5 results

“I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good

Journal Article
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2014)
“I am Spartacus”: privacy enhancing technologies, collaborative obfuscation and privacy as a public good. Artificial Intelligence and Law, 22(2), 113-139. https://doi.org/10.1007/s10506-014-9155-5
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has...

A novel privacy preserving method for the location tracking of mobile devices

Journal Article
Buchanan, W. J., & Kwecka, Z. (2011)
A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,
Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these s...

Minimising collateral damage: privacy-preserving Investigative data acquisition platform.

Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...

Cryptographic privacy-preserving enhancement method for investigative data acquisition

Thesis
Kwecka, Z. (2011)
Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...

Privacy-preserving data acquisition protocol.

Conference Proceeding
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010)
Privacy-preserving data acquisition protocol. In IEEE International Conference of Computational Methods in Electrical and Electronics Engineering. , (131-136). https://doi.org/10.1109/SIBIRCON.2010.5555325
Current investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need t...