IEEE Organizations related to Privacy, Security, And Human Rights

Back to Top


Conferences related to Privacy, Security, And Human Rights

Back to Top

2019 21st International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSocCISTC(Communications & Information Security Technical Community), and IEEE ComSocONTC(Optical Networking Technical Community), the ICACT(International Conference onAdvanced Communications Technology) Conference has been providing an open forum forscholars, researchers, and engineers to the extensive exchange of information on newlyemerging technologies, standards, services, and applications in the area of the advancedcommunications technology. The conference official language is English. All the presentedpapers have been published in the Conference Proceedings, and posted on the ICACT Websiteand IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Awardlist has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papersare subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issue by GIRI

  • 2004 6th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2018 20th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI


2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)

Advances in pervasive systems and infrastructures: middleware systems and services; large-scale data management for pervasive computing; clouds, cloudlets, and fog computing; device-to-device coordination; Internet of Thing.Theoretical and analytical models and algorithms: context modeling and reasoning; adaptive and context-aware computing; activity recognition; programing paradigmsDomain-specific challenges and novel applications: pervasive technologies for healthcare, sport, smart homes and buildings, smart manufacturing (Industry 4.0), smart citiesIntersections of pervasive computing and communications with other research areas: social networks; urban/mobile crowd sensing & intelligence; opportunistic networks; big data.New techniques for user-level concerns: participatory and social sensing; trust, security, and privacy; user interfaces, interaction, and persuasionTechnological innovations: architectures, protocols, and technologies for pervasive communications


2018 IEEE International Symposium on Technology and Society (ISTAS)

ISTAS is a multi-disciplinary and interdisciplinary forum for engineers, policy makers, entrepreneurs, philosophers, researchers, social scientists, technologists, and polymaths to collaborate, exchange experiences, and discuss the social implications of technology.


2018 10th International Conference on Cyber Conflict (CyCon)

Conflict and actors in cyberspaceCyber capabilitiesTechnical challenges, innovations and requirementsInternet of thingsInternational law and normsInternational cooperation

  • 2011 3rd International Conference on Cyber Conflict (ICCC)

    The International Conference on Cyber Conflict is the CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts (see http://www.ccdcoe.org/ICCC). In 2011 the conference will focus on combination of defensive and offensive aspects of Cyber Forces and will combine different views on cyber defence and operations in the current and envisaged threat environments. This shall not be limited to military perspective. Legal, strategic and tec

  • 2012 4th International Conference on Cyber Conflict (CYCON)

    The 4th International Conference on Cyber Conflict 2012 (CYCON 2012) will provide a multi-disciplinary forum for scholars, researchers, analysts and practitioners to discuss issues related to cyber conflict and warfare. The conference aspires to advance scientific knowledge and understanding and to support the development of related policies, models and systems.

  • 2013 5th International Conference on Cyber Conflict (CyCon)

    Technical, strategic and legal implications of using automaticmethods to manage cyber conflicts. Conceptual Framework of Cyber ConflictsConcepts for using automatic methods in cyber conflictActors in cyber conflictAutomation of Tactical, Operational and Strategic Procedures in Cyber ConflictsCase Studies, Experiments and SystemsCyber Conflict ModelsReasoning and Attribution in Cyber Conflict targeting and Cyber Attack Impact Assessment

  • 2014 6th International Conference on Cyber Conflict (CyCon)

    The International Conference on Cyber Conflict is CCD COE's annual event that brings together strategic, technical and legal experts to discuss current key aspects of cyber conflicts . The theme of the conference is Active Cyber Defence.

  • 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace(CyCon)

    International cooperation and international relations with regards to cyberspace;Technical challenges and requirements;Conflict in cyberspace;Regulations and standards;Virtualisation

  • 2016 8th International Conference on Cyber Conflict (CyCon)

    In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace. Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

  • 2017 9th International Conference on Cyber Conflict (CyCon)

    International cooperation and international relations with regards to cyberspace; Technical challenges and requirements; Conflict in cyberspace; Regulations and standards; virtualisation


2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)

IPDPS is an international forum for engineers and scientists from around the world to presenttheir latest research findings in all aspects of parallel computation. In addition to technicalsessions of submitted paper presentations, the meeting offers workshops, tutorials, andcommercial presentations & exhibits.IPDPS represents a unique international gathering of computer scientists from around the world.Now, more than ever, we prize this annual meeting as a testament to the strength ofinternational cooperation in seeking to apply computer science technology to the betterment ofour global village.



Periodicals related to Privacy, Security, And Human Rights

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Proceedings of the IEEE

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics. This journal also holds the distinction of having the longest useful archival life of any EE or computer related journal in the world! Since 1913, the Proceedings of the IEEE has been the ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...



Most published Xplore authors for Privacy, Security, And Human Rights

Back to Top

Xplore Articles related to Privacy, Security, And Human Rights

Back to Top

HIPAA Security Enforcement Is Here

IEEE Security & Privacy, 2008

Enforcement has been slow in coming for the administrative simplification rules under the US's Health Insurance Portability and Accountability Act (HIPAA). For more than five years, the Office of Civil Rights in the Department of Health and Human Services (HHS) has been responding to criticism that it has not been enforcing HIPAA's privacy rule as evidenced by its lack of ...


Is privacy a human right? An empirical examination in a global context

2015 13th Annual Conference on Privacy, Security and Trust (PST), 2015

Privacy has become an emergent concern in today's digital society. Although scholars have defined privacy from different perspectives, it is still a complex and ambiguous concept. The absence of a concrete concept of privacy impedes the development of privacy legislation and policies in a global context. Therefore, a cross-cultural/national understanding of privacy is urgently needed for establishing a global privacy ...


A Requirement Analysis for Privacy Preserving Biometrics in View of Universal Human Rights and Data Protection Regulation

2018 26th European Signal Processing Conference (EUSIPCO), 2018

Data Protection (DP) and Universal Human Rights are extremely relevant to biometrics, where inherently private data is used for authentication purposes. In this context this paper stresses that there are significant challenges beyond biometric authentication. For example, it has been shown in the existing literature that medical information of a skin disease from a fingerprint, symptoms of diabetes on the ...


Welcome to the world of human rights: please make yourself uncomfortable

2013 IEEE Security and Privacy Workshops, 2013

We draw an ethical analogy between Internet freedom efforts and humanitarian aid work. This parallel motivates a number of ethical questions relating to anonymity and censorship-circumvention research.


A conference user interface supporting different access rights to shared hypermedia

Proceedings. 3rd Asia Pacific Computer Human Interaction (Cat. No.98EX110), 1998

In distributed conference systems, participants get access to the shared documents through the computer network. The authors describe requirements in distributed conferences regarding access rights to shared documents. We give four categories of hypermedia representation based on access rights and two principles of human interface design to avoid mismatch between access rights and oral communication. We have developed the Channel ...



Educational Resources on Privacy, Security, And Human Rights

Back to Top

IEEE.tv Videos

Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Public Knowledge/Access Now Panel - Internet Inclusion: Global Connect Stakeholders Advancing Solutions, Washington DC, 2016
Lightning Talks - Internet Inclusion: Global Connect Stakeholders Advancing Solutions, Washington DC, 2016
Tutorial 2: 5G Security & Privacy - NetSoft 2020 Conference
Luca Bolognini: Internet of Things: Privacy and Security Challenges - WF-IoT 2015
Social Implications: Perils & Promises of AI - IEEE AI & Ethics Summit 2016
Designing Privacy Into Internet Protocols - Juan Carlos Zuniga keynote
Antonio Skarmeta: Security and Privacy in the Internet of Things - WF-IoT 2015
GHTC 2012 Jim Fruchterman Keynote
Glenn Fink on Priorities for IoT Security and Privacy From Here to 2020: End to End Trust and Security Workshop for the Internet of Things 2016
Security and Privacy in a World of Connected Devices
Adventures in Usable Privacy and Security: From Empirical Studies to Public Policy - IEEE SecDev 2016
IEEE 5G Podcast with the Experts: 5G Security Part 1: Foundational Security Capabilities
IEEE 5G Podcast with the Experts - 5G Security Part 1: Foundational Security Capabilities
Privacy, security, and innovation challenges in different aspects of IoT - Panel from ETAP Forum, February 2016
Big Data & the Cloud: Privacy and Security issues
IEEE World Forum on Internet of Things - Milan, Italy - Sara Foresti - Data Security and Privacy in the Internet of Things - Part 1
Panelist: Chaim Cohen - ETAP Delhi 2016
IEEE Summit on Internet Governance 2014: Panel II - Security vs. Privacy
Antonio Skarmeta: IoT Security and Privacy - Industry Forum Panel Introduction: WF IoT 2016

IEEE-USA E-Books

  • HIPAA Security Enforcement Is Here

    Enforcement has been slow in coming for the administrative simplification rules under the US's Health Insurance Portability and Accountability Act (HIPAA). For more than five years, the Office of Civil Rights in the Department of Health and Human Services (HHS) has been responding to criticism that it has not been enforcing HIPAA's privacy rule as evidenced by its lack of formal enforcement penalties during this period. At the same time, although reports of security breaches continue to grow, no enforcement efforts have occurred related to HIPAA's security rule. This now appears to be changing, at least incrementally, with three new enforcement developments in the information security area. These actions, taken together, clearly demonstrate that we've entered a new era for HIPAA enforcement. They also provide healthcare companies with a wide range of useful information about areas of potential concern for security compliance, along with clues as to how HHS might proceed.

  • Is privacy a human right? An empirical examination in a global context

    Privacy has become an emergent concern in today's digital society. Although scholars have defined privacy from different perspectives, it is still a complex and ambiguous concept. The absence of a concrete concept of privacy impedes the development of privacy legislation and policies in a global context. Therefore, a cross-cultural/national understanding of privacy is urgently needed for establishing a global privacy protocol. This empirical study seeks to better understand privacy by exploring public beliefs of privacy in a global context and further investigating socio-cultural influences on these beliefs. First, we explored general global public beliefs of privacy and then analyzed associations among privacy beliefs and socio- cultural factors. We also investigated the important issue of whether the general global public sees privacy as a “human right.” Results show that most participants agreed with concepts of privacy as a right. However, people had more diverse views on privacy as a right not to be annoyed and social norm privacy concepts. Importantly, nearly eighty percent of people believed in privacy as a human right and nearly seventy percent disagreed with privacy as a concern only for those having something to hide. In the era of globalization, our study provides a bottom-up understanding of privacy beliefs that we believe is essential for the development of global privacy regulation and policies.

  • A Requirement Analysis for Privacy Preserving Biometrics in View of Universal Human Rights and Data Protection Regulation

    Data Protection (DP) and Universal Human Rights are extremely relevant to biometrics, where inherently private data is used for authentication purposes. In this context this paper stresses that there are significant challenges beyond biometric authentication. For example, it has been shown in the existing literature that medical information of a skin disease from a fingerprint, symptoms of diabetes on the retina, or diseases affecting one's walk can be extracted from biometric recordings. We address the derived privacy challenges in biometrics by a careful review of relevant aspects of the universal human rights from UN documents and the EU General Data Protection Regulation (GDPR) with a first identification and enumeration of relevant attributes. From the derived privacy sensitive attributes and respective requirements, de-identification approaches to protection of soft biometrics in face and fingerprints are explored. In consideration of these techniques, there is the question of what constitutes legal and moral biometric signal processing presently in the state-of-the-art, as well as motivation for further work towards fulfilling the criteria.

  • Welcome to the world of human rights: please make yourself uncomfortable

    We draw an ethical analogy between Internet freedom efforts and humanitarian aid work. This parallel motivates a number of ethical questions relating to anonymity and censorship-circumvention research.

  • A conference user interface supporting different access rights to shared hypermedia

    In distributed conference systems, participants get access to the shared documents through the computer network. The authors describe requirements in distributed conferences regarding access rights to shared documents. We give four categories of hypermedia representation based on access rights and two principles of human interface design to avoid mismatch between access rights and oral communication. We have developed the Channel Checker, which supports Non-WYSIWIS user interface for hypermedia based conferences. It allows participants to confirm users' access rights information and to communicate smoothly in conferences. By using this interface, users can synchronize the audio communication channel changes with their pointer on the shared document browser. The prototype of the Channel Checker is implemented on Java and JavaScript with an HTML browser.

  • Freedom of Encryption

    Legislation surrounding digital privacy has seen quite an upheaval in recent years. The introduction of the General Data Protection Regulation (GDPR) in the EU, and new resolutions within the United Nations Human Rights Council (UNHRC) have recognized the urgency to include recommendations on the use of encryption to protect the digital identities of citizens. In this work, we meander through the main events in history which have shaped the legislative landscape that encompasses the use of encryption, paying particular attention to recent (post-Snowden) developments.

