dc.contributor.author |
Σπυριδωνίδου, Κωνσταντίνα
|
el |
dc.contributor.author |
Spyridonidou, Konstantina
|
en |
dc.date.accessioned |
2015-09-10T08:10:59Z |
|
dc.date.available |
2015-09-10T08:10:59Z |
|
dc.date.issued |
2015-09-10 |
|
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/41254 |
|
dc.identifier.uri |
http://dx.doi.org/10.26240/heal.ntua.3924 |
|
dc.description |
Εθνικό Μετσόβιο Πολυτεχνείο--Μεταπτυχιακή Εργασία. Διεπιστημονικό-Διατμηματικό Πρόγραμμα Μεταπτυχιακών Σπουδών (Δ.Π.Μ.Σ.) “Μαθηματική Προτυποποίηση σε Σύγχρονες Τεχνολογίες στην Οικονομία” |
el |
dc.rights |
Default License |
|
dc.subject |
Ιδιωτικότητα διαδυκτίου |
el |
dc.subject |
Ανωνυμοποίηση δεδομένων |
el |
dc.subject |
Επιθέσεις ασφάλειας |
el |
dc.subject |
Κακόβουλο λογισμικό |
el |
dc.subject |
Τεχνολογίες διασφάλισης ιδιωτικότητας |
el |
dc.subject |
Ιnternet privacy |
en |
dc.subject |
Data anonymization |
en |
dc.subject |
Privacy attacks |
en |
dc.subject |
Data anonymization |
en |
dc.subject |
Privacy attacks |
en |
dc.subject |
Malicious software |
en |
dc.subject |
Privacy enhancing technologies |
en |
dc.title |
Ασφάλεια και προστασία της ιδιωτικότητας στο διαδικτύο |
el |
heal.type |
masterThesis |
|
heal.classification |
Computer science |
el |
heal.classificationURI |
http://id.loc.gov/authorities/subjects/sh89003285 |
|
heal.language |
el |
|
heal.access |
free |
|
heal.recordProvider |
ntua |
el |
heal.publicationDate |
2015-03 |
|
heal.abstract |
The Web has spurred an information revolution even, reaching sectors left untouched by the personal computing boom of the 80’s. It made information ubiquity a reality for sizeable segments of the world population, transcending all socioeconomic levels. The ease of information access, coupled with the availability of personal data, also made it easier and more tempting for interested parties (individuals, businesses, and governments) to intrude on people’s privacy in unprecedented wayslevels.
Internet privacy involves the right of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of computer privacy. Although we recognize that many and different levels of privacy violations exist, the present study is analyzing the internet privacy from user’s perspectives focusing on its preservation or loss.
Internet users’ privacy can be violated in different ways and with different intentions.Unauthorized information transfer, weak security, data magnets (cookies, software downloads etc.), and indirect forms of information collection are some of them.
However, internet users on their vast majority tend to neglect or overlook the privacy settings and over-share data that can be easily either stolen or used in many ways against them as there are parties who would use these data in their favor. This is easily perceptible through social media where users share their whole life believing that it is protected.
As far as the programmers and the managers of the information systems, they must take into account the appropriate privacy enhancing technologies in order to provide privacy and protection to the internet user, considering that the legislative measures are not sufficient. |
el |
heal.advisorName |
Στεφανέας, Πέτρος |
el |
heal.committeeMemberName |
Θεολόγου, Κωνσταντίνος |
el |
heal.committeeMemberName |
Κολέτσος, Ιωάννης |
el |
heal.academicPublisher |
Εθνικό Εθνικό Μετσόβιο. Σχολή Εφαρμοσμένων Μαθηματικών και Φυσικών Επιστημών |
el |
heal.academicPublisherID |
ntua |
|
heal.numberOfPages |
126 σ. |
en |
heal.fullTextAvailability |
true |
|