To prevent subscribers from issuing a query each time there is a change in location and to reduce the response time, we introduce the concept of transition and update time to indicate where and when the nearest neighbor changes. We also introduce a database that dynamically scales with the size of the objects in a path to help obscure and relate objects. By executing the private information retrieval protocol twice on the data, the user secretly retrieves requested information from the database. The results of our experiment show that using plane partitioning and a fractal space filling curve to create nearest neighbor relationships with transition time between objects reduces the total response time.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005757, ucf:50098
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005757
-
-
Title
-
YOU'VE GOT MAIL: THE STUDY OF THE ATTORNEY-CLIENT PRIVILEGE AND THE USE OF ELECTRONIC MAIL.
-
Creator
-
McConnell, Justin, Cook, Kathy, University of Central Florida
-
Abstract / Description
-
The prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles,...
Show moreThe prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles, statutes, and texts, this thesis concluded that an attorney's communication through e-mail warrants a reasonable expectation of privacy, permitting the attorney to speak in reasonable confidence to clients through the web. However, attorneys, ethically, should consider the strong repercussions for using such a potentially transparent medium for communication. By examining the relationship between current law, the application of the attorney-client privilege, and a reasonable expectation of privacy, this study provides a comprehensive analysis for attorneys concerned with electronic mail usage. Lastly, this thesis provides attorneys with best practices for their electronic mail communications.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFH0003832, ucf:44756
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0003832
-
-
Title
-
UTILIZING EDGE IN IOT AND VIDEO STREAMING APPLICATIONS TO REDUCE BOTTLENECKS IN INTERNET TRAFFIC.
-
Creator
-
Akpinar, Kutalmis, Hua, Kien, Zou, Changchun, Turgut, Damla, Wang, Jun, University of Central Florida
-
Abstract / Description
-
There is a large increase in the surge of data over Internet due to the increasing demand on multimedia content. It is estimated that 80% of Internet traffic will be video by 2022, according to a recent study. At the same time, IoT devices on Internet will double the human population. While infrastructure standards on IoT are still nonexistent, enterprise solutions tend to encourage cloud-based solutions, causing an additional surge of data over the Internet. This study proposes solutions to...
Show moreThere is a large increase in the surge of data over Internet due to the increasing demand on multimedia content. It is estimated that 80% of Internet traffic will be video by 2022, according to a recent study. At the same time, IoT devices on Internet will double the human population. While infrastructure standards on IoT are still nonexistent, enterprise solutions tend to encourage cloud-based solutions, causing an additional surge of data over the Internet. This study proposes solutions to bring video traffic and IoT computation back to the edges of the network, so that costly Internet infrastructure upgrades are not necessary. An efficient way to prevent the Internet surge over the network for IoT is to push the application specific computation to the edge of the network, close to where the data is generated, so that large data can be eliminated before being delivered to the cloud. In this study, an event query language and processing environment is provided to process events from various devices. The query processing environment brings the application developers, sensor infrastructure providers and end users together. It uses boolean events as the streaming and processing units. This addresses the device heterogeneity and pushes the data-intense tasks to the edge of network.The second focus of the study is Video-on-Demand applications. A characteristic of VoD traffic is its high redundancy. Due to the demand on popular content, the same video traffic flows through Internet Service Provider's network as overlapping but separate streams. In previous studies on redundancy elimination, overlapping streams are merged into each other in link-level by receiving the packet only for the first stream, and re-using it for the subsequent duplicated streams. In this study, we significantly improve these techniques by introducing a merger-aware routing method.Our final focus is increasing utilization of Content Delivery Network (CDN) servers on the edge of network to reduce the long-distance traffic. The proposed system uses Software Defined Networks (SDN) to route adaptive video streaming clients to the best available CDN servers in terms of network availability. While performing the network assistance, the system does not reveal the video request information to the network provider, thus enabling privacy protection for encrypted streams. The request routing is performed in segment level for adaptive streaming. This enables to re-route the client to the best available CDN without an interruption if network conditions change during the stream.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007882, ucf:52774
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007882
-
-
Title
-
BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES.
-
Creator
-
Berrios-Ayala, Mark, Milon, Abby, University of Central Florida
-
Abstract / Description
-
Imagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM...
Show moreImagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters' (GCHQ) mass shadowing sharing plan to America's Russian inspiration, SORM. Some countries are following the United States' poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation's strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today's blurred privacy expectations.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFH0004537, ucf:45187
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004537