Showing 161 - 180 results of 215 for search '"information privacy"', query time: 0.13s Refine Results
  1. 161

    Privacy enhancing technology adoption and its impact on SMEs’ performance by Tahereh Hasani, Davar Rezania, Nadège Levallet, Norman O’Reilly, Mohammad Mohammadi

    Published 2023-04-01
    “…As society places greater emphasis on information privacy and data protection, organizations are increasingly adopting Privacy Enhancing Technologies (PETs) to safeguard the personal information of their stakeholders. …”
    Get full text
    Article
  2. 162

    Preserving Privacy Based on Semantic Policy Tools by Kagal, Lalana, Pato, Joseph

    Published 2012
    “…Sharing data lets these organizations discover important knowledge and draw useful conclusions but raises concerns about information privacy and trust. Until recently, the focus was on restricting access to data on a "need-to-know" basis, but since the 9/11 Commission, the paradigm has shifted to a "need to share." …”
    Get full text
    Article
  3. 163

    Hierarchical decentralized optimization architecture for economic dispatch : a new approach for large-scale power system by Guo, Fanghong, Wen, Changyun, Mao, Jianfeng, Chen, Jiawei, Song, Yong-Duan

    Published 2020
    “…In addition, as only local individual estimate is exchanged between the local agent and the coordinator agent, the communication burden is reduced and the information privacy is also protected. It is theoretically shown that under proposed hierarchical decentralized optimization architecture, each local generator agent can obtain the optimal solution in a decentralized fashion. …”
    Get full text
    Journal Article
  4. 164

    Reconfiguring privacy and confidentiality practices: a case study of technological integration in HIV health services by Papoutsi, C

    Published 2013
    “…<p>Changes to the technological landscape of the National Health Service (NHS) in the UK have often raised debates on information privacy and patient confidentiality. This has been especially pertinent in the context of HIV health services, where patient records have been historically segregated from hospital notes to protect confidentiality and account for the nature of the condition as a stigmatised terminal illness. …”
    Thesis
  5. 165

    Data sharing in the age of predictive psychiatry: an adolescent perspective by Pavarini, G, Yosifova, A, Wang, K, Wilcox, B, Tomat, N, Lorimer, J, Kariyawasam, L, George, L, Alí, S, Singh, I

    Published 2022
    “…These services raise several ethical challenges surrounding data sharing and information privacy.</p> <p><strong>Objectives:</strong>&nbsp;This study aimed to investigate young people&rsquo;s interest in predictive testing for mental health challenges and their attitudes towards sharing biological, psychosocial and digital data for such purpose.…”
    Journal article
  6. 166

    A Reference Design Model to Manage Consent in Data Subjects-Centered Internet of Things Devices by Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi, Stian Underbekken

    Published 2024-02-01
    “…But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for permission when using it. Due to information privacy regulations such as the EU’s General Data Protection Regulation (GDPR), which requires companies to seek permission from data subjects (DS) before using their data, it is crucial for IoT companies to obtain this permission correctly. …”
    Get full text
    Article
  7. 167

    Adoption of video consultations during the COVID-19 pandemic by Filipe Viana Pereira, Jorge Tavares, Tiago Oliveira

    Published 2023-03-01
    “…Methods: An extended technology acceptance model was created based on the diffusion of innovation theory (DOI), unified theory of acceptance and use of technology (UTAUT), health belief model (HBM), and concerns for information privacy framework (CFIP). 346 valid responses were collected through an online questionnaire, and the partial least squares (PLS) modeling approach was used to test the model. …”
    Get full text
    Article
  8. 168

    Clicks for credit: an analysis of healthcare professionals’ social media use and potential for continuing professional development activities by Logan Van Ravenswaay, Alex Parnes, Sarah A. Nisly

    Published 2024-12-01
    “…Participant-reported concerns include issues with legitimacy of the information, privacy, time constraints, and institutional barriers.Discussion As the continuing professional development community continues to evolve and seek new innovative strategies to reach healthcare professionals, the findings of this survey highlight the need to identify and enact social media-based strategies aimed to engage healthcare professionals and provide them with unbiased evidence-based education.…”
    Get full text
    Article
  9. 169

    Applying a Method for Augmenting Data Mixed from Two Different Sources Using Deep Generative Neural Networks to Management Science by Shinya Watanuki, Yumiko Nomura, Yuki Kiyota, Minami Kubo, Kenji Fujimoto, Junko Okada, Katsue Edo

    Published 2023-12-01
    “…Although a multimodal data analysis, comprising physiological and questionnaire survey data, provides better insights into addressing management science concerns, such as challenging the predictions of consumer choice behavior, studies in this field are scarce because of two obstacles: limited sample size and information privacy. This study addresses these challenges by synthesizing multimodal data using deep generative models. …”
    Get full text
    Article
  10. 170

    Perceptions of ICT Practitioners Regarding Software Privacy by Edna Dias Canedo, Angelica Toffano Seidel Calazans, Eloisa Toffano Seidel Masson, Pedro Henrique Teixeira Costa, Fernanda Lima

    Published 2020-04-01
    “…During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of personal data. …”
    Get full text
    Article
  11. 171

    The perceived impact of location privacy: A web-based survey of public health perspectives and requirements in the UK and Canada by Boulos Maged, AbdelMalik Philip, Jones Ray

    Published 2008-05-01
    “…Ninety three percent of participants indicated a requirement for personally identifiable data (PID) in their public health activities, including geographic information. Privacy was identified as an obstacle to public health practice by 71% of respondents. …”
    Get full text
    Article
  12. 172

    &#x201C;Why Should I Read the Privacy Policy, I Just Need the Service&#x201D;: A Study on Attitudes and Perceptions Toward Privacy Policies by Duha Ibdah, Nada Lachtar, Satya Meenakshi Raparthi, Anys Bacha

    Published 2021-01-01
    “…From voice assistants that listen to every conversation, to apps that share sensitive location information, privacy experts have raised concerns about how such data is being abused. …”
    Get full text
    Article
  13. 173

    Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey by Abdul Majeed, Sungchang Lee

    Published 2021-01-01
    “…It is of paramount importance to provide good perspectives of the whole information privacy area involving both tabular and SN data, and recent anonymization researches. …”
    Get full text
    Article
  14. 174

    Multi-Area State Estimation: A Distributed Quasi-Static Innovation-Based Model with an Alternative Direction Method of Multipliers by Nader Aljohani, Tierui Zou, Arturo S. Bretas, Newton G. Bretas

    Published 2021-05-01
    “…With grid deregulation, and awareness of information privacy and security, much attention has been given to multi-area state estimation. …”
    Get full text
    Article
  15. 175

    VRepChain: a decentralized and privacy-preserving reputation system for social Internet of vehicles based on blockchain by Liu, Yuan, Xiong, Zehui, Hu, Qin, Niyato, Dusit, Zhang, Jie, Miao, Chunyan, Leung, Cyril, Tian, Zhihong

    Published 2022
    “…Meanwhile, the blockchain technology with its distributed paradigm is potentially employed to protect information privacy. In this study, we propose the design of a blockchain-enabled reputation system named “VRepChain” for SIoV by especially considering the rating privacy issue. …”
    Get full text
    Journal Article
  16. 176

    A multi-unit combinatorial auction based approach for decentralized multi-project scheduling by Song, Wen, Kang, Donghun, Zhang, Jie, Xi, Hui

    Published 2019
    “…Existing approaches encounter difficulties in dealing with large DRCMPSP cases while respecting the information privacy requirements of the project agents. …”
    Get full text
    Get full text
    Journal Article
  17. 177

    Federated Learning Meets Contract Theory: Economic-Efficiency Framework for Electric Vehicle Networks by Saputra, Yuris Mulya, Nguyen, Diep N., Hoang, Dinh Thai, X. Vu, Thang, Dutkiewicz, Eryk, Chatzinotas, Symeon

    Published 2022
    “…To that end, we first introduce an energy demand prediction method for CSs leveraging federated learning approaches, in which each CS can train its own energy transactions locally and exchange its learned model with other CSs to improve the learning quality while protecting the CS's information privacy. Based on the predicted energy demands, each CS can reserve energy from the smart grid provider (SGP) in advance to optimize its profit. …”
    Get full text
    Article
  18. 178

    The influence of mobile environmental cues on purchasing intention and positive user-generated content spread in instagram context / Azlin Zanariah Bahtar by Bahtar, Azlin Zanariah

    Published 2019
    “…Stimulus-Organism-Responses (SOR) Model by Eroglu et al. (2001) is adopted in this study along with other relevant and related models to examine the impact of mobile environmental cues (page image layout, information, privacy, and shaped discussion) on customers' cognitive (perceived usefulness and perceived ease of use), and affective (arousal and pleasure) states that in turn, influence their purchase intention and positive user-generated content (UGC) spread. …”
    Get full text
    Thesis
  19. 179

    Capture-24: Activity tracker dataset for human activity recognition by Chan Chang, S, Walmsley, R, Gershuny , J, Harms, T, Thomas, E, Milton, K, Kelly, P, Foster, C, Wong, A, Gray, N, Haque, S, Hollowell, S, Doherty, A

    Published 2021
    “…Accordingly, in the conduct of the Analysis, users will comply with all applicable laws and regulations relating to information privacy. Further, the user agrees to preserve the confidentiality of, and not attempt to identify, individuals in the Data Set.…”
    Dataset
  20. 180

    Building a research partnership between computer scientists and health service researchers for access and analysis of population-level health datasets: what are we learning? by Michael Schull, Michael Brudno, Marzyeh Ghassemi, Garth Gibson, Anna Goldenbrg, Alison Paprica, Laura Rosella, Therese Stukel, Charles Victor, Carl Virtanen

    Published 2019-11-01
    “…ML model assumptions); 5) differences in research timeline expectations; 6) different experience with and expectations for access to de-identified routinely collected data (e.g., need for research ethics committee project approvals and privacy impact assessments); 7) developing data access models that enable greater flexibility (e.g., importing code or using open source tools); 8) broadening data access models to allow modern high-dimensional exploratory data analysis; 9) obtaining support of information/privacy regulator; 10) the hardware is the (relatively) easy part compared to other success factors. …”
    Get full text
    Article