Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Edward Snowden: Whistleblower and Data Privacy Advocate
Graph Chatbot
Related lectures (32)
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Désanonymisation: Risks and Techniques
Explores risks and techniques in de-anonymizing data, including flaws in methods and real-world examples of failed attempts.
Cloud and Aggregation
Explores cloud computing, data aggregation, security threats, privacy issues, encryption, de-identification, and data privacy in the digital era.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
Machine Learning Security
Explores machine learning security, including model stealing, altering outputs, adversarial conditions, and privacy challenges, emphasizing the importance of addressing biases in machine learning models.
SwissCovid and Privacy
Explores SwissCovid encryption, key verification, and privacy challenges in contact tracing.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
Privacy Sphere and Data Protection
Covers privacy sphere, data protection, risks of data misuse, laws, and real-world breach cases.
Data Protection Law: Principles and Rights
Covers the principles and rights of data protection law under GDPR.
Privacy-preserving data publishing: K-anonymity and l-Diversity
Explores K-anonymity, l-Diversity, and data de-identification challenges, using real-life examples and discussing Airbnb's privacy efforts.
Data Privacy: Anonymization and Protection
Discusses choosing relevant capsules and data privacy techniques.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Authentication and Best Practices: Challenges and Solutions
Explores authentication, identity theft risks, privacy protection, and ethical data handling.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
World of Data: Privacy Regulation
Discusses the importance of privacy, market mechanisms in smartphone apps, the privacy paradox, and the impact of GDPR.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
Transition to Smart Cities: Data/Digital Layer
Delves into the importance of the data layer in Smart Cities transition.
Previous
Page 1 of 2
Next