Search results for "Privacy"
showing 10 items of 402 documents
Benefits and Threats to Using Social Media for Presenting and Implementing Evidence.
2018
As a potential high-yield tool for disseminating information that can reach many people, social media is transforming how clinicians, the public, and policy makers are educated and find new knowledge associated with research-related information. Social media is available to all who access the internet, reducing selected barriers to acquiring original source documents such as journal articles or books and potentially improving implementation-the process of formulating a conclusion and moving on that decision. The use of social media for evidence dissemination/implementation of research has both benefits and threats. It is the aim of this Viewpoint to provide a balanced view of each. J Orthop…
Plant visibility through mobile learning? Implementation and evaluation of an interactiveFlower Huntin a botanic garden
2017
Plants have an enormous importance for life on earth but are often overlooked. This phenomenon called plant blindness is reinforced as students prefer to spend their recreation time with modern med...
Radiation Therapy in Palestine: Not Only Money, But Also Real Accessibility
2017
An Investigation of Security and Privacy for Human Bond Communications
2017
ICT for Consumers or Human Beings
2011
The large scale deployment of mobile applications inevitably impacts upon our culture as a whole and affects more intimately our daily lives. Not all of these effects are desirable. In a market economy, ethical issues are not the most important drivers in the development of technology. In this chapter, the authors ask whether the mobile human-computer interaction community could take an active role in discussing ethical issues. In so doing as a community we could focus our attention on developing technology for ‘human beings’ rather than fine tuning our emerging gadgets.
From user-generated data to data-driven innovation: A research agenda to understand user privacy in digital markets
2021
Abstract In recent years, strategies focused on data-driven innovation (DDI) have led to the emergence and development of new products and business models in the digital market. However, these advances have given rise to the development of sophisticated strategies for data management, predicting user behavior, or analyzing their actions. Accordingly, the large-scale analysis of user-generated data (UGD) has led to the emergence of user privacy concerns about how companies manage user data. Although there are some studies on data security, privacy protection, and data-driven strategies, a systematic review on the subject that would focus on both UGD and DDI as main concepts is lacking. There…
Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps
2019
Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…
User behaviours after critical mobile application incidents: the relationship with situational context
2015
Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…
Teletraffic Engineering for Direct Load Control in Smart Grids
2018
International audience; The traditional paradigm for power grid operation is to continuously adapt energy production to demand. This paradigm is challenged by the increasing penetration of renewable sources, that are more variable and less predictable. An alternative approach is the direct load control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performance metrics. In this paper we go beyond such an analogy, showing that u…
Logical Key Hierarchy for Group Management in Distributed Online Social Networks
2016
Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …