Showing 81 - 100 results of 215 for search '"information privacy"', query time: 0.12s Refine Results
  1. 81

    Privacy paradox in 3D body scanning technology: the effect of 3D virtual try-on experience in the relationship between privacy concerns and mobile app adoption intention by Song-yi Youn, Joohye Hwang, Li Zhao, Jong-Bum Kim

    Published 2023-04-01
    “…This study contributes to the literature and industry by examining the potential role of consumers’ interactive experiences in reducing their concerns about body information privacy.…”
    Get full text
    Article
  2. 82

    A privacy-by-design framework based on information control and zero trust by Anis Yusof

    Published 2020
    “…Information privacy has been a concern in the digital age. …”
    Get full text
    Thesis-Master by Coursework
  3. 83

    A critical study of the viability of the personal data protection legal framework in Malaysia: with special reference to the EU and the UK legal frameworks / Mohd Bahrin Othman by Othman, Mohd Bahrin

    Published 2009
    “…Personal data is now perceived as a commodity at the expense of the individual information privacy. The personal data protection strives to provide the remedy of past injustices caused by inadequate protection of personal information. …”
    Get full text
    Thesis
  4. 84

    Protecting personal medical information: Asian perspectives by Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah

    Published 2013
    “…In order to tackle the issue of privacy concern over the personal information management system, this paper begins with the gathering of views on information privacy and how culture has influenced among several Asian countries including India, Thailand, Japan, China and Malaysia. …”
    Get full text
    Article
  5. 85

    Privacy models for protecting personal medical information: a preliminary study by Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah

    Published 2011
    “…Information privacy is regarded as the most important subject matter, especially in a paperless-based environment for hospitals which have adopted the Hospital Information System (HIS). …”
    Get full text
    Proceeding Paper
  6. 86

    A Conceptual Model for Investigating the Effect of Privacy Concerns on E-Commerce Adoption: A Study on United Arab Emirates Consumers by Iman Akour, Noha Alnazzawi, Muhammad Alshurideh, Mohammed Amin Almaiah, Barween Al Kurdi, Raghad M. Alfaisal, Said Salloum

    Published 2022-11-01
    “…Online transactions have been reported to be hindered by privacy concerns. Although information privacy presents a threat to e-commerce adoption, cultural differences between nations can additionally impede this trend while raising people’s concerns about the privacy of their personal information. …”
    Get full text
    Article
  7. 87
  8. 88

    Adopting a knowledge management concept in securing the privacy of electronic medical record systems by Samsuri, Suhaila, Ismail, Zuraini, Ahmad, Rabiah

    Published 2013
    “…This concept can be applied in considering information privacy as a component in designing a computerized system. …”
    Get full text
    Proceeding Paper
  9. 89

    A Robust Decentralized Linear AC Operation for Integrated Transmission and Distribution Networks by Ahmad Nikoobakht, Esmaeil Mahboubi-Moghaddam

    Published 2022-09-01
    “…However, it is impossible to solve the cooperation of TN&DN problem without considering the AC optimal power flow (ACOPF), the operators' independence, and the information privacy. Thus, in this paper, a linearized ACOPF model for the robust cooperation of TN&DN problem is presented along with an efficient hierarchical decentralized solution method to solve the robust cooperation of integrated TN&DN in which the information-privacy-is-maintained-for both network operators. …”
    Get full text
    Article
  10. 90

    Privacy concerns toward short-form video platforms: Scale development and validation by Qingqing Wang, Wensong Zhang, Haikun Wang

    Published 2022-08-01
    “…To this end, this study took privacy concerns theory as the theoretical foundation to develop and validate a multidimensional privacy concerns scale in short-form video platforms by referring to the development of Smith, Milberg and Burke' multidimensional scale of concerns for information privacy (CFIP), Sheehan and Hoy's multidimensional scale of privacy concerns, Malhotra, Kim and Agarwal's Internet users' information privacy concerns (IUIPC) scale, and Hong and Thong's Internet privacy concerns (IPC) multidimensional scale. …”
    Get full text
    Article
  11. 91

    The Optimal Invest ment Level in Enterprise Information Resources Privacy Protection by K. S. Barabanov

    Published 2010-03-01
    “…A simple and general model for the evaluating optimal investment level in information privacy protection are discussed.…”
    Get full text
    Article
  12. 92

    Toward Robust Decentralized Linear AC Operation of Cooperative Transmission and Distribution Networks by Ahmad Nikoobakht, Sasan Zeraati, Samuli Honkapuro, Mousa Afrasiabi, Jamshid Aghaei

    Published 2022-01-01
    “…Also, an efficient hierarchical decentralized solution method is adopted to solve robust cooperation of integrated TN&DN in which the information privacy is maintained for both network operators. …”
    Get full text
    Article
  13. 93

    Balancing Privacy and Utility in Secondary Data Use to Inform Policy by Xinjie Cui, Robyn Blackadar

    Published 2017-04-01
    “…Privacy concerns are paramount in such secondary usage of data collected on human subjects. Information privacy protection and data security are critical considerations in reuse and repurposing of data especially linked data, longitudinal data, and large amounts of data. …”
    Get full text
    Article
  14. 94

    On the relationship between inference and data privacy in decentralized IoT networks by Sun, Meng, Tay, Wee Peng

    Published 2021
    “…We propose an optimization framework in which both local differential privacy (data privacy) and information privacy (inference privacy) metrics are incorporated. …”
    Get full text
    Journal Article
  15. 95

    Online privacy and privacy policy of social network sites. by Woh, Cheu Sia.

    Published 2012
    “…On the degree of information privacy concern, Singaporean and Malaysian showed relatively higher level of concerns compare to that of Chinese Nationals. …”
    Get full text
    Thesis
  16. 96

    Information disclosure behaviour in social media among Malaysian youth: the impact of privacy concern, risk and trust by Salleh, Norsaremah, Aditiawarman, Umar, Hussein, Ramlah

    Published 2011
    “…Although SNS has been benefited its users in many ways, information privacy seemed to be overlooked. This study proposes a framework to examine users’ protective behaviour associated with information disclosure in SNS. …”
    Get full text
    Proceeding Paper
  17. 97
  18. 98

    Social network sites: information disclosure, perceived vulnerability, privacy concerns and perceived benefits by Salleh, Norsaremah, Hussein, Ramlah, Mohamed, Norshidah, Abdul Karim, Nor Shahriza, Ahlan, Abdul Rahman, Aditiwarman, Umar

    Published 2012
    “…Although SNS offer many benefits to the users, information privacy seemed to be overlooked. Based on the protection motivation theory, this study investigated the factors that might influence youth to disclose information about themselves on the SNS. …”
    Book Section
  19. 99

    Uneasy Listening by Gabi Sobliye, Leil-Zahra Mortada

    Published 2018-06-01
    “…Tactical Tech, the collective in which we participate, is a NGO based in Berlin in which expert in technologies, activists, journalists and leaders work to create awareness about personal information, privacy and digital security. …”
    Get full text
    Article
  20. 100

    Uneasy Listening by Gabi Sobliye, Leil-Zahra Mortada

    Published 2018-06-01
    “…Tactical Tech, the collective in which we participate, is a NGO based in Berlin in which expert in technologies, activists, journalists and leaders work to create awareness about personal information, privacy and digital security. …”
    Get full text
    Article