Search results for " privacy"

showing 10 items of 318 documents

2021

Group basedbusiness.industryStrategy and ManagementInternet privacyHuman Factors and ErgonomicsTemporalityWork (electrical)Management of Technology and InnovationCare workSociologyElder careInstant messagingbusinessVersaNew Technology, Work and Employment
researchProduct

Access Security and Personal Privacy in Public Cellular Communication Systems: The Past, the Present and Beyond 2020

2010

In order to predict the future one needs to understand the past and then interpolate as best as possible. We expect this to work reasonably well for a “2020 Scenario”, but we do not expect this approach to be valid for a “Beyond 2020” scenario.

Information privacyWork (electrical)Security serviceOrder (exchange)business.industryPolitical scienceInternet privacyMessage authentication codeCellular communication systemsComputer securitycomputer.software_genrebusinesscomputer
researchProduct

Acceptability of the e-authentication in higher education studies: views of students with special educational needs and disabilities

2021

AbstractTrust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature indicates a growing number of studies about e-authentication and authorship verification for quality assurance with more flexible modes of assessment. Yet understanding the acceptability of e-authentication systems among SEND students is underexplored. This study examines SEND students’ views about the use of e-authentication systems, including perceived advantages and disadvantages of new technology-enhanced assessment. This study aims to shed light on this area by exa…

030506 rehabilitationPersonal dataeducación superiorSpecial educationaccesibilidadAcceptabilitymedia_commonlcsh:LC8-6691lcsh:T58.5-58.64lcsh:Information technology4. Education05 social scienceseducació superiordades personals050301 educatione-AuthenticationAccessibilityAuthentication (law)acceptabilitatComputer Science ApplicationssaavutettavuusStudents with special educational needs and disabilitiesaccessibilitat0305 other medical sciencePsychologyResearch Articleautenticación electrónicaEducation HigherHigher educationmedia_common.quotation_subjectCheatingInternet privacyEducationerityisopiskelijat03 medical and health sciencesOriginalityaceptabilidadEnsenyament universitariHigher educationsähköinen tunnistaminendatos personaleslcsh:Special aspects of educationbusiness.industryEducational technologyestudiantes con necesidades educativas especiales y discapacidadesautenticació electrònicahenkilötiedotkorkeakouluopiskeluKey (cryptography)Enseñanza universitariaComputerized adaptive testingbusiness0503 educationestudiants amb necessitats educatives especials i discapacitats
researchProduct

An attribute based access control scheme for secure sharing of electronic health records

2016

Electronic health records (EHRs) play a vital role in modern health industry, allowing the possibility of flexible sharing of health information in the quest of provisioning advanced and efficient healthcare services for the users. Although sharing of EHRs has significant benefits, given that such records contain lot of sensitive information, secure sharing of EHRs is of paramount importance. Thus, there is a need for the realization of sophisticated access control mechanisms for secure sharing of EHRs, which has attracted significant interest from the research community. The most prominent access control schemes for sharing of EHRs found in literature are role based and such solutions have…

Scheme (programming language)business.industryComputer scienceInternet privacy020206 networking & telecommunications020207 software engineeringProvisioningAccess control02 engineering and technologyComputer securitycomputer.software_genreInformation sensitivityResource (project management)Health care0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerSelective disclosurecomputer.programming_languageDrawback2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
researchProduct

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Developing the "next generation" of genetic association databases for complex diseases

2012

Tens of thousands of genetic association studies investigating the influence of common polymorphisms on disease susceptibility have been published to date. These include similar to 1,000 genome-wide association studies (GWAS). This vast amount of data in the field of complex genetics is becoming increasingly difficult to follow and interpret. It can be expected that the situation will become even more complex with the advent of association projects using next-generation technologies. One of the aims of the Human Variome Project is to concatenate such data in meaningful ways, for example, within the context of publicly available field synopses. Here, we present various examples of online gen…

GenotypeModels GeneticDatabaseGenome HumanAssociation (object-oriented programming)Human Variome ProjectGenetic VariationGenome-wide association studyContext (language use)Biologycomputer.software_genreField (computer science)Disease susceptibilityGene FrequencyMeta-analysisDatabases GeneticGeneticsHumansNervous System DiseasesGenetic PrivacycomputerSoftwareGenetics (clinical)Genome-Wide Association StudyGenetic association
researchProduct

Key Drivers of Internet Banking Adoption

2008

The objective of this chapter is to provide students and managers with a holistic view into the different factors that influence online banking adoption and to use the study’s findings to develop strategies for managers on how to maximize the rate of Internet banking adoption. Research done with a sample size of 450 Spanish Internet users, has highlighted that Internet banking adoption is more likely in young, highly educated and high-income consumers. Internet affinity, online use experience and some perceived benefits are also key drivers of online financial services pur chase decision-making. Perceived financial, social and psychological risk negatively influences the use of online-banki…

business.industryInternet privacyKey (cryptography)The InternetBusinessInternet usersMarketingSociology of the Internet
researchProduct

Do the mobile-rich get richer? Internet use, travelling and social differentiations in Finland

2014

This article investigates the daily travelling practices that are related to mobile-only, fixed-only and combined mobile/fixed use of the Internet, and the social differentiations that are related to these three ways of accessing the Internet. Survey data ( N = 612) collected from Finland in 2011 are analysed. The article shows that mobile-only Internet use is not associated with particularly diverse or frequent daily travelling practices, whereas combined mobile/fixed use is. Mobile-only Internet users are, in fact, in a relatively disadvantaged position – compared with other users, they are more typically unemployed and their household income is lower. The mobility of Internet access as …

Differentiationbusiness.product_categorySociology and Political ScienceInternet privacy050801 communication & media studiesaccess0508 media and communicationsInternet use050602 political science & public administrationInternet accessSocial positionta518travelling practicesFinlandbusiness.industryCommunication05 social sciencesta5142fixed-onlymobile-only0506 political scienceDisadvantagedHousehold incomeSurvey data collectionPosition (finance)The Internetbusinesssocial differentiationNew Media & Society
researchProduct

Do Dr. Google and Health Apps Have (Comparable) Side Effects? An Experimental Study

2020

Googling and using apps for health-related information are highly prevalent worldwide. So far, little is known about the emotional, body-related, and behavioral effects of using both Google and health-related apps. In our experimental study, bodily symptoms were first provoked by a standardized hyperventilation test. A total of 147 participants (96.6% students) were then randomly assigned to one of three conditions: Googling for the causes of the currently experienced bodily symptoms, using a medical app to diagnose the experienced symptoms, and a waiting control condition. Health-related Internet use for symptoms led to stronger negative affect, increased health anxiety, and increased nee…

050103 clinical psychologybusiness.industry05 social sciencesInternet privacymedicine.diseaseCyberchondria03 medical and health sciencesClinical PsychologyOpen data0302 clinical medicinemedicine0501 psychology and cognitive sciences030212 general & internal medicinebusinessPsychologyClinical Psychological Science
researchProduct

On-Demand Security Framework for 5GB Vehicular Networks

2023

Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…

—5G and Beyond Vehicular Networks: Computer science [C05] [Engineering computing & technology]Blockchain[SPI] Engineering Sciences [physics]Security and Privacy: Sciences informatiques [C05] [Ingénierie informatique & technologie]Federated Learning5G and Beyond Vehicular Networks
researchProduct