Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 248
Filtrar
1.
Sensors (Basel) ; 24(18)2024 Sep 23.
Artigo em Inglês | MEDLINE | ID: mdl-39338897

RESUMO

With the development of the Internet of Things (IoT) and edge computing, more and more devices, such as sensor nodes and intelligent automated guided vehicles (AGVs), can serve as edge devices to provide Location-Based Services (LBS) through the IoT. As the number of applications increases, there is an abundance of sensitive information in the communication process, pushing the focus of privacy protection towards the communication process and edge devices. The challenge lies in the fact that most traditional location privacy protection algorithms are not suited for the IoT with edge computing, as they primarily focus on the security of remote servers. To enhance the capability of location privacy protection, this paper proposes a novel K-anonymity algorithm based on clustering. This novel algorithm incorporates a scheme that flexibly combines real and virtual locations based on the requirements of applications. Simulation results demonstrate that the proposed algorithm significantly improves location privacy protection for the IoT with edge computing. When compared to traditional K-anonymity algorithms, the proposed algorithm further enhances the security of location privacy by expanding the potential region in which the real node may be located, thereby limiting the effectiveness of "narrow-region" attacks.

2.
PeerJ Comput Sci ; 10: e2244, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-39314722

RESUMO

A social network is a platform that users can share data through the internet. With the ever-increasing intertwining of social networks and daily existence, the accumulation of personal privacy information is steadily mounting. However, the exposure of such data could lead to disastrous consequences. To mitigate this problem, an anonymous group structure algorithm based on community structure is proposed in this article. At first, a privacy protection scheme model is designed, which can be adjusted dynamically according to the network size and user demand. Secondly, based on the community characteristics, the concept of fuzzy subordinate degree is introduced, then three kinds of community structure mining algorithms are designed: the fuzzy subordinate degree-based algorithm, the improved Kernighan-Lin algorithm, and the enhanced label propagation algorithm. At last, according to the level of privacy, different anonymous graph construction algorithms based on community structure are designed. Furthermore, the simulation experiments show that the three methods of community division can divide the network community effectively. They can be utilized at different privacy levels. In addition, the scheme can satisfy the privacy requirement with minor changes.

3.
J Lesbian Stud ; : 1-20, 2024 Aug 19.
Artigo em Inglês | MEDLINE | ID: mdl-39155789

RESUMO

This article is informed by sixteen in-depth interviews with LGBT + activists in Romania, my archive and notes during my involvement in feminist and queer activist circles, as well as archival materials of an LGBT + NGO. It proposes the concept of lesbian anonymity as a means of investigating the way in which marginal positions within mainstream movements are anonymized and their contributions to the movement dispersed within the generic queer/gay activism. By looking at specific case studies from Romaniás transition period (1989 to mid 2000s), I analyze how matters of representation were tackled within the LGBT + mainstream movements in relation to grassroots activist circles. The article explores what happens when queer gatekeepers fail to engage with internal criticisms concerning the selective erasure of certain categories of voices such as queer women, trans people, racialized people, sex workers. I argue that lesbian anonymity offers another angle of analyzing the clashes between and within different LGBT + groups in post-socialist spaces. How does lesbian anonymity shape the queer movements and why is it important to keep representational issues in mind while working on non-normative sexualities, gender, and women´s reproductive rights? This contribution offers a necessary critique of the representational gaps within queer movements.

4.
J Assist Reprod Genet ; 41(9): 2337-2347, 2024 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-39042340

RESUMO

PURPOSE: In this survey, we aimed to provide the description of previous oocyte donors' profile in a Belgian tertiary fertility hospital clinic. The research question is as follows: could certain aspects be changed or improved, according to previous oocyte donors? The final purpose is to boost adherence to future oocyte donation (OD) programs, given the large gap between supply and demand. METHODS: We set up an observational cross-sectional study of oocyte donors who were recruited in a tertiary referral hospital. Participants were asked to join an anonymous online survey with questions about demographic and reproductive variables, reasons to start or discontinue OD, satisfaction rate, experience, and attitude towards presumed anonymity. RESULTS: A total of 218 women were eligible to join the study, with a response rate of 49% (108/218). The emerging profile of the oocyte donor is a well-educated (102/108 with at least a high school degree), employed (86/108) woman in her thirties. Altruism and solidarity were the main drivers of their choice (105/108), and a general permissive attitude towards disclosure of their personal information to the recipient (60/108) was registered. In case of negative experience or discontinuation, concerns regarding pain management and specific long-lasting psychological support were expressed (8/20). CONCLUSIONS: Our findings suggest the need to improve pain relief and to offer psychological support even beyond ending the donation process. These interventions could improve both participation and adherence to OD programs, ensuring an autonomous and free choice while avoiding any risk of exploitation.


Assuntos
Doação de Oócitos , Humanos , Feminino , Doação de Oócitos/psicologia , Adulto , Estudos Transversais , Inquéritos e Questionários , Doadores de Tecidos/psicologia , Oócitos , Bélgica
5.
Andrology ; 2024 Jul 02.
Artigo em Inglês | MEDLINE | ID: mdl-38953503

RESUMO

This paper considers the practical and ethical issues related to the death of a sperm donor. It looks at whether sperm banks should check whether the donor is alive at the time the spermatozoa is made available. Knowing that the donor has died in combination with the cause of death can provide important medical information but the chance is very small. However, when the information is available, it may help to decide whether to tell previous recipients and/or to block the remaining samples for future use. A second advantage may be that the donor's offspring can be informed that contact will not be possible and that recipients who are planning to order spermatozoa from an identity-release donor can be told that the donor has died. However, these advantages presume that identifiable equals contactable while there is no strict link between these two conditions.

6.
Hum Reprod ; 39(9): 2021-2031, 2024 Sep 01.
Artigo em Inglês | MEDLINE | ID: mdl-39008824

RESUMO

STUDY QUESTION: Are donor-conceived adults in Belgium interested in obtaining donor information, and do these interests vary based on their family backgrounds? SUMMARY ANSWER: Donor-conceived adults express a significant interest in obtaining donor-related information, with the highest interest reported by offspring from heterosexual couples compared to those from lesbian couple-parented or single-parent families. WHAT IS KNOWN ALREADY: In Belgium, sperm donation is mainly anonymous, but the rise of direct-to-consumer genetic testing challenges this anonymity. STUDY DESIGN, SIZE, DURATION: This was a cross-sectional study involving an online nationwide survey conducted from July 2022 to October 2023. Participants, aged 18 years and older and being aware of their anonymous sperm donor-conceived status, were recruited through various channels. PARTICIPANTS/MATERIALS, SETTING, METHODS: A total of 203 participants were included: 62.6% grew up in heterosexual families with infertile fathers, 26.1% with lesbian couples, 8.4% with single parents, and 3.0% in various or diverse family structures. The survey was available in both French and Dutch and consisted of 43 questions, including a mix of yes/no questions and multiple-choice items. MAIN RESULTS AND THE ROLE OF CHANCE: The average age of disclosure was 16.5 years, with notably later disclosure in heterosexual couple-parented households. A substantial 82.8% of donor-conceived individuals expressed a keen interest in obtaining non-personally identifiable donor information, while 69% were curious about personally identifiable donor data. Furthermore, 61.6% conveyed a desire for personal contact with their donors, and 26.6% advocated for the inclusion of the donor's name on their birth certificates. Participants raised in lesbian two-parent families exhibited the lowest level of interest in donor-related information compared with those raised in other family structures. An overwhelming 90.1% wondered about the possibility of having half-siblings from the same sperm donor. Analysis of survey responses on DNA database registration revealed that 55.2% of donor-conceived offspring were already registered, with 68.8% discovering the same donor offspring and 30.4% successfully locating their donors. Compared to individuals from other family structures, those raised in heterosexual couple-parented households exhibit a less positive attitude toward their conception through anonymous sperm donation. About 61.6% of donor-conceived individuals reported experiencing distinct emotions compared to their peers, while 44.1% encountered psychological difficulties related to anonymous sperm donation, primarily attributed to late disclosure. The majority supported the idea of informing the donor about the number of children he facilitated to conceive. Lastly, the study highlighted that 21.2% of donor-conceived adults considered becoming donors themselves, and 31.3% expressed willingness to use an anonymous donor whenever faced with fertility challenges. LIMITATIONS, REASONS FOR CAUTION: Our sample size may not fully represent all adults conceived through anonymous sperm donation in Belgium. Participation bias may have influenced the results, especially due to the overrepresentation of participants from heterosexual couples. Additionally, an association exists between individuals raised by heterosexual couples and late disclosure, complicating the analysis by introducing a confounding factor. WIDER IMPLICATIONS OF THE FINDINGS: The findings of this study contribute to a better understanding of the needs and preferences of donor-conceived adults, with significant potential impact on patient education and healthcare policy. STUDY FUNDING/COMPETING INTEREST(S): Study funding was not obtained for this research. There are no conflicts of interest to disclose. TRIAL REGISTRATION NUMBER: N/A.


