Search results for "privacy"

showing 10 items of 402 documents

INTIMIDAD DEL TRABAJADOR Y COMUNICACIONES ELECTRÓNICAS SEGÚN EL TRIBUNAL CONSTITUCIONAL

2016

El Tribunal Constitucional ha desempeñado un importante papel en la ponderación de los intereses enfrentados en supuestos en los que la utilización de tecnologías de la información y la comunicación en la empresa somete a examen los lindes entre el respeto a los derechos fundamentales de los trabajadores y las facultades legítimas de dirección, control y organización del empleador.  El objeto de este artículo es analizar la doctrina del Tribunal Constitucional en el estudio de una de las manifestaciones concretas de la implantación generalizada de las tecnologías de la información y comunicación en la empresa, la utilización masiva de medios de comunicación electrónica como medio de comunic…

Secret de les comunicacionsTribunals constitucionalsComunicaciones electrónicasderecho a la información y libertad de expresiónsindicatothe Constitutional CourtDret del treball Legislacióelectronic communicationsderecho a la intimidadderecho al secreto de las comunicacionesTribunal Constitucionalright to privacy
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Work-Family Border Styles and Mobile Technology

2018

Technological innovations and particularly mobile technology have many, complex implications for social life. All in all, mobile technology creates a paradox for employed parents: mobile phones enable better coordination and lower parents’ anxiety over family routines, yet the use of mobile technology increases the need for multitasking and increases the emotional burden of managing multiple roles. It is important to identify differences between workers as not everyone is able to use the possibilities of constant connectivity. This chapter addresses two interlinked topics: first, the possibility for employed parents to occupy different social domains concurrently with mobile technology and …

Self-managementbusiness.industry05 social sciencesInternet privacy050801 communication & media studiesQualitative property0508 media and communicationsWork (electrical)Content analysisInformation and Communications Technology0502 economics and businessmedicineHuman multitaskingAnxietyMobile technologymedicine.symptombusinessPsychology050203 business & management
researchProduct

An Analysis of the Romanian Internet Banking Market from the Perspective of Cloud Computing Services

2013

Abstract The Internet banking today is not something new anymore; all the banks in the Romanian market (and not only) are offering different forms of Internet banking which is ultimately a service in the cloud. In terms of cloud computing, Internet banking represents SaaS for the users, an application which uses Internet for making payments, viewing information, making deposits and so on. In this paper we briefly analyse the Romanian Internet banking market and compare some of the most popular Internet banking platforms. We will also draw some conclusions about this market in the context of the new Cloud computing delivery models.

Service (business)Mobile bankingbusiness.industrySoftware as a serviceInternet privacyGeneral Engineeringonline bankingEnergy Engineering and Power TechnologyContext (language use)Cloud computingelectronic bankingcloud computing.CommerceSMS bankingRetail bankingmobile bankingThe Internetbusinessinternet bankingProcedia Economics and Finance
researchProduct

Privacy-preserving data allocation in decentralized online social networks

2016

International audience; Distributed Online Social Networks (DOSNs) have been recently proposed as an alternative to centralized solutions to allow a major control of the users over their own data. Since there is no centralized service provider which decides the term of service, the DOSNs infrastructure exploits users’ devices to take on the online social network services. In this paper, we propose a data allocation strategy for DOSNs which exploits the privacy policies of the users to increase the availability of the users’ contents without diverging from their privacy preferences. A set of replicas of the profile’s content of a user U are stored on the devices of other users who are entitl…

Service (systems architecture)ExploitComputer sciencePrivacy policyControl (management)02 engineering and technologyPeer-to-peercomputer.software_genreComputer securityTheoretical Computer ScienceSet (abstract data type)[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Privacy policySocial networkSettore INF/01 - Informaticabusiness.industryComputer Science (all)020206 networking & telecommunicationsService providerDecentralized online social network Data availability Privacy policy Peer-to-peerData availabilityPeer-to-peerDecentralized online social network020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

Innovative public governance through cloud computing

2014

Purpose – The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach – We followed a multidisciplinary perspective (social, be…

Service federationInformation privacyInformation Systems and ManagementKnowledge managementPublic Administrationbusiness.industryComputer scienceInformation privacyCorporate governanceCloud computingBusiness modelBusiness modelsKPIsFocus groupComputer Science ApplicationsMultidisciplinary approachCloud computingPerformance measurementPerformance indicatore-governmentbusinessTransforming Government: People, Process and Policy
researchProduct

PRIvacy LEakage Methodology (PRILE) for IDS Rules

2010

This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data sessions are defined as privacy leaking. Furthermore, it analyses the IDS rule attack specific pattern size required in order to keep the privacy leakage below a given threshold, presuming that occurrence frequencies of the attack pattern in normal text are known. We have applied the methodology on the network intrusion detection system Snort’s rule set. The evaluation confirms that Snort in its default configuration aims at not being excessively privacy invasive. However we have identified s…

Set (abstract data type)Pattern sizeEngineeringbusiness.industryPrivacy softwareData miningNetwork intrusion detectionLeakage (economics)computer.software_genreComputer securitybusinesscomputerSignature (logic)
researchProduct

Electronic Health Record in Italy and Personal Data Protection.

2016

The present article deals with the Italian Electronic Health Record (hereinafter ehr), recently introduced by Act 221/2012, with a specific focus on personal data protection. Privacy issues — e.g., informed consent, data processing, patients’ rights and minors’ will — are discussed within the framework of recent e-Health legislation, national Data Protection Code, the related Data Protection Authority pronouncements and eu law. The paper is aimed at discussing the problems arising from a complex, fragmentary and sometimes uncertain legal framework on e-Health.

Settore FIS/02 - Fisica Teorica Modelli E Metodi Matematicipersonal data protection lawElectronic health recordSettore IUS/07 - Diritto Del LavoroLegislationInformation privacy lawNational data protection authorityComputer securitycomputer.software_genreItalian Electronic Health Record (EHR) – privacy – data protection – patient-centred approach – minors – ItalyCode (semiotics)Settore FIS/03 - Fisica Della Materiacloud.Informed consentData Protection Act 1998MedicineElectronic Health RecordsHumansConfidentialityComputer SecurityData protectionInformed Consentbusiness.industryHealth PolicyItalian Electronic Health Record (EHR)MinorMinorsItalyPrivacyLawPatient-centred approachHealth lawbusinessLawcomputerConfidentialityEuropean journal of health law
researchProduct

Exploiting community detection to recommend privacy policies in decentralized online social networks

2018

The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…

Settore INF/01 - InformaticaExploitbusiness.industryEnd userComputer sciencePrivacy policyInternet privacy020206 networking & telecommunications02 engineering and technologyPrivacy policiesRecommender systemTheoretical Computer ScienceRecommendation systemPrivacyComputer Science0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingDecentralized online social networksPrivacy policiebusinessSet (psychology)Personally identifiable informationDecentralized online social networks; Privacy; Privacy policies; Recommendation system; Security
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct