Search results for "privacy"
showing 10 items of 402 documents
The Antecedents of Consumers’ Negative Attitudes Toward SMS Advertising: A Theoretical Framework and Empirical Study
2013
Short message service (SMS) advertising refers to the transmission of advertising via mobile phones in the form of text-based messages (Haghirian, Madlberger, and Tanuskova 2005). Recent marketing research indicates that investigations on consumers’ attitudes toward SMS advertising are limited, and empirical examination of antecedents that negatively influence attitudes toward SMS advertising is even scarcer. As a consequence of this lack of knowledge, current practices of mobile advertising might be ineffective. This research examines irritation, privacy concerns, and intrusiveness perception as main factors that provoke a negative attitude toward SMS advertising. Using structural equation…
Psychological support and psychotherapy via digital devices in Covid-19 emergency time: Some critical issues
2020
The Covid-19 pandemic and the resulting fear, quarantine and lockdown measures implemented in Italy and other countries to contain the risk of contagion have seriously impacted the mental health of a large number of people. The need to offer psychological and psychotherapeutic support to these people, while respecting the government’s pressing calls to “stay home”, have led many psychologists and psychotherapists, both in the public and private sectors, to provide their professional services via teleconference, telephone, smartphone, etc. The aim of this work is to highlight some critical issues related to the sudden switch from the traditional method of providing psychological services to…
“Krokodil”—Revival of an Old Drug with New Problems
2012
In order to summarize current knowledge about the drug "Krokodil" a systematic review including a literature search of the databases PubMed, Embase, Scopus, and Google was conducted in December 2011. According to information acquired, "Krokodil" is a mixture of several substances and was first reported to have been used in Russia in 2003. The core agent of "Krokodil" is desomorphine, an opioid-analogue that can be easily and cheaply manufactured by oneself. Self-production results in a contaminated suspension that is injected intravenously. Due to its pharmacologic features, desomorphine shows a high potential to cause dependence. Against the background of first possible cases of "Krokodil"…
Experiences from a wearable-mobile acquisition system for ambulatory assessment of diet and activity
2017
Public health trends are currently monitored and diagnosed based on large studies that often rely on pen-and-paper data methods that tend to require a large collection campaign. With the pervasiveness of smart-phones and -watches throughout the general population, we argue in this paper that such devices and their built-in sensors can be used to capture such data more accurately with less of an effort. We present a system that targets a pan-European and harmonised architecture, using smartphones and wrist-worn activity loggers to enable the collection of data to estimate sedentary behavior and physical activity, plus the consumption of sugar-sweetened beverages. We report on a unified pilot…
Crowdsourcing Cultural Heritage: From 3D Modeling to the Engagement of Young Generations
2016
Monitoring, digitizing and archiving museum artworks represent an important socio-cultural accomplishment and an overcoming in digital preservation today. Cultural heritage is constantly under threat of terrorist attacks and natural disaster. The high costs related to documentation task have prevented a constantly and massive survey activity. The low cost 3D image based acquisition and elaboration techniques of an object, allow to carry out a 3D photorealistic model in a short time. Therefore, a lot of museum adopted these techniques for the artworks archiving. Crowdsourcing activities can significantly speed up survey and elaboration procedures. If, on the one hand, these initiatives can h…
What Motivates Internet Users to Search for Asperger Syndrome and Autism on Google?
2020
Social campaigns are carried out to promote autism spectrum disorder (ASD) awareness, normalization, and visibility. The internet helps to shape perceptions of Asperger syndrome and autism. In fact, these campaigns often coincide with the increase in searches for both diagnoses on Google. We have two study objectives: to use Google Trends to identify the annual time points from 2015 to 2019 with the highest Google search traffic in Spain for the terms &ldquo
A secret sharing scheme for anonymous DNS queries
2013
Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…
Enhancing Privacy and Authorization Control Scalability in the Grid through Ontologies
2009
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many u…
Young People and the Dark Side of Social Media: Possible Threats to National Security
2020
Social media is increasingly becoming a forum for criminality, misuse, and hate speech, as there are no filters or other controlling mechanisms to filter user-generated content.Furthermore, disinformation and propaganda are becoming more sophisticated and harder to track. Hence, this dark side of social media can pose a viable threat to national security. Future generations will be born into an environment of polluted and polarised online information networks. Consequently, young people, many of whom use social media on a daily basis, will have to find ways to survive in these circumstances,often without the help, knowledge, or experience of earlier generations. Thus, young people are at ri…
Two tiered privacy enhanced intrusion detection system architecture
2009
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.