Assuntos
Doadores de Tecidos , Humanos , Bélgica , Masculino , Adulto , Feminino , Estudos Transversais , Doadores de Tecidos/psicologia , Inseminação Artificial Heteróloga/psicologia , Espermatozoides , Inquéritos e Questionários , Pessoa de Meia-Idade , Adulto Jovem , Confidencialidade/psicologia , Minorias Sexuais e de Gênero/psicologia , Minorias Sexuais e de Gênero/estatística & dados numéricos , Heterossexualidade/psicologia , Heterossexualidade/estatística & dados numéricos , Adolescente , Homossexualidade Feminina/psicologia
7.
Med Law Rev ; 2024 Jul 27.
Artigo em Inglês | MEDLINE | ID: mdl-39067441

RESUMO

In this article, using theories of procedural justice and 'slow violence', we consider potential reform of the Human Fertilisation and Embryology Act 1990. Our theoretical discussion is underpinned by findings from the ConnecteDNA project, exploring how people affected by donor conception experience direct-to-consumer genetic testing (DTCGT). The negative impacts of DTCGT, especially shock discoveries about the circumstances of someone's conception in adulthood, are linked to donor anonymity, and how its continued protection is experienced as a barrier to the rights and agency of donor-conceived people. We focus on two key issues relating to the donor information access process set out in section 31ZA of the 1990 Act. The first is that it excludes certain cohorts of donor-conceived people, creating inequalities of access to donor information. The second is the impact of the use of DTCGT to search for that information. We discuss what a procedurally just process of law reform would look like, concluding that, whatever (prospective) approach to donor anonymity is taken, the donor information access process should be the same for all donor-conceived people. We thus argue that, even were the status quo to be maintained, reform of the donor information access process with retrospective effect would be required.

8.
Sensors (Basel) ; 24(7)2024 Mar 29.
Artigo em Inglês | MEDLINE | ID: mdl-38610426

RESUMO

Decentralized Identifiers have recently expanded into Internet of Things devices and are crucial in securing users' digital identities and data. However, Decentralized Identifiers face challenges in scenarios necessitating authority delegation and anonymity, such as when dealing with legal guardianship for minors, device loss or damage, and specific medical contexts involving patient information. This paper aims to strengthen data sovereignty within the Decentralized Identifier system by implementing a secure authority delegation and anonymity scheme. It suggests optimizing verifiable presentations by utilizing a sequential aggregate signature, a Non-Interactive Zero-Knowledge Proof, and a Merkle tree to prevent against linkage and Sybil attacks while facilitating delegation. This strategy mitigates security risks related to delegation and anonymity, efficiently reduces the computational and verification efforts for signatures, and reduces the size of verifiable presentations by about 1.2 to 2 times.

9.
Psychoanal Q ; 93(1): 135-156, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38578264

RESUMO

This paper plays with the possibilities of writing about psychoanalytic work in different ways with different levels of disclosure about both patient and analyst. Various issues around anonymity, confidentiality, consent and identity are explored, highlighting the many questions that come up. These issues of how to write psychoanalytically are also addressed from the point of view of culture and the sociopolitical gestalt of our time.


Assuntos
Psicanálise , Terapia Psicanalítica , Humanos , Revelação , Confidencialidade , Redação
10.
Heliyon ; 10(7): e27177, 2024 Apr 15.
Artigo em Inglês | MEDLINE | ID: mdl-38601685

RESUMO

The Internet of Things (IoT) is a network of intelligent devices especially in healthcare-based systems. Internet of Medical Things (IoMT) uses wearable sensors to collect data and transmit to central repositories. The security and privacy of healthcare data is a challenging task. The aim of the study is to provide a secure data sharing mechanism. The existing studies provide secure data sharing schemes but still have limitations in terms of hiding the patient identify in the messages exchanged to upload the data on central repositories. This paper presents a Secure Aggregated Data Collection and Transmission (SADCT) that provides anonymity for the identities of patient's mobile device and the intermediate fog nodes. Our system involves an authenticated server for node registration and authentication by saving security credentials. The proposed scheme presents the novel data aggregation algorithm at the mobile device, and the data extraction algorithm at the fog node. The work is validated through extensive simulations in NS along with a security analysis. Results prove the supremacy of SADCT in terms of energy consumption, storage, communication, and computational costs.

