Search results for "Privacy"
showing 10 items of 402 documents
Usability and Trust in E-Banking
2007
This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…
Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey
2021
Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…
Pseudonyms for Cancer Registries
1996
AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…
Daudznacionālu uzņēmumu ietekme uz personu privātumu
2021
Šī pētījuma mērķis ir izpētīt korelāciju starp patērētāju datu privātumu un starptautisko uzņēmumu priekšrocībām un to, kā tas ietekmē patērētāju privātumu. Autors apkopo un analizē teorētisko pamatu, izmantojot daudzus zinātniskus rakstus un žurnālus. Pēc tam pētnieka mērķis ir veikt aptauju starp 109 respondentiem, lai apkopotu ieskatu par to, cik plaši patērētāji rūpējas par savu vispārējo privātumu no starptautiskiem uzņēmumiem un cik labi starptautiski uzņēmumi respektē vai aizsargā savu klientu privātumu no digitālās attīstības. Tehnoloģijas patērētāji ir izrādījuši mazāku interesi aizsargāt savu privātumu, jo liela daļa informācijas tiek saglabāta internetā un citos avotos, pamatojot…
Logika algorytmów w świecie pracy ery technologicznej - nowe możliwości i nowe ograniczenia
2022
Uprawnienia kierownicze pracodawcy wynikające z przepisów prawa pracy są innej natury niż te kształtowane przez technologię, lokują one działanie kierownictwa pracodawcy w zupełnie innym obszarze niż technologia — w relacjach międzyludzkich, a nie w danych, w poleceniach, a nie w sygnałach, w odnoszeniu się do sposobów bycia jednostki, a nie do sprzężeń zwrotnych, do jej sumienności i staranności, a nie do nastawiania jej na wykorzystywanie. Kierownictwo technologiczne ma inne środki wyrazu, inną metodykę działania, inną skalę przymusu i porządku, jest inaczej zabezpieczane, nie zna granic, które stawia się kierownictwu normatywnemu. Technologia pozwala na zmianę paradygmatu kierownictwa dz…
Algoritmi reputazionali e consenso validamente prestato
2021
Il commento analizza la recente giurisprudenza di legittimità in materia di algoritmo reputazionale: la Cassazione, nel riprendere la lettura del Garante della privacy, afferma come ai fini del trattamento lecito dei dati da parte delle piattaforme web, il consenso è validamente manifestato solo se relativo ad uno specifico trattamento; e sempre che il singolo sia stato adeguatamente informato delle modalità di funzionamento dell’algoritmo. L’autrice sottolinea come in chiave prospettica un simile orientamento consentirebbe di limitare le forme di discriminazione “occulta”, che spesso le piattaforme predispongono all’insaputa dei lavoratori
The challenge of the predatory open-access publishing outbreak
2019
NA
Organizational information and communication technologies and their influence on communication visibility and perceived proximity
2021
This study investigates the relationships between the use of various organizational ICTs, communication visibility, and perceived proximity to distant colleagues. In addition, this study examines the interplay between visibility and proximity, to determine whether visibility improves proximity, or vice versa. These relationships are tested in a global company using two waves of panel survey data. ESM use increases communication visibility and perceived proximity, while controlling for prior levels of visibility, proximity, and the use of other organizational ICTs. The influence of ESM on network translucence and perceived proximity is generally stronger than the impact of other technologie…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
Big Data and Antitrust Enforcement
2017
The interaction between information, innovation and market outcomes is shaping the modern digital industries of the 21st century: the business models of search engines, social networks, e-commerce websites and marketplaces are highly reliant on the ability to gather and process large amount of data. At the same time, it is increasingly recognized that the use of Big Data by online platforms and intermediaries has far-reaching consequences not only on economic activity, but also on social and political mechanisms: technological developments affecting information flows affect the organization of markets as well as the nature of individual interactions and the functioning of the political proc…