Search results for "privacy"
showing 10 items of 402 documents
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
2021
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …
Rings for privacy: An architecture for privacy-preserving user profiling
2014
Mobile phone addiction: a point of issue.
2010
Approvvigionamento di flussi e dati tramite il dispositivo telefonico altrui
2019
Il contributo affronta il tema delle indagini digitali tramite dispositivo telefonico. Ci si chiede mediante quali mezzi di ricerca della prova si possono acquisire tutte le informazioni utili alle indagini contenute in un telefono cellulare e se, per il buon esito delle stesse, sia consentito servirsi incondizionatamente del dispositivo, procedendo a una immediata ispezione o perquisizione, ovvero se non sia più opportuno che l'apparecchio venga sottoposto a sequestro e, con l'ausilio di esperti, procedere all'analisi e all'acquisizione dei dati ivi contenuti mediante un accertamento tecnico che, in molti casi, può assumere il connotato della irripetibilità. Ci si chiede, inoltre, se è rag…
Antecedents of the Barriers Toward the Adoption of Unified Payment Interface
2020
This study examines the influence of factors related to consumer resistance on the intention to continue using the Unified Payment Interface (UPI) for electronic payments. UPI facilitates advanced, peer-to-peer, immediate payment with seamless interoperability among banks in India. The study extends the innovation resistance theory by including two behavioral measures - privacy concerns and visibility - and two moderators - security concerns and word of mouth (WOM). It used cross-sectional data collected from 714 UPI users aged between 16 and 55 years to test the proposed research model. The findings suggest that privacy concerns and usage barrier are the two crucial factors to be addressed…
The Users’ Perspective
2014
In this chapter 20 former research subjects in brain–computer interface (BCI) studies answer questions concerning their experiences with this novel technology. They talk about their state of information, their expectations, their achievements, and also their disappointments. The answers display a wide spectrum of attitudes and personal assessments ranging from enthusiastic appreciation to skeptical reservation. Many users mention the current shortcomings but also stress the potential of the tested technology.
Internet of things Enabling Smart School : An Overview
2021
Internet of things (IoT) is making its way in every field of life. Education is not an exception. IoT is making landmark achievements in its applications in the field of education. This paper presents an overview of the key IoT applications in the field of education from the perspective of school management, teachers, and learners enabling smart school concept and challenges and limitations in embarking IoT in educational settings. peerReviewed
Selection and evaluation of Internet information by adults with intellectual disabilities
2018
Internet offers people with intellectual disabilities (ID) unique opportunities to access information and to participate in society. But concerns have been raised about the potential risks they face when accessing the Internet (e.g. giving credit to false information, being exposed to manipulative content). As part of the current debate between positive risk-taking and overprotection, our study empirically tested the extent to which 43 adults with ID identified and selected topically relevant as well as trustworthy web pages while searching the Internet for several topics (e.g. Can social networks use your pictures for advertisement?). Participants also justified their search decisions. Res…
Mental health service users' and professionals' relationship with games and gaming
2017
Background Games and elements of gamification can be utilized in mental healthcare to provide customized interventions for the service users. However, very little evidence exists as to what kind of experiences service users and professionals have towards games and gaming, and what their perceptions of the phenomenon are. This sort of information is needed to help professionals put game-based interventions actively into practice in mental health services. Research objectives The objective is to describe the experiences and perceptions of digital games and gaming from the perspectives of mental health service users and mental health professionals. Methods In this qualitative study, data consi…
The role of trust in enhancing Internet use in a high-risk society
2015
Purpose – This paper aims to determine the key trust antecedents that influence Internet users’ trust level toward Internet service providers (ISPs) in a high-risk society. It also investigates trust-building process, major causes of its violation, their potential implications and restoration. Design/methodology/approach – A mixed-method approach was used in collecting data in Kenya in 2014 by using questionnaire and interview techniques. The former was administered to 250 (with 81 per cent response rate) randomly selected Internet users at Kenyatta University while the latter focused on key decision-makers from four randomly selected ISPs in Nairobi. Findings – The results show that Inter…