  • Demythifying Cybersecurity

    A large part of computer security education is tackling myths that support much of the practice in the field. By examining these myths and the underlying truths or heuristics they reflect, we learn three things. First, students and practitioners learn to separate what is empirically and theoretically supported from what is supported solely by untested anecdotes or handeddown "best practices." Second, a key part of education is the human dimension of convincing others that stories that sound right aren't proven and might in fact be wrong. They aren't necessarily wrong-but this possibility must be considered. Finally, we can consider myths from the perspective of teaching stories, because many evolve from activities that at one time were true or that have some accurate elements.

  • Privacy Rights Management for Privacy Compliance Systems

    The worldwide growth of e-services has brought to the forefront the importance of citizen privacy management. Korba and Kenny proposed a privacy rights management system in order to support the privacy principles derived from EU Data Directive 95/46/EC of the European Parliament and the Council of 24 October 1995. In this paper, we extend their system by proposing a privacy rights management framework for entity modeling and expression. The proposed framework manages and monitors the use of personal information. In addition, it provides interoperable mechanisms to support privacy compliance systems.

  • Data protection in the university setting: employee perceptions of student privacy

    The right to privacy is not absolute and is often established by context and the need to know. The nature of the university environment sometimes distorts the sanctity of privacy because the "need to know" is so profuse. Although students are guaranteed the right to keep essential but confidential information private under the Family Educational Rights and Privacy Act of 1974, student data are vulnerable because of the need for academic departments to share and manage these data. Recent articles in the popular press suggest consumers as a whole are questioning organizational practices that are designed to protect their personal information. Similar practices occur in the university setting, but fewer concerns are being publicized. Because of the vast amount of data sharing that occurs in an academic setting, it is imperative that we ensure the employees adhere to privacy policies that are structured to impose conscientious behaviors. University privacy policies are in practice, but there is no method of determining their effectiveness. This research seeks to ascertain the attitudes of employees regarding student privacy. Using a 15-item instrument, this study explores employees' privacy perceptions of a large university located in the Southeastern USA. Our study examines the level of concerns employees have concerning errors in, unauthorized secondary use of, improper access to and collection of data.

  • Impact of cyberspace on human rights and democracy

    This paper focuses on the asserted `boundlessness' of cyberspace in order to examine how and to what extent jurisdiction, in its various meaning and forms (jurisdiction to prescribe, to adjudicate and to execute), over activities taking place in the cyberspace may be asserted and even exercised, based on traditional jurisdictional links and also on new trends. The paper also examines conflicts of law in civilian (mainly tort laws and laws on the protection of rights of the personality as well as intellectual property) and criminal matters. Determining what set of rules applies to a certain fact or situation implies a reference to those rules establishing where such a fact or situation has legally taken place and is to be localised (locus commissi delicti), and a reference to main criteria including those focusing on the conduct, the localisation of the hardware, the effect, the access to the informatics system, the accessibility of the information and future trends. The paper further highlights that the enforcement of activities in cyberspace appears to be affected by an assimilation to traditional forms of investigative activities, such as search or inspection or even the interception of communication or data flow, which are to a certain degree misleading in respect of the specific means employed. A specific reference to the role of providers in enforcement activities is also included. The second part of the paper deals with the traditional human rights relevant to cyberspace and to the broader concept of `right to access' cyberspace, as well as the uncertainties derived from the fact that a plurality of state and non- state actors may limit and interfere with human rights in cyberspace. The paper specifically deals with the commercial dimension of cyberspace and with eventual corporate liability for human rights violation (multinational corporations violating rights to privacy in connection with or on behalf of states or enforcing censorship) based on US legislation and also taking into consideration European trends. The paper finally highlights the supportive role to the protection of human rights of regulatory bodies enforcing fair- trade and anti-trust regulations, and the multinational dimension of free trade in promoting human rights, by eventually considering restrictions in cyberspace and censorship as restrictions to trade under WTO agreements.



Standards related to Privacy, Security, And Human Rights

Back to Top

No standards are currently tagged "Privacy, Security, And Human Rights"