Search results for "privacy"

showing 10 items of 402 documents

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct

Mobile phone addiction: a point of issue.

2010

Injury controlPoint (typography)AdolescentAccident preventionbusiness.industryInternet privacyMedicine (miscellaneous)Poison controlmedicine.diseaseBehavior AddictivePsychiatry and Mental healthmedicineMobile phone addictionHumansPsychologyMedical emergencyPsychologybusinessCell PhoneAddiction (Abingdon, England)
researchProduct

Approvvigionamento di flussi e dati tramite il dispositivo telefonico altrui

2019

Il contributo affronta il tema delle indagini digitali tramite dispositivo telefonico. Ci si chiede mediante quali mezzi di ricerca della prova si possono acquisire tutte le informazioni utili alle indagini contenute in un telefono cellulare e se, per il buon esito delle stesse, sia consentito servirsi incondizionatamente del dispositivo, procedendo a una immediata ispezione o perquisizione, ovvero se non sia più opportuno che l'apparecchio venga sottoposto a sequestro e, con l'ausilio di esperti, procedere all'analisi e all'acquisizione dei dati ivi contenuti mediante un accertamento tecnico che, in molti casi, può assumere il connotato della irripetibilità. Ci si chiede, inoltre, se è rag…

Intercettazioni telefoniche - Indagini atipiche - Attività ispettiva urgente della polizia giudiziariaSettore IUS/16 - Diritto Processuale PenaleIndagini digitali - Ispezione - Perquisizione - Accertamenti tecnici irripetibili - Attività della polizia giudiziaria - Attività del pubblico ministero - Diritto alla riservatezza - Libertà e segretezza delle comunicazioni - Inviolabilità del domicilio - Diritto alla privacy
researchProduct

Antecedents of the Barriers Toward the Adoption of Unified Payment Interface

2020

This study examines the influence of factors related to consumer resistance on the intention to continue using the Unified Payment Interface (UPI) for electronic payments. UPI facilitates advanced, peer-to-peer, immediate payment with seamless interoperability among banks in India. The study extends the innovation resistance theory by including two behavioral measures - privacy concerns and visibility - and two moderators - security concerns and word of mouth (WOM). It used cross-sectional data collected from 714 UPI users aged between 16 and 55 years to test the proposed research model. The findings suggest that privacy concerns and usage barrier are the two crucial factors to be addressed…

Interface (Java)business.industrymedia_common.quotation_subjectInteroperabilityInternet privacyVisibility (geometry)Key (cryptography)Mobile paymentWord of mouthResistance (psychoanalysis)BusinessPaymentmedia_common
researchProduct

The Users’ Perspective

2014

In this chapter 20 former research subjects in brain–computer interface (BCI) studies answer questions concerning their experiences with this novel technology. They talk about their state of information, their expectations, their achievements, and also their disappointments. The answers display a wide spectrum of attitudes and personal assessments ranging from enthusiastic appreciation to skeptical reservation. Many users mention the current shortcomings but also stress the potential of the tested technology.

Interface (Java)business.industrymedia_common.quotation_subjectPerspective (graphical)Internet privacyReservationPsychologybusinessBrain–computer interfaceSkepticismmedia_common
researchProduct

Internet of things Enabling Smart School : An Overview

2021

Internet of things (IoT) is making its way in every field of life. Education is not an exception. IoT is making landmark achievements in its applications in the field of education. This paper presents an overview of the key IoT applications in the field of education from the perspective of school management, teachers, and learners enabling smart school concept and challenges and limitations in embarking IoT in educational settings. peerReviewed

Internet of thingseducationkoulutusteknologiabusiness.industryInternet privacyComputingMilieux_COMPUTERSANDEDUCATIONälytekniikkakoulu (ilmiöt)esineiden internetsmart schooldigital applicationsbusinessInternet of Things
researchProduct

Selection and evaluation of Internet information by adults with intellectual disabilities

2018

Internet offers people with intellectual disabilities (ID) unique opportunities to access information and to participate in society. But concerns have been raised about the potential risks they face when accessing the Internet (e.g. giving credit to false information, being exposed to manipulative content). As part of the current debate between positive risk-taking and overprotection, our study empirically tested the extent to which 43 adults with ID identified and selected topically relevant as well as trustworthy web pages while searching the Internet for several topics (e.g. Can social networks use your pictures for advertisement?). Participants also justified their search decisions. Res…

Internet privacyPositive risk-takingHealth Professions (miscellaneous)EducationIntellectual disabilitiesDidáctica y Organización EscolarIntellectual disabilityCredibilityDevelopmental and Educational Psychologymedicine0501 psychology and cognitive sciencesSelection (genetic algorithm)TrustworthinessInternet risksbusiness.industryInformation seekingInformation literacy05 social sciences050301 educationmedicine.diseaseInternet searchTrustworthinessThe InternetbusinessPsychology0503 educationInclusion (education)050104 developmental & child psychology
researchProduct

Mental health service users' and professionals' relationship with games and gaming

2017

Background Games and elements of gamification can be utilized in mental healthcare to provide customized interventions for the service users. However, very little evidence exists as to what kind of experiences service users and professionals have towards games and gaming, and what their perceptions of the phenomenon are. This sort of information is needed to help professionals put game-based interventions actively into practice in mental health services. Research objectives The objective is to describe the experiences and perceptions of digital games and gaming from the perspectives of mental health service users and mental health professionals. Methods In this qualitative study, data consi…

Internet privacyPsychological interventionHealth Informaticslcsh:Computer applications to medicine. Medical informaticsservice userMental health serviceMental healthcarepelillistäminenmielenterveysHealth Information Managementhealth professionalsgame-based interventionService userta518gamingtietokonepelithealth professionalOriginal Researchta113Health professionalsbusiness.industryHealth PolicyComputingMilieux_PERSONALCOMPUTINGta3141mental health servicesGamificationta3124Computer Science Applicationslcsh:R858-859.7mielenterveyspalvelutbusinessPsychologyverkkopelitdigitaaliset pelitDIGITAL HEALTH
researchProduct

The role of trust in enhancing Internet use in a high-risk society

2015

Purpose – This paper aims to determine the key trust antecedents that influence Internet users’ trust level toward Internet service providers (ISPs) in a high-risk society. It also investigates trust-building process, major causes of its violation, their potential implications and restoration. Design/methodology/approach – A mixed-method approach was used in collecting data in Kenya in 2014 by using questionnaire and interview techniques. The former was administered to 250 (with 81 per cent response rate) randomly selected Internet users at Kenyatta University while the latter focused on key decision-makers from four randomly selected ISPs in Nairobi. Findings – The results show that Inter…

Internet useGeneral Computer Sciencebusiness.industrymedia_common.quotation_subjectInternet privacyDeveloping countryTerms of servicePerceptionRisk societyMarketingInternet usersbusinessCompetence (human resources)Risk managementInformation Systemsmedia_commonJournal of Systems and Information Technology
researchProduct