Showing 121 - 140 results of 156 for search '"privacy law"', query time: 0.11s Refine Results
  1. 121

    Mobile Solutions for Clinical Surveillance and Evaluation in Infancy—General Movement Apps by Peter B. Marschik, Amanda K. L. Kwong, Nelson Silva, Joy E. Olsen, Martin Schulte-Rüther, Sven Bölte, Maria Örtqvist, Abbey Eeles, Luise Poustka, Christa Einspieler, Karin Nielsen-Saines, Dajie Zhang, Alicia J. Spittle

    Published 2023-05-01
    “…We propose future collaborative solutions, including standardisation of cross-site data collection, adaptation to local context and privacy laws, employment of user feedback, and sustainable IT structures enabling continuous software updating.…”
    Get full text
    Article
  2. 122

    The Interface of Privacy and Data Security in Automated City Shuttles: The GDPR Analysis by Meriem Benyahya, Sotiria Kechagia, Anastasija Collen, Niels Alexander Nijdam

    Published 2022-04-01
    “…Secondly, the compatibility of privacy laws with security technologies focusing on the gap between the legal definitions and the technological implementation of privacy-preserving techniques are discussed. …”
    Get full text
    Article
  3. 123

    Cashing in on Student Data: Standardized Testing and Predatory College Marketing in the United States by Moussapour, Roya Madoff

    Published 2022
    “…Ultimately, I outline a need for greater transparency around organizational data practices, greater enforcement of existing regulations, and enactment of new privacy laws in order to minimize the potential for harm on K-12 students in the United States.…”
    Get full text
    Thesis
  4. 124

    Security management of BYOD and cloud environment in Saudi Arabia by Khalid Almarhabi, Adel Bahaddad, Ahmed Mohammed Alghamdi

    Published 2023-01-01
    “…This presents a huge challenge as the governments have to consider the user rights and privacy laws and also protect the networks from these attacks. …”
    Get full text
    Article
  5. 125

    Privacy-preserving data mining of cross-border financial flows by Chaka Patrick Sekgoka, Venkata Seshachala Sarma Yadavalli, Olufemi Adetunji

    Published 2022-12-01
    “…The encryption algorithm can ensure adherence to information privacy laws and policies without compromising data reusability. …”
    Get full text
    Article
  6. 126

    GenePING: secure, scalable management of personal genomic data by Adida, Ben, Kohane, Isaac

    Published 2010
    “…The management of such sizeable, yet fine-grained, data in compliance with privacy laws and best practices presents significant security and scalability challenges. …”
    Get full text
    Article
  7. 127

    UNDERSTANDING GDPR: ITS LEGAL IMPLICATIONS AND RELEVANCE TO SOUTH ASIAN PRIVACY REGIMES by Md. Toriqul Islam, Mariyam Sahula, Mohammad Ershadul Karim

    Published 2022-01-01
    “…It resulted in a global wave where countries are either adopting new legislation or modifying existing data privacy laws to comply with the GDPR. Historically, the South Asian region, abode to one-fifth of the world’s people, has strong trade and economic ties with Europe. …”
    Get full text
    Article
  8. 128

    Privacy and Trust in eHealth: A Fuzzy Linguistic Solution for Calculating the Merit of Service by Pekka Ruotsalainen, Bernd Blobel, Seppo Pohjolainen

    Published 2022-04-01
    “…In addition, the service user cannot rely on privacy laws, and the ecosystem is not a trustworthy system. …”
    Get full text
    Article
  9. 129

    Federated Learning with Dynamic Model Exchange by Hannes Hilberger, Sten Hanke, Markus Bödenler

    Published 2022-05-01
    “…This is especially true in the healthcare sector, since transferring these data is often associated with bureaucratic overhead because of, for example, increased security requirements and privacy laws. Federated Learning should circumvent this problem and allow training to take place directly on the data owner’s side without sending them to a central location such as a server. …”
    Get full text
    Article
  10. 130

    Data Sharing in Disruptive Technologies: Lessons from Adoption of Autonomous Systems in Singapore by Si Ying Tan, Araz Taeihagh, Devyani Pande

    Published 2023-01-01
    “…Advancing comprehensive data sharing guidelines and discretionary privacy laws will help overcome political and legal barriers. …”
    Get full text
    Article
  11. 131

    A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends by Helio N. Cunha Neto, Jernej Hribar, Ivana Dusparic, Diogo Menezes Ferrazani Mattos, Natalia C. Fernandes

    Published 2023-01-01
    “…However, collecting all necessary data to train accurate models is often unfeasible due to privacy laws. Federated Learning (FL) evolved as a collaborative machine learning approach for training models without sharing private data. …”
    Get full text
    Article
  12. 132

    Perceptions of ICT Practitioners Regarding Software Privacy by Edna Dias Canedo, Angelica Toffano Seidel Calazans, Eloisa Toffano Seidel Masson, Pedro Henrique Teixeira Costa, Fernanda Lima

    Published 2020-04-01
    “…During software development activities, it is important for Information and Communication Technology (ICT) practitioners to know and understand practices and guidelines regarding information privacy, as software requirements must comply with data privacy laws and members of development teams should know current legislation related to the protection of personal data. …”
    Get full text
    Article
  13. 133

    Understanding GDPR: Its legal implications and relevance to South Asian Privacy Regimes by Islam, Md. Toriqul, Sahula, Mariyam, Karim, Mohammad Ershadul

    Published 2022
    “…It resulted in a global wave where countries are either adopting new legislation or modifying existing data privacy laws to comply with the GDPR. Historically, the South Asian region, abode to one-fifth of the world’s people, has strong trade and economic ties with Europe. …”
    Get full text
    Get full text
    Article
  14. 134

    Public and patient perspectives on the use of clinical and administrative health data to identify and contact people at risk of future illness-The case of chronic kidney disease. by Donald J Willison, Danielle M Nash, Sarah E Bota, Samar Almadhoun, Teresa Scassa, Amit X Garg, Kidney Patient and Donor Alliance of Canada, Ann Young

    Published 2024-01-01
    “…Most agreed that, if health authorities could identify people at high risk of a treatable life-threatening illness if caught early enough, there is a social responsibility to notify people. While privacy laws allow for free flow of health information among health care providers who provide direct clinical care, the proposed case-finding and outreach falls outside that model. …”
    Get full text
    Article
  15. 135

    Assessment of differentially private synthetic data for utility and fairness in end-to-end machine learning pipelines for tabular data. by Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa

    Published 2024-01-01
    “…Understanding the effects of utilizing DP synthetic data in end-to-end machine learning pipelines impacts areas such as health care and humanitarian action, where data is scarce and regulated by restrictive privacy laws. In this work, we investigate the extent to which synthetic data can replace real, tabular data in machine learning pipelines and identify the most effective synthetic data generation techniques for training and evaluating machine learning models. …”
    Get full text
    Article
  16. 136

    Governing Innovation and Expression: New Regimes, Techniques and Strategies by Katja Weckström

    Published 2013-01-01
    “…Social networks and location services challenge data protection and privacy laws. At the same time, criminal enforcement of intellectual property rights proliferates and the threat of damages may assume the role of a deterrent. …”
    Get full text
    Article
  17. 137

    A Novel Privacy Paradigm for Improving Serial Data Privacy by Ayesha Shaukat, Adeel Anjum, Saif U. R. Malik, Munam Ali Shah, Carsten Maple

    Published 2022-04-01
    “…Protecting the privacy of individuals is of utmost concern in today’s society, as inscribed and governed by the prevailing privacy laws, such as GDPR. In serial data, bits of data are continuously released, but their combined effect may result in a privacy breach in the whole serial publication. …”
    Get full text
    Article
  18. 138

    Runtime and Design Time Completeness Checking of Dangerous Android App Permissions Against GDPR by Ryan Mcconkey, Oluwafemi Olukoya

    Published 2024-01-01
    “…Data and privacy laws, such as the GDPR, require mobile apps that collect and process the personal data of their citizens to have a legally-compliant policy. …”
    Get full text
    Article
  19. 139

    Governing Innovation and Expression: New Regimes, Techniques and Strategies by Katja Weckström

    Published 2013-01-01
    “…Social networks and location services challenge data protection and privacy laws. At the same time, criminal enforcement of intellectual property rights proliferates and the threat of damages may assume the role of a deterrent. …”
    Get full text
    Article
  20. 140

    Balancing Privacy and Utility in Secondary Data Use to Inform Policy by Xinjie Cui, Robyn Blackadar

    Published 2017-04-01
    “…Results In principle current privacy laws and regulations provide good guidance in collection, use, and disclosure of data, however there is a lack of consistency in the interpretation of these laws at the operational level with regard to secondary data use. …”
    Get full text
    Article