-
161
Privacy enhancing technology adoption and its impact on SMEs’ performance
Published 2023-04-01“…As society places greater emphasis on information privacy and data protection, organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to safeguard the personal information of their stakeholders. …”
Get full text
Article -
162
Preserving Privacy Based on Semantic Policy Tools
Published 2012“…Sharing data lets these organizations discover important knowledge and draw useful conclusions but raises concerns about information privacy and trust. Until recently, the focus was on restricting access to data on a "need-to-know" basis, but since the 9/11 Commission, the paradigm has shifted to a "need to share." …”
Get full text
Article -
163
Hierarchical decentralized optimization architecture for economic dispatch : a new approach for large-scale power system
Published 2020“…In addition, as only local individual estimate is exchanged between the local agent and the coordinator agent, the communication burden is reduced and the information privacy is also protected. It is theoretically shown that under proposed hierarchical decentralized optimization architecture, each local generator agent can obtain the optimal solution in a decentralized fashion. …”
Get full text
Journal Article -
164
Reconfiguring privacy and confidentiality practices: a case study of technological integration in HIV health services
Published 2013“…<p>Changes to the technological landscape of the National Health Service (NHS) in the UK have often raised debates on information privacy and patient confidentiality. This has been especially pertinent in the context of HIV health services, where patient records have been historically segregated from hospital notes to protect confidentiality and account for the nature of the condition as a stigmatised terminal illness. …”
Thesis -
165
Data sharing in the age of predictive psychiatry: an adolescent perspective
Published 2022“…These services raise several ethical challenges surrounding data sharing and information privacy.</p> <p><strong>Objectives:</strong> This study aimed to investigate young people’s interest in predictive testing for mental health challenges and their attitudes towards sharing biological, psychosocial and digital data for such purpose.…”
Journal article -
166
A Reference Design Model to Manage Consent in Data Subjects-Centered Internet of Things Devices
Published 2024-02-01“…But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for permission when using it. Due to information privacy regulations such as the EU’s General Data Protection Regulation (GDPR), which requires companies to seek permission from data subjects (DS) before using their data, it is crucial for IoT companies to obtain this permission correctly. …”
Get full text
Article -
167
Adoption of video consultations during the COVID-19 pandemic
Published 2023-03-01“…Methods: An extended technology acceptance model was created based on the diffusion of innovation theory (DOI), unified theory of acceptance and use of technology (UTAUT), health belief model (HBM), and concerns for information privacy framework (CFIP). 346 valid responses were collected through an online questionnaire, and the partial least squares (PLS) modeling approach was used to test the model. …”
Get full text
Article -
168
Clicks for credit: an analysis of healthcare professionals’ social media use and potential for continuing professional development activities
Published 2024-12-01“…Participant-reported concerns include issues with legitimacy of the information, privacy, time constraints, and institutional barriers.Discussion As the continuing professional development community continues to evolve and seek new innovative strategies to reach healthcare professionals, the findings of this survey highlight the need to identify and enact social media-based strategies aimed to engage healthcare professionals and provide them with unbiased evidence-based education.…”
Get full text
Article -
169
Applying a Method for Augmenting Data Mixed from Two Different Sources Using Deep Generative Neural Networks to Management Science
Published 2023-12-01“…Although a multimodal data analysis, comprising physiological and questionnaire survey data, provides better insights into addressing management science concerns, such as challenging the predictions of consumer choice behavior, studies in this field are scarce because of two obstacles: limited sample size and information privacy. This study addresses these challenges by synthesizing multimodal data using deep generative models. …”
Get full text
Article -
170
Perceptions of ICT Practitioners Regarding Software Privacy
Published 2020-04-01“…During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of personal data. …”
Get full text
Article -
171
The perceived impact of location privacy: A web-based survey of public health perspectives and requirements in the UK and Canada
Published 2008-05-01“…Ninety three percent of participants indicated a requirement for personally identifiable data (PID) in their public health activities, including geographic information. Privacy was identified as an obstacle to public health practice by 71% of respondents. …”
Get full text
Article -
172
“Why Should I Read the Privacy Policy, I Just Need the Service”: A Study on Attitudes and Perceptions Toward Privacy Policies
Published 2021-01-01“…From voice assistants that listen to every conversation, to apps that share sensitive location information, privacy experts have raised concerns about how such data is being abused. …”
Get full text
Article -
173
Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey
Published 2021-01-01“…It is of paramount importance to provide good perspectives of the whole information privacy area involving both tabular and SN data, and recent anonymization researches. …”
Get full text
Article -
174
Multi-Area State Estimation: A Distributed Quasi-Static Innovation-Based Model with an Alternative Direction Method of Multipliers
Published 2021-05-01“…With grid deregulation, and awareness of information privacy and security, much attention has been given to multi-area state estimation. …”
Get full text
Article -
175
VRepChain: a decentralized and privacy-preserving reputation system for social Internet of vehicles based on blockchain
Published 2022“…Meanwhile, the blockchain technology with its distributed paradigm is potentially employed to protect information privacy. In this study, we propose the design of a blockchain-enabled reputation system named “VRepChain” for SIoV by especially considering the rating privacy issue. …”
Get full text
Journal Article -
176
A multi-unit combinatorial auction based approach for decentralized multi-project scheduling
Published 2019“…Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. …”
Get full text
Get full text
Journal Article -
177
Federated Learning Meets Contract Theory: Economic-Efficiency Framework for Electric Vehicle Networks
Published 2022“…To that end, we first introduce an energy demand prediction method for CSs leveraging federated learning approaches, in which each CS can train its own energy transactions locally and exchange its learned model with other CSs to improve the learning quality while protecting the CS's information privacy. Based on the predicted energy demands, each CS can reserve energy from the smart grid provider (SGP) in advance to optimize its profit. …”
Get full text
Article -
178
The influence of mobile environmental cues on purchasing intention and positive user-generated content spread in instagram context / Azlin Zanariah Bahtar
Published 2019“…Stimulus-Organism-Responses (SOR) Model by Eroglu et al. (2001) is adopted in this study along with other relevant and related models to examine the impact of mobile environmental cues (page image layout, information, privacy, and shaped discussion) on customers' cognitive (perceived usefulness and perceived ease of use), and affective (arousal and pleasure) states that in turn, influence their purchase intention and positive user-generated content (UGC) spread. …”
Get full text
Thesis -
179
Capture-24: Activity tracker dataset for human activity recognition
Published 2021“…Accordingly, in the conduct of the Analysis, users will comply with all applicable laws and regulations relating to information privacy. Further, the user agrees to preserve the confidentiality of, and not attempt to identify, individuals in the Data Set.…”
Dataset -
180
Building a research partnership between computer scientists and health service researchers for access and analysis of population-level health datasets: what are we learning?
Published 2019-11-01“…ML model assumptions); 5) differences in research timeline expectations; 6) different experience with and expectations for access to de-identified routinely collected data (e.g., need for research ethics committee project approvals and privacy impact assessments); 7) developing data access models that enable greater flexibility (e.g., importing code or using open source tools); 8) broadening data access models to allow modern high-dimensional exploratory data analysis; 9) obtaining support of information/privacy regulator; 10) the hardware is the (relatively) easy part compared to other success factors. …”
Get full text
Article