Search results for "Personally identifiable information"

showing 10 items of 17 documents

Customer Views on Problems of Internet Shopping Using Mobile Devices: Results of Recent Survey

2021

Recent developments of information technologies have supported fast development of Internet shopping worldwide and also using mobile devices. Internet shopping creates convenience for customers, bigger selection of goods and services from one side, but also creates several challenges for companies as well as some problems for companies and customers from the other side. Active research on different aspects is done by businesses, academic researchers alone and in co-operation of business and academic researchers. The aim of research is to find recent ideas of customers on Internet shops and problems raised in Internet shopping using mobile devices and to compare the results with other countr…

ATM cardGoods and servicesDigital marketingbusiness.industryGeneral Earth and Planetary SciencesWord of mouthInformation technologyThe InternetAdvertisingBusinessMobile devicePersonally identifiable informationGeneral Environmental ScienceRegional Formation and Development Studies
researchProduct

Studying Utility of Personal Usage-History: A Software Tool for Enabling Empirical Research

2007

Managing personal information space and working context is complicated in computerized environment. One well-known cause for the problem is that digital information is superficially fragmented into different data types and structures. Several unifying approaches have been proposed to facilitate semantic connections between them. Particularly in personal information retrieval, temporal information has turned to be useful. Hence, in this article, we present an empirical research setting for studying the utility of representing personal usage-history in information retrieval by comparing it with more traditional hierarchical representation. The research setting is based on a software Tool that…

Cognitive models of information retrievalbusiness.industryComputer sciencecomputer.software_genreData scienceInformation visualizationGroup information managementEmpirical researchHuman–computer interactionHuman–computer information retrievalPersonal information managerPersonal information managementRelevance (information retrieval)businessPersonally identifiable informationcomputer
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology

2020

In this paper, we review three different approaches to disclosure and privacy: a) an individualistic approach, which emphasizes an individual's control over information access and flow, b) a networked approach focused on information flow in horizontal relations between people, and c) an institutional approach concerned with public and societal privacy risks from platforms, providers, and governments. These approaches co-exist largely independently of each other in privacy and disclosure literature. However, with overlapping public and private spheres of communication where a presumption of individual agency over personal information is no longer tenable, we argue for the importance of bridg…

EcologyPresumptionEcology (disciplines)05 social sciencesControl (management)Agency (philosophy)Information accessDisclosure050105 experimental psychology03 medical and health sciencesIndividualism0302 clinical medicinePrivacyHumansComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesInformation flow (information theory)PsychologyPersonally identifiable informationConfidentiality030217 neurology & neurosurgeryGeneral PsychologyCurrent Opinion in Psychology
researchProduct

Resident-Initiated Smoking Ban Surveillance: Text Mining of Shanghai Public Service Hotline Data

2019

Background: On March 1st, 2017, the Amendment of Regulations of Shanghai Municipality on Smoking Control in Public Places was formalized in Shanghai. Since then, this comprehensive smoke-free law prohibits smoking in indoor public places, workplaces, and public transport. To reinforce this law, the "12345 hotline" platform was introduced as an avenue for residents to report smoking violations. Methods: Throughout March 2017, the hotline back-end server had logged a total of 6,937 telephone text records. All records were collected, and text data were analyzed by natural language processing. The analysis of text data has gone through several steps, namely data masking, missing data deletion, …

Hotlinebusiness.industryPublic transportTobacco controlDeclarationPublic serviceConfidentialityBusinessSmoking banPublic relationsPersonally identifiable informationSSRN Electronic Journal
researchProduct

Chaînage de bases de données anonymisées pour les études épidémiologiques multicentriques nationales et internationales : proposition d'un algorithme…

2009

Background: Compiling individual records coming from different sources is very important for multicenter epidemiological studies; however, European directives and other national legislation concerning nominal data processing must be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, this type of anonymization procedure is in contradiction with common requirements in public health and biomedical research because it becom…

Identité du patient020205 medical informaticsEpidemiologyComputer scienceHash functionEncryptionCryptographyPatient identificationSécuritéDossier médical du patient02 engineering and technologyComputer securitycomputer.software_genreEncryptionPublic-key cryptography03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0302 clinical medicineAnonymized dataHashingChainage de données0202 electrical engineering electronic engineering information engineeringCryptographic hash functionDonnées anonymisées[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]030212 general & internal medicineChiffrementMulticenter studies[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]Secure Hash Algorithm[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industryUniversal hashingLinkageHachagePublic Health Environmental and Occupational Health16. Peace & justice3. Good health[SDV.SPEE] Life Sciences [q-bio]/Santé publique et épidémiologieEtudes multicentriquesSecurity[SDV.SPEE]Life Sciences [q-bio]/Santé publique et épidémiologiebusinesscomputerPersonally identifiable information
researchProduct

Research data sharing in Spain: Exploring determinants, practices, and perceptions

2020

This work provides an overview of a Spanish survey on research data, which was carried out within the framework of the project Datasea at the beginning of 2015. It is covered by the objectives of sustainable development (goal 9) to support the research. The purpose of the study was to identify the habits and current experiences of Spanish researchers in the health sciences in relation to the management and sharing of raw research data. Method: An electronic questionnaire composed of 40 questions divided into three blocks was designed. The three Section s contained questions on the following aspects: (A) personal information

Information Systems and ManagementRelation (database)Sustainable researchDriversdata sharingbarriersBIBLIOTECONOMIA Y DOCUMENTACIONReuseSpanish survey03 medical and health sciencessustainable research030304 developmental biologySustainable development0303 health sciencesMedical education05 social sciencesData management plandriversQuarter (United States coin)lcsh:ZComputer Science Applicationslcsh:Bibliography. Library science. Information resourcesData sharingWillingnessWork (electrical)Data sharingwillingness0509 other social sciences050904 information & library sciencesPsychologyPersonally identifiable informationBarriersInformation Systems
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Security and privacy in the Internet of Things: Current status and open issues

2014

The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous and pervasive, a number of security and privacy issues will arise. Credible, economical, efficient and effective security and privacy for IoT are required to ensure exact and accurate confidentiality, integrity, authentication, and access control, among others. In this paper, the IoT vision, existing security threats, and open challenges in the domain of IoT are discussed. The current state of research on IoT security requirements is discussed and future research directions with respect to IoT security and privacy ar…

Information privacyCloud computing securityPrivacy by DesignComputer sciencePrivacy softwarebusiness.industryInternet privacyData securityAccess controlComputer securitycomputer.software_genreInternet securitybusinessPersonally identifiable informationcomputer2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Information Security and Privacy in Medical Application Scenario

2010

This chapter discusses security and privacy aspects for medical application scenario. The chapter analyze what kind security and privacy enforcements would be needed and how it can be achieved by technological means. Authors reviewed cryptographic mechanisms and solutions that can be useful in this context.

Information privacyCloud computing securityPrivacy by Designbusiness.industryPrivacy softwareInternet privacyComputer securitycomputer.software_genreSecurity information and event managementInformation sensitivityInformation security managementbusinessPersonally identifiable informationcomputer
researchProduct