Showing 1 - 20 results of 39 for search '"privacy"', query time: 0.07s Refine Results
  1. 1

    Privacy and law enforcement by Brown, Ian, Korff, Douwe

    Published 2004
    “…Please note that the paper was released on the Commissioner’s website in September 2004 as 'Striking the Right Balance: Respecting the Privacy of Individuals and Protecting the Public from Crime', but appears to be no longer available there.…”
    Get full text
    Monograph
  2. 2

    Usage and Consequences of Privacy Settings in Microblogs by Daehnhardt, Elena, Taylor, Nick K., Jing, Yanguo

    Published 2015
    “…Previous research on privacy reveals information leakage and security threats in social networks despite of privacy protection enabled. …”
    Get full text
    Conference or Workshop Item
  3. 3

    La privacy in azienda: un modello operativo by Korff, Douwe

    Published 2002
    “…This paper, on "privacy in a business: an operational model”, was published (in Italian as "La privacy in azienda: un modello operativo" in the proceedings of the international conference on "Privacy, Cost to Resource", organised by the Italian Data Protection Authority in Rome in December 2002.…”
    Conference or Workshop Item
  4. 4

    Protecting the right to privacy in the fight against terrorism by Korff, Douwe

    Published 2008
    “…This special right does not only concern protecting individuals from intrusions into their privacy or private life, but also more broadly is about guarding against the improper collecting, storing, sharing and use of their data. …”
    Get full text
    Monograph
  5. 5
  6. 6

    Forensic genomics: kin privacy, driftnets and other open questions by Stajano, Frank, Bianchi, Lucia, Liò, Pietro, Korff, Douwe

    Published 2008
    “…In this interdisciplinary discussion paper we highlight the complexity of DNA-related privacy issues as we move into the genomic (as opposed to genetic) era: the "driftnet" approach of comparing scene-of-crime samples against the DNA of the whole population rather than just against that of chosen suspects; the potential for errors in forensic DNA analysis and the consequences on security and privacy; the civil liberties implications of the interaction between medical and forensic applications of genomics. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Children’s databases - safety and privacy: a report for the Information Commissioner by Anderson, Ross, Brown, Ian, Clayton, Richard, Dowty, Terry, Korff, Douwe, Munro, Eileen

    Published 2006
    “…The Foundation for Information Policy Research (FIPR) was awarded a tender by the Information Commissioner to undertake a research project on ‘identifying the growth in children’s databases and assessing the data protection and privacy implications’. Its aim is to provide the Commissioner with a comprehensive view of current and proposed databases, particularly in the public sector, their extent, their role, and their potential effect on the privacy of individuals. …”
    Get full text
    Monograph
  8. 8

    The right to privacy: a reflection on Warren and Brandeis’ interpretation and the case of Ethiopia 1991-2018 by Kersmo, Tadesse Biru

    Published 2022
    “…Samuel Warren and Louis Brandeis are the two forerunner activists on the Right to Privacy. Although some of their propositions are debatable, their insight into the Right to Privacy is still valid. …”
    Get full text
    Article
  9. 9

    Novel approaches to applied cybersecurity in privacy, encryption, security systems, web credentials, and education by Ruiz, Rodrigo de Souza

    Published 2021
    “…Since 2018, GDPR has been in force in the EU and has been a milestone for people and institutions' privacy. The novel work in privacy, supported by four research papers, discusses the private mode navigation in several browsers and shows how privacy is a fragile feeling. …”
    Get full text
    Thesis
  10. 10
  11. 11

    Paper expanding on a short intervention on behalf of the European Digital Rights initiative (EDRi) by Korff, Douwe

    Published 2012
    “…The US is also assessing its approach to privacy. Where do the partners stand and what can we build on for the future?…”
    Get full text
    Conference or Workshop Item
  12. 12

    The protection of confidentiality in arbitration: balancing the tensions between commerce and public policy by Brown, Julian Christopher Patric

    Published 2021
    “…This thesis argues that the Arbitration Act 1996 should be reformed with respect to privacy and confidentiality. It begins by exploring the differences between privacy and confidentiality and tracing the development of those concepts. …”
    Get full text
    Thesis
  13. 13

    Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques by Hamouda, Djallel, Ferrag, Mohamed Amine, Nadjette, Benhamida, Hamid, Seridi, Ghanem, Mohamed Chahine

    Published 2024
    “…In response to escalating cyber threats and privacy issues within the Industrial Internet of Things (IIoT), this research presents FedGenID, an advanced Federated Generative Intrusion Detection System, to safeguard IIoT networks. …”
    Get full text
    Article
  14. 14

    Technologies for the use of images: automated processes of identification, behavioural analysis and risk detection control at the airports by Korff, Douwe

    Published 2010
    “…This is a paper presented at an international seminar on "security, privacy & data protection", organised by the Spanish Data Protection Agency. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Implementing challenges of artificial intelligence: evidence from public manufacturing sector of an emerging economy by Sharma, Manu, Luthra, Sunil, Joshi, Sudhanshu, Kumar, Anil

    Published 2021
    “…But challenges such as data quality, privacy and lack of a skilled workforce limit the scope of AI implementation in emerging economies, particularly in the Public Manufacturing Sector (PMS). …”
    Get full text
    Article
  16. 16

    How is blockchain used in marketing: a review and research agenda by Jain, Deepa, Dash, Manoj Kumar, Kumar, Anil, Luthra, Sunil

    Published 2021
    “…With vast data availability, there are challenges of big data, privacy, ransomware attacks, resulting into marketing fraud and spam. …”
    Get full text
    Article
  17. 17

    Workplace surveillance by Tredinnick, Luke, Laybats, Claire

    Published 2019
    “…Twenty years ago Cairncross observed that ‘Paradoxically, the electronic media make it easier for pornographers, hackers, and swindlers to hide behind anonymity while at the same time representing a serious threat to privacy’ (1997: 191–2).…”
    Get full text
    Article
  18. 18

    Information security by Tredinnick, Luke, Laybats, Clarie

    Published 2017
    “…Nevertheless a series of high profile cyber-attacks in recent years have bought the question of information security to greater public attention, and thrown light on our growing dependency on digital technologies. Privacy, data protection, and the misuse of data are now driving the political agenda around information security in some sectors. …”
    Get full text
    Article
  19. 19

    Terrorism and the proportionality of internet surveillance by Brown, Ian, Korff, Douwe

    Published 2009
    “…Policing has become increasingly pre-emptive, with a range of activities criminalized as 'supporting' or 'apologizing for' terrorism. The privacy and non-discrimination rights that are core to the European legal framework are being challenged by the increased surveillance and profiling of terrorism suspects. …”
    Article
  20. 20

    Digital age: challenges for libraries by Al-Suqri Waseem Afzal, Mohammed Nasser

    Published 2007
    “…Digital age characterized by efficient graphic user interface, digital imaging, efficient transfer and storage of texts, is presenting important challenges for the libraries. Information privacy, copyrights, and information security are some of the challenging issues faced by the libraries in digital age. …”
    Get full text
    Article