11.
JMIR Form Res ; 8: e47248, 2024 Mar 25.
Artigo em Inglês | MEDLINE | ID: mdl-38526530

RESUMO

BACKGROUND: Over the previous 4 decennial censuses, the population of the United States has grown older, with the proportion of individuals aged at least 90 years old in the 2010 census being more than 2 and a half times what it was in the 1980 census. This suggests that the threshold for constraining age introduced in the Safe Harbor method of the HIPAA (Health Insurance Portability and Accountability Act) in 1996 may be increased without exceeding the original levels of risk. This is desirable to maintain or even increase the utility of affected data sets without compromising privacy. OBJECTIVE: In light of the upcoming release of 2020 census data, this study presents a straightforward recipe for updating age-constrained thresholds in the context of new census data and derives recommendations for new thresholds from the 2010 census. METHODS: Using census data dating back to 1980, we used group size considerations to analyze the risk associated with various maximum age thresholds over time. We inferred the level of risk of the age cutoff of 90 years at the time of HIPAA's inception in 1996 and used this as a baseline from which to recommend updated cutoffs. RESULTS: The maximum age threshold may be increased by at least 2 years without exceeding the levels of risk conferred in HIPAA's original recommendations. Moreover, in the presence of additional information that restricts the population in question to a known subgroup with increased longevity (for example, restricting to female patients), the threshold may be increased further. CONCLUSIONS: Increasing the maximum age threshold would enable the data user to gain more utility from the data without introducing risk beyond what was originally envisioned with the enactment of HIPAA. Going forward, a recurring update of such thresholds is advised, in line with the considerations detailed in the paper.

12.
PeerJ Comput Sci ; 10: e1791, 2024.
Artigo em Inglês | MEDLINE | ID: mdl-38435543

RESUMO

In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security. The hardness assumption of the constructed PAKE is based on newly proposed hard lattice problem, BiGISIS. The main aim of this article is to provide a solution for the post-quantum secure PAKE scheme, which is one of the open problems in the literature. The proposed PAKE is the first BiGISIS-based PAKE that satisfies anonymity and reusable key features. The bilateral-pasteurization (BiP) approach is used to obtain the reusable key, and anonymity is achieved thanks to the additional identity components and hash functions. The reusable key structure reduces the time in the key generation, and anonymity prevents illegal user login attempts. The security analysis is done by following the real-or-random (RoR) model assumptions. As a result of security examinations, perfect forward secrecy (PFS) and integrity are satisfied, and the resistance against eavesdropping, manipulation-based attack (MBA), hash function simulation, impersonation, signal leakage attack (SLA), man-in-the-middle (MitM), known-key security (KKS), and offline password dictionary attack (PDA) is captured. According to the comparison analysis, the proposed PAKE is the first SLA-resistant lattice-based PAKE with reusable key and anonymity properties.

13.
Ann Biol Clin (Paris) ; 81(6): 621-627, 2024 02 24.
Artigo em Francês | MEDLINE | ID: mdl-38189359

RESUMO

Since 1994, in France, bioethics law has set the regulatory framework for Medically Assisted Reproduction (MAR). The latest revision of the law of August 2, 2021, is characterized by major upheavals in the field of MAR and intervenes in several areas: the purpose and conditions to access to MAR, access to origins in the case of gamete or embryo donation, and gametes cryopreservation without medical indication. Indeed, the law authorizes, because of a strong societal demand, the extension of sperm donation to couples of women and unmarried women, as well as the possibility for any person to preserve his/her gametes if he/she meets the age criteria defined by decree. Finally, the law opens the possibility for people born following gamete or embryo donation to have access, from their 18th anniversary, to identifying and/or non-identifying data. These new measures have led to a very important number of MAR requests to fertility and donation centers, and have required the implementation of new circuits in order to harmonize care, without discrimination or prioritization.


Assuntos
Bioética , Técnicas de Reprodução Assistida , Humanos , Masculino , Feminino , Destinação do Embrião , Sêmen , Biologia
14.
Entropy (Basel) ; 26(1)2024 Jan 15.
Artigo em Inglês | MEDLINE | ID: mdl-38248199

RESUMO

The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts generated under different identities while preserving the confidentiality. Subsequently, for the sake of the confidentiality and authenticity of the data, the identity-based signcryption with equality test (IBSC-ET) has been put forward. Nevertheless, the existing schemes do not consider the anonymity of the sender and the receiver, which leads to the potential leakage of sensitive personal information. How to ensure confidentiality, authenticity, and anonymity in the IBEET setting remains a significant challenge. In this paper, we put forward the concept of the identity-based matchmaking encryption with equality test (IBME-ET) to address this issue. We formalized the system model, the definition, and the security models of the IBME-ET and, then, put forward a concrete scheme. Furthermore, our scheme was confirmed to be secure and practical by proving its security and evaluating its performance.

15.
Aggress Behav ; 50(1): e22117, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37882218

RESUMO

The purpose of the current research was to test the dual processes involved in predicting cyberbullying perpetration in a sample of US parent-child dyads. The Barlett Gentile cyberbullying model (BGCM) posits how positive cyberbullying attitudes mediate the relationship between anonymity perceptions and cyberbullying perpetration; however, less is known about (a) whether this mediated link is significant for youth and adults alike, (b) if the strength of the relationships in the BGCM differ between youth and adults, and (c) the role of child (or parent) perceptions of their parent's (or child's) cyberbullying behavior has on cyberbullying. Two hundred US parent-child dyads completed measures to assess cyberbullying perpetration, cyberbullying attitudes, cyberbullying perceptions, and anonymity perceptions. Results showed support for BGCM postulates for parents and adolescents; however, the mediated relationship was stronger for youth than adults. Moreover, cyberbullying perceptions correlated strongly with cyberbullying attitudes and cyberbullying perpetration. Results are discussed in terms of theory and intervention applications.


Assuntos
Comportamento do Adolescente , Bullying , Vítimas de Crime , Cyberbullying , Adulto , Humanos , Adolescente , Atitude , Pais
16.
Reprod Biomed Online ; 48(1): 103421, 2024 Jan.
Artigo em Inglês | MEDLINE | ID: mdl-37976658

RESUMO

RESEARCH QUESTION: What effect does direct-to-consumer genetic testing (DTCGT) have on information finding and sharing in relation to gamete donor conception? DESIGN: This study used in-depth qualitative interviews with parents through donor conception, donors, the relatives of donors and donor-conceived people who have used, or considered using, DTCGT. Interviews were conducted between September 2021 and February 2023. Sixty people defined themselves as having been affected by donor conception and DTCGT. Fifty-seven of these were resident in the UK at the time of interview. The final sample included 19 (spermatozoa, egg or embryo) donors, 25 donor-conceived people, 20 parents through donor conception and two relatives of donors. Five participants occupied more than one of these roles. RESULTS: The rise of DTCGT is affecting how information about donor conception is managed: it shifts patterns of knowledge about donor conception; increases flexibility regarding the age of access to information about donor relatives; can lead to a growing role for non-professionals, including wider family members, in gatekeeping information about donor conception; accentuates the effect of donor conception for donors' and the relatives of donor-conceived people; and shapes, and is shaped, by the formal regulatory donor information management systems. CONCLUSION: Fertility professionals should inform people using, or considering, donor conception, or (potential) donors, about the different ways DTCGT can affect sharing information about donor conception. Support is needed for those affected by these changes.


Assuntos
Concepção por Doadores , Inseminação Artificial Heteróloga , Masculino , Humanos , Revelação , Confidencialidade , Doação de Oócitos , Células Germinativas , Doadores de Tecidos , Testes Genéticos
17.
J Obstet Gynaecol Can ; 46(4): 102337, 2024 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-38160797

RESUMO

OBJECTIVE: To study the preference of sperm donors with identity disclosure (ID) versus anonymous donors (AD) and to understand if this selection affects clinical outcomes in an Israeli population. METHODS: This retrospective study included patients who chose imported sperm donation during 2017-2021. Of these, 526 used their own (autologous) oocytes and 43 patients used donated oocytes (DO). The primary endpoint was the type of chosen donor with ID versus AD. We examined the tendency toward ID according to demographic parameters and the theoretical impact of donor-type selection on reproductive outcome and compared patients who performed cycles with autologous oocytes with those using DO. RESULTS: Single women had a significantly higher probability of choosing sperm donors with ID than heterosexual couples (55.6% vs. 33.3%, OR 2.5, CI 95% 1.52-4.11, P < 0.001). Although not significant, same-sex couples were more likely to choose sperm donors with ID than heterosexual couples (49.1% vs. 33.3%, OR 1.93, CI 95% 0.97-3.85, P = 0.06). Sperm donor samples, 2501 vials, were imported. It was performed 698 intra-uterine insemination and 812 in vitro fertilization cycles were performed, respectively, resulting in 283 pregnancies without differences between patients who chose sperm donors with ID versus AD sperm. No significant differences were observed regarding the option for sperm donors with ID between patients using DO (44.2%) and those using autologous oocytes (51.3%). CONCLUSION: While ID is important for a certain section (mainly single) of recipients, it is far from the only dominant factor during donor selection. Sperm donation type does not impact clinical outcomes.


Assuntos
Doadores de Tecidos , Humanos , Feminino , Masculino , Estudos Retrospectivos , Adulto , Doadores de Tecidos/psicologia , Israel , Revelação , Espermatozoides , Gravidez , Doação de Oócitos
18.
Front Public Health ; 11: 1272787, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-38089022

RESUMO

The Hyperledger Fabric (HF) framework is widely studied for securing electronic health records (EHRs) in the healthcare sector. Despite the various cross-domain blockchain technology (BCT) applications, little is known about the role of the HF framework in healthcare. The purpose of the systematic literature review (SLR) is to review the existing literature on the HF framework and its applications in healthcare. This SLR includes literature published between January 2015 and March 2023 in the ACM digital library, IEEE Xplore, SCOPUS, Springer, PubMed, and Google Scholar databases. Following the inclusion and exclusion criteria, a total of 57 articles emerged as eligible for this SLR. The HF framework was found to be useful in securing health records coming from the Internet of Medical Things (IoMT) and many other devices. The main causes behind using the HF framework were identified as privacy and security, integrity, traceability, and availability of health records. Additionally, storage issues with transactional data over the blockchain are reduced by the use of the HF framework. This SLR also highlights potential future research trends to ensure the high-level security of health records.


Assuntos
Blockchain , Registros Eletrônicos de Saúde , Atenção à Saúde , Privacidade , Tecnologia
19.
Heliyon ; 9(12): e22934, 2023 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-38125484

RESUMO

Although various cases of inappropriate use of anonymous news sources have shaken journalistic practice in the past and encouraged media organizations to act and tighten editorial policies, they remain at the center of journalistic practice. In times of rising demands from media consumers for increased transparency in media content and journalism grounded on ethical principles, the issue of anonymous sources presents an important stage. In our study, we conducted content analysis on four Slovenian daily newspapers which held the largest readership share, during the period from October 1 to December 31, 2021, to explore the extent of the use of anonymous sources of information and how they are employed. In addition, we analyzed the relationship between the use of anonymous sources and various topics of the news stories, the type and sentiment of information. It was found that information from anonymous sources is often of a primary type and neutral in sentiment. According to our research, the sentiment of anonymous information is not related to the content. The connection between the topic of the news story and the type of anonymous information was recognized in the case of reporting on the public sector. Furthermore, articles contained minimal specific descriptions about the sources, providing very limited information about their use. Our study revealed an exceptionally low share of provided explanation on the approval of anonymity for media consumers with very general and generic reasons.

20.
Sensors (Basel) ; 23(24)2023 Dec 06.
Artigo em Inglês | MEDLINE | ID: mdl-38139504

RESUMO

With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing. When constructing virtual trajectories, most existing trajectory k-anonymity methods just consider point similarity, which results in a large dummy trajectory space. Suppose there are n similar point sets, each consisting of m points. The size of the space is then mn. Furthermore, to choose suitable k- 1 dummy trajectories for a given real trajectory, these methods need to evaluate the similarity between each trajectory in the space and the real trajectory, leading to a large performance overhead. To address these challenges, this paper proposes a k-anonymity trajectory privacy protection method based on the similarity of sub-trajectories. This method not only considers the multidimensional similarity of points, but also synthetically considers the area between the historic sub-trajectories and the real sub-trajectories to more fully describe the similarity between sub-trajectories. By quantifying the area enclosed by sub-trajectories, we can more accurately capture the spatial relationship between trajectories. Finally, our approach generates k-1 dummy trajectories that are indistinguishable from real trajectories, effectively achieving k-anonymity for a given trajectory. Furthermore, our proposed method utilizes real historic sub-trajectories to generate dummy trajectories, making them more authentic and providing better privacy protection for real trajectories. In comparison to other frequently employed trajectory privacy protection methods, our method has a better privacy protection effect, higher data quality, and better performance.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA