Search results for "Personally identifiable information"
showing 10 items of 17 documents
Customer Views on Problems of Internet Shopping Using Mobile Devices: Results of Recent Survey
2021
Recent developments of information technologies have supported fast development of Internet shopping worldwide and also using mobile devices. Internet shopping creates convenience for customers, bigger selection of goods and services from one side, but also creates several challenges for companies as well as some problems for companies and customers from the other side. Active research on different aspects is done by businesses, academic researchers alone and in co-operation of business and academic researchers. The aim of research is to find recent ideas of customers on Internet shops and problems raised in Internet shopping using mobile devices and to compare the results with other countr…
Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research
2007
Managing personal information space and working context is complicated in computerized environment. One well-known cause for the problem is that digital information is superficially fragmented into different data types and structures. Several unifying approaches have been proposed to facilitate semantic connections between them. Particularly in personal information retrieval, temporal information has turned to be useful. Hence, in this article, we present an empirical research setting for studying the utility of representing personal usage-history in information retrieval by comparing it with more traditional hierarchical representation. The research setting is based on a software Tool that…
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology
2020
In this paper, we review three different approaches to disclosure and privacy: a) an individualistic approach, which emphasizes an individual's control over information access and flow, b) a networked approach focused on information flow in horizontal relations between people, and c) an institutional approach concerned with public and societal privacy risks from platforms, providers, and governments. These approaches co-exist largely independently of each other in privacy and disclosure literature. However, with overlapping public and private spheres of communication where a presumption of individual agency over personal information is no longer tenable, we argue for the importance of bridg…
Resident-Initiated Smoking Ban Surveillance: Text Mining of Shanghai Public Service Hotline Data
2019
Background: On March 1st, 2017, the Amendment of Regulations of Shanghai Municipality on Smoking Control in Public Places was formalized in Shanghai. Since then, this comprehensive smoke-free law prohibits smoking in indoor public places, workplaces, and public transport. To reinforce this law, the "12345 hotline" platform was introduced as an avenue for residents to report smoking violations. Methods: Throughout March 2017, the hotline back-end server had logged a total of 6,937 telephone text records. All records were collected, and text data were analyzed by natural language processing. The analysis of text data has gone through several steps, namely data masking, missing data deletion, …
Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…
2009
Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…
Research data sharing in Spain: Exploring determinants, practices, and perceptions
2020
This work provides an overview of a Spanish survey on research data, which was carried out within the framework of the project Datasea at the beginning of 2015. It is covered by the objectives of sustainable development (goal 9) to support the research. The purpose of the study was to identify the habits and current experiences of Spanish researchers in the health sciences in relation to the management and sharing of raw research data. Method: An electronic questionnaire composed of 40 questions divided into three blocks was designed. The three Section s contained questions on the following aspects: (A) personal information
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
2016
In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…
Security and privacy in the Internet of Things: Current status and open issues
2014
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…
Information Security and Privacy in Medical Application Scenario
2010
This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.