Search results for "Privacy"

showing 10 items of 402 documents

Usability and Trust in E-Banking

2007

This study assessed the role of usability in trust of e-banking services. A questionnaire was administered to 185 Italian undergraduate working students who volunteered for the experiment (M age = 30.5 yr., SD = 3.1). Participants were differentiated on computer ability (Expert, n=104; Nonexpert, n = 81) and e-banking use (User, n = 93; Nonusers, n = 92). Analysis showed that the website usability of e-banking services did not play a very important role for the User group. Instead, institution-based trust, e.g., the trust in the security policy of the Web merchant, customers, and the overall trust of the bank were the crucial factors in the adoption of e-banking. © Psychological Reports 200…

AdultMaleSettore M-PSI/01 - Psicologia GeneraleEconomicse-banking e-banking servicesInternet privacyTrustSecurity policyRisk AssessmentUser groupHumansStudentsWeb usabilityComputer SecurityGeneral PsychologyInternetAttitude to Computersbusiness.industryData CollectionFraudE bankingUsabilityItalyInstitution (computer science)FemalePsychologybusinessPsychological Reports
researchProduct

Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey

2021

Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…

AdultMaleTelemedicineClinical Care and TechnologyInternationalityCoronavirus disease 2019 (COVID-19)pediatricstelehealthtype 1 diabetesHealth PersonnelEndocrinology Diabetes and MetabolismTelehealthCOVID‐19Surveys and QuestionnairesGlobal networkPandemicDiabetes MellitusInternal MedicinemedicineHumansData Protection Act 1998PandemicsReimbursementAgedAged 80 and overInternetbusiness.industryCOVID-19Middle Agedmedicine.diseaseWorld wideCross-Sectional StudiesPrivacyPediatrics Perinatology and Child HealthFemalevirtualMedical emergencytelemedicinebusinessPediatric Diabetes
researchProduct

Pseudonyms for Cancer Registries

1996

AbstractIn order to conform to the rigid German legislation on data privacy and security we developed a new concept of data flow and data storage for population-based cancer registries. A special trusted office generates a pseudonym for each case by a cryptographic procedure. This office also handles the notification of cases and communicates with the reporting physicians. It passes pseudonymous records to the registration office for permanent storage. The registration office links the records according to the pseudonyms. Starting from a requirements analysis we show how to construct the pseudonyms; we then show that they meet the requirements. We discuss how the pseudonyms have to be prote…

Advanced and Specialized NursingInformation privacyeducation.field_of_studybusiness.industryPopulationHealth InformaticsCryptographyPseudonymComputer securitycomputer.software_genreHealth informaticsData flow diagramHealth Information ManagementSynonym (database)MedicinebusinesseducationcomputerRequirements analysisMethods of Information in Medicine
researchProduct

Daudznacionālu uzņēmumu ietekme uz personu privātumu

2021

Šī pētījuma mērķis ir izpētīt korelāciju starp patērētāju datu privātumu un starptautisko uzņēmumu priekšrocībām un to, kā tas ietekmē patērētāju privātumu. Autors apkopo un analizē teorētisko pamatu, izmantojot daudzus zinātniskus rakstus un žurnālus. Pēc tam pētnieka mērķis ir veikt aptauju starp 109 respondentiem, lai apkopotu ieskatu par to, cik plaši patērētāji rūpējas par savu vispārējo privātumu no starptautiskiem uzņēmumiem un cik labi starptautiski uzņēmumi respektē vai aizsargā savu klientu privātumu no digitālās attīstības. Tehnoloģijas patērētāji ir izrādījuši mazāku interesi aizsargāt savu privātumu, jo liela daļa informācijas tiek saglabāta internetā un citos avotos, pamatojot…

AdvertisementsPrivacyMultinational companiesData trustEkonomika un uzņēmējdarbībaGDPR
researchProduct

Logika algorytmów w świecie pracy ery technologicznej - nowe możliwości i nowe ograniczenia

2022

Uprawnienia kierownicze pracodawcy wynikające z przepisów prawa pracy są innej natury niż te kształtowane przez technologię, lokują one działanie kierownictwa pracodawcy w zupełnie innym obszarze niż technologia — w relacjach międzyludzkich, a nie w danych, w poleceniach, a nie w sygnałach, w odnoszeniu się do sposobów bycia jednostki, a nie do sprzężeń zwrotnych, do jej sumienności i staranności, a nie do nastawiania jej na wykorzystywanie. Kierownictwo technologiczne ma inne środki wyrazu, inną metodykę działania, inną skalę przymusu i porządku, jest inaczej zabezpieczane, nie zna granic, które stawia się kierownictwu normatywnemu. Technologia pozwala na zmianę paradygmatu kierownictwa dz…

Algorithmpodporządkowanietechnologiatechnologygodność osobowasubordinationprivacywładztwopersonal dignityauthorityAlgorytmprywatnośćPraca i Zabezpieczenie Społeczne
researchProduct

Algoritmi reputazionali e consenso validamente prestato

2021

Il commento analizza la recente giurisprudenza di legittimità in materia di algoritmo reputazionale: la Cassazione, nel riprendere la lettura del Garante della privacy, afferma come ai fini del trattamento lecito dei dati da parte delle piattaforme web, il consenso è validamente manifestato solo se relativo ad uno specifico trattamento; e sempre che il singolo sia stato adeguatamente informato delle modalità di funzionamento dell’algoritmo. L’autrice sottolinea come in chiave prospettica un simile orientamento consentirebbe di limitare le forme di discriminazione “occulta”, che spesso le piattaforme predispongono all’insaputa dei lavoratori

Algoritmo reputazionaleSettore IUS/07 - Diritto Del Lavoroconsensoprivacy del lavoratore
researchProduct

The challenge of the predatory open-access publishing outbreak

2019

NA

Anesthesiology and Pain MedicinePredatory publishingbusiness.industryOpen access publishingmedia_common.quotation_subjectInternet privacyMEDLINEMedicineOutbreakDeceptionbusinessethicsmedia_common
researchProduct

Organizational information and communication technologies and their influence on communication visibility and perceived proximity

2021

This study investigates the relationships between the use of various organizational ICTs, communication visibility, and perceived proximity to distant colleagues. In addition, this study examines the interplay between visibility and proximity, to determine whether visibility improves proximity, or vice versa. These relationships are tested in a global company using two waves of panel survey data. ESM use increases communication visibility and perceived proximity, while controlling for prior levels of visibility, proximity, and the use of other organizational ICTs. The influence of ESM on network translucence and perceived proximity is generally stronger than the impact of other technologie…

Auditing and AccountabilityCommunication and Media StudiesComputer sciencetieto- ja viestintätekniikkaEconomics Econometrics and Finance (miscellaneous)Internet privacysosiaalinen media050801 communication & media studiesyhteisöviestintä0508 media and communicationsFile sharingAccounting0502 economics and businessperceived proximitycommunication visibilitysisäinen viestintäbusiness.industry05 social sciencesVisibility (geometry)Business and ManagementTeleconferenceteleconferencingetäkokouksetBusiness & ManagementInformation and Communications Technologyenterprise social mediafile sharingBusiness Management and Accounting (miscellaneous)ICTSnäkyvyysbusiness050203 business & managementInternational Journal of Business Communication
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Big Data and Antitrust Enforcement

2017

The interaction between information, innovation and market outcomes is shaping the modern digital industries of the 21st century: the business models of search engines, social networks, e-commerce websites and marketplaces are highly reliant on the ability to gather and process large amount of data. At the same time, it is increasingly recognized that the use of Big Data by online platforms and intermediaries has far-reaching consequences not only on economic activity, but also on social and political mechanisms: technological developments affecting information flows affect the organization of markets as well as the nature of individual interactions and the functioning of the political proc…

Big DataAntitrustMergerPrivacyCompetition policySettore IUS/08 - Diritto CostituzionaleAntitrust; Big Data; Mergers; Privacy; Competition policyRivista Italiana di Antitrust / Italian Antitrust Review
researchProduct