Search results for "privacy"

showing 10 items of 402 documents

The Antecedents of Consumers’ Negative Attitudes Toward SMS Advertising: A Theoretical Framework and Empirical Study

2013

Short message service (SMS) advertising refers to the transmission of advertising via mobile phones in the form of text-based messages (Haghirian, Madlberger, and Tanuskova 2005). Recent marketing research indicates that investigations on consumers’ attitudes toward SMS advertising are limited, and empirical examination of antecedents that negatively influence attitudes toward SMS advertising is even scarcer. As a consequence of this lack of knowledge, current practices of mobile advertising might be ineffective. This research examines irritation, privacy concerns, and intrusiveness perception as main factors that provoke a negative attitude toward SMS advertising. Using structural equation…

MarketingIntrusivenessShort Message ServiceSms advertisingbusiness.industryCommunicationmedia_common.quotation_subjectInternet privacyAdvertisingStructural equation modelingEmpirical researchPerceptionLack of knowledgeBusinessMarketing researchmedia_commonJournal of Interactive Advertising
researchProduct

Psychological support and psychotherapy via digital devices in Covid-19 emergency time: Some critical issues

2020

The Covid-19 pandemic and the resulting fear, quarantine and lockdown measures implemented in Italy and other countries to contain the risk of contagion have seriously impacted the mental health of a large number of people. The need to offer psychological and psychotherapeutic support to these people, while respecting the government’s pressing calls to “stay home”, have led many psychologists and psychotherapists, both in the public and private sectors, to provide their professional services via teleconference, telephone, smartphone, etc. The aim of this work is to highlight some critical issues related to the sudden switch from the traditional method of providing psychological services to…

Mental Health ServicesTelemedicine020205 medical informaticsPneumonia Viral02 engineering and technologye-psychological careprivacyBetacoronavirus03 medical and health sciences0302 clinical medicineInformed consent0202 electrical engineering electronic engineering information engineeringprofessional responsibilityHumansConfidentiality030212 general & internal medicinePandemicsComputer SecurityGovernmentcriticismSARS-CoV-2business.industryinformed consentTeleconferenceGeneral MedicinePublic relationsPrivate sectorProfessional responsibilityMental healthTelemedicineItalyQuarantinePsychologybusinessCovid-19Coronavirus InfectionsConfidentiality
researchProduct

“Krokodil”—Revival of an Old Drug with New Problems

2012

In order to summarize current knowledge about the drug "Krokodil" a systematic review including a literature search of the databases PubMed, Embase, Scopus, and Google was conducted in December 2011. According to information acquired, "Krokodil" is a mixture of several substances and was first reported to have been used in Russia in 2003. The core agent of "Krokodil" is desomorphine, an opioid-analogue that can be easily and cheaply manufactured by oneself. Self-production results in a contaminated suspension that is injected intravenously. Due to its pharmacologic features, desomorphine shows a high potential to cause dependence. Against the background of first possible cases of "Krokodil"…

Morphine DerivativesHealth (social science)business.industryInternet privacyPublic Health Environmental and Occupational HealthMedicine (miscellaneous)Opioid-Related DisordersDesigner DrugsRussiaEuropePsychiatry and Mental healthWestern europemedicineHumansDesomorphinebusinessmedicine.drugSubstance Use & Misuse
researchProduct

Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity

2017

Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…

Multi-modal data collectionEngineeringNutrition and DiseasePopulationPrivacy laws of the United StatesData securityWearable computer050109 social psychology02 engineering and technologycomputer.software_genreActivity recognitionBeverage consumption logging020204 information systemsVoeding en Ziekte0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesAccelerometer dataeducationSensory Science and Eating BehaviourVLAGConsumption (economics)education.field_of_studyMultimediabusiness.industryBarcode scanning05 social sciencesLocale (computer hardware)PresentationData scienceSensoriek en eetgedragActivity recognitionbusinesscomputer
researchProduct

Crowdsourcing Cultural Heritage: From 3D Modeling to the Engagement of Young Generations

2016

Monitoring, digitizing and archiving museum artworks represent an important socio-cultural accomplishment and an overcoming in digital preservation today. Cultural heritage is constantly under threat of terrorist attacks and natural disaster. The high costs related to documentation task have prevented a constantly and massive survey activity. The low cost 3D image based acquisition and elaboration techniques of an object, allow to carry out a 3D photorealistic model in a short time. Therefore, a lot of museum adopted these techniques for the artworks archiving. Crowdsourcing activities can significantly speed up survey and elaboration procedures. If, on the one hand, these initiatives can h…

Museum collections010504 meteorology & atmospheric sciencesComputer scienceInternet privacyCultural HeritageCultural Heritage 3D modeling Structure From Motion (SfM) Museum collections crowdsourcingCrowdsourcingcomputer.software_genreStructure From Motion (SfM)01 natural sciencesTask (project management)3D modelingDocumentation0601 history and archaeologyNatural disaster0105 earth and related environmental sciencesCultural Heritage 3D modeling Stucture from Motion (SfM) Museum collections crowdsourcing060102 archaeologyMultimediabusiness.industryVisitor pattern06 humanities and the artsObject (philosophy)Cultural heritageDigital preservationSettore ICAR/17 - Disegnocrowdsourcingbusinesscomputer
researchProduct

What Motivates Internet Users to Search for Asperger Syndrome and Autism on Google?

2020

Social campaigns are carried out to promote autism spectrum disorder (ASD) awareness, normalization, and visibility. The internet helps to shape perceptions of Asperger syndrome and autism. In fact, these campaigns often coincide with the increase in searches for both diagnoses on Google. We have two study objectives: to use Google Trends to identify the annual time points from 2015 to 2019 with the highest Google search traffic in Spain for the terms &ldquo

MyNews020205 medical informaticsgenetic structuresGoogle trendsAutism Spectrum DisorderHealth Toxicology and Mutagenesismedia_common.quotation_subjectInternet privacylcsh:Medicineautism02 engineering and technologysocial campaignsbehavioral disciplines and activitiesArticlePerceptionmental disorders0202 electrical engineering electronic engineering information engineeringmedicineNormalization (sociology)Humans0501 psychology and cognitive sciencesAsperger SyndromeAutistic Disordermedia_commonAspergerInternetbusiness.industry05 social scienceslcsh:RPublic Health Environmental and Occupational HealthSensationalismmedicine.diseaseSocial marketingTrendinaliaAsperger syndromeAutism spectrum disorderSpainAutismThe Internetinternet users’ behaviorAutismebusinessPsychology050104 developmental & child psychologyInternational Journal of Environmental Research and Public Health
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies

2009

The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…

National securityDatabases FactualMedical Records Systems ComputerizedComputer scienceOpen grid services architecture (OGSA)Information Storage and RetrievalData securityCryptographycomputer.software_genreEncryptionComputer securityAccess to InformationOntologiesCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALHumansElectrical and Electronic EngineeringGridComputer SecurityInternetbusiness.industryAuthorizationGeneral MedicineInformation securityGridComputer Science ApplicationsGrid computingPrivacyScalabilityKey (cryptography)SecurityDatabase Management SystemsbusinessWeb service resource framework (WSRF)computerLENGUAJES Y SISTEMAS INFORMATICOSConfidentialityBiotechnology
researchProduct

Young People and the Dark Side of Social Media: Possible Threats to National Security

2020

Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…

National securitypolicebusiness.industrysocial mediaInternet privacysosiaalinen mediapoliisi (organisaatiot)young peoplerikollisuusnuoretGreat RiftPolitical scienceinformaatiovaikuttaminenSocial medianational securitykansallinen turvallisuustietoturvabusinessinformation influenceriskitProceedings of the 19th European Conference on Cyber Warfare
researchProduct

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct