Search results for "Privacy"

showing 10 items of 402 documents

Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.

2018

As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop…

Biomedical Research020205 medical informaticsbusiness.industryProcess (engineering)Information DisseminationInternet privacyAdministrative PersonnelPhysical Therapy Sports Therapy and Rehabilitation02 engineering and technologyGeneral MedicineResearch Personnel03 medical and health sciences0302 clinical medicineProfessionalism0202 electrical engineering electronic engineering information engineeringMedicineHumansThe InternetSocial media030212 general & internal medicineSource documentbusinessDisseminationHealth EducationSocial MediaThe Journal of orthopaedic and sports physical therapy
researchProduct

Plant visibility through mobile learning? Implementation and evaluation of an interactiveFlower Huntin a botanic garden

2017

Plants have an enormous importance for life on earth but are often overlooked. This phenomenon called plant blindness is reinforced as students prefer to spend their recreation time with modern med...

Blindnessbusiness.industry05 social sciencesVisibility (geometry)Internet privacyEducational technology050301 education010501 environmental sciencesmedicine.disease01 natural sciencesNatural resourceEducationmedicineBusinessGeneral Agricultural and Biological Sciences0503 educationMobile deviceRecreation0105 earth and related environmental sciencesJournal of Biological Education
researchProduct

Radiation Therapy in Palestine: Not Only Money, But Also Real Accessibility

2017

Cancer ResearchRadiationbusiness.industrymedicine.medical_treatmentInternet privacyRadiation therapy03 medical and health sciences0302 clinical medicineOncology030220 oncology & carcinogenesismedicineRadiology Nuclear Medicine and imaging030212 general & internal medicinePalestinebusinessInternational Journal of Radiation Oncology*Biology*Physics
researchProduct

An Investigation of Security and Privacy for Human Bond Communications

2017

Cloud computing securityPrivacy softwarebusiness.industry020204 information systemsBondInternet privacy0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications02 engineering and technologyBusinessComputer securitycomputer.software_genrecomputerHuman Bond Communication
researchProduct

ICT for Consumers or Human Beings

2011

The large scale deployment of mobile applications inevitably impacts upon our culture as a whole and affects more intimately our daily lives. Not all of these effects are desirable. In a market economy, ethical issues are not the most important drivers in the development of technology. In this chapter, the authors ask whether the mobile human-computer interaction community could take an active role in discussing ethical issues. In so doing as a community we could focus our attention on developing technology for ‘human beings’ rather than fine tuning our emerging gadgets.

CommerceEthical issuesbusiness.industryInformation and Communications TechnologySoftware deploymentScale (social sciences)Internet privacybusiness
researchProduct

From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets

2021

Abstract In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. There…

Computer Networks and CommunicationsComputer scienceData managementData security02 engineering and technologyLibrary and Information SciencesBusiness modelUser-generated dataLatent Dirichlet allocationData-drivensymbols.namesake020204 information systemsPrivacy concerns0502 economics and business0202 electrical engineering electronic engineering information engineeringUsers' privacyFocus (computing)Data-driven innovationbusiness.industry05 social sciencesObject (computer science)Data scienceSystematic reviewORGANIZACION DE EMPRESASsymbols050211 marketingbusinessInformation SystemsInternational Journal of Information Management
researchProduct

Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps

2019

Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…

Computer Networks and Communicationsbusiness.industryCommunicationInternet privacyCognitive biaslanguage.human_languageGermanSmartphone appMedia TechnologylanguagePsychologybusinessSelection (genetic algorithm)Range (computer programming)Social relatednessMobile Media & Communication
researchProduct

User behaviours after critical mobile application incidents: the relationship with situational context

2015

Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…

Computer Networks and Communicationsbusiness.industrymedia_common.quotation_subject05 social sciencesInternet privacyWord of mouthAdvertisingContext (language use)02 engineering and technologyService provider020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingContinuanceSituational ethicsPsychologybusinessFunction (engineering)SoftwareMobile serviceInformation Systemsmedia_commonInformation Systems Journal
researchProduct

Teletraffic Engineering for Direct Load Control in Smart Grids

2018

International audience; The traditional paradigm for power grid operation is to continuously adapt energy production to demand. This paradigm is challenged by the increasing penetration of renewable sources, that are more variable and less predictable. An alternative approach is the direct load control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performance metrics. In this paper we go beyond such an analogy, showing that u…

Computer science020209 energyDistributed computingDirect controlEnergy Engineering and Power Technology02 engineering and technologySmart gridAdmission control; Direct load control; Privacy; Smart grid;7. Clean energyTeletraffic engineering[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringPower gridElectrical and Electronic EngineeringDirect load controlLeakage (electronics)Direct Load Controlbusiness.industryRenewable Energy Sustainability and the EnvironmentSettore ING-INF/03 - TelecomunicazioniBandwidth (signal processing)Admission Control[SPI.NRJ]Engineering Sciences [physics]/Electric powerAdmission controlRenewable energySmart gridControl and Systems EngineeringPrivacybusinessAdmission control
researchProduct

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct