Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
          ...
     ...
                                                                       ...
•   •   •       •                                  ...
                 ...
Existing tools to communicate and evaluateprivacy.Do you know if this existed?WeaknessesSubjectiveInconsiste...
                 
                     ...
 ...
                                                                                ...
                                                                                     ...
                 ...
    ...
               ...
      ...
                                                 ...
                  ...
                          – ...
                                 
                         
Upcoming SlideShare
Loading in …5
×

[participants Communicating Privacy Risks to Users] EINS summer school

1,432 views

Published on

Network of Excellence Internet Science Summer School. The theme of the summer school is "Internet Privacy and Identity, Trust and Reputation Mechanisms".
More information: http://www.internet-science.eu/

Authors:
Noor-ul-hassan Shirazi, Rob Heyman, Alison Cies, Mahdi Asadpour, Mehdi Riahi, Qinghua Wu, Joanna Kulesza, Laura Sartori

  • Be the first to comment

  • Be the first to like this

[participants Communicating Privacy Risks to Users] EINS summer school

  1. 1.           
  2. 2.                
  3. 3.                      
  4. 4. • • •     •     
  5. 5.                              
  6. 6. Existing tools to communicate and evaluateprivacy.Do you know if this existed?WeaknessesSubjectiveInconsistentNot as user centric approachNo trusted third partyLack of standard format 
  7. 7.  
  8. 8.                                                                            “                                                                       
  9. 9.   
  10. 10.           
  11. 11.                  
  12. 12.                                                                       
  13. 13.                 
  14. 14.                                 
  15. 15.                
  16. 16.                                                                     
  17. 17.                                 
  18. 18.    –  
  19. 19.   
  20. 20.    

×