Search results for "privacy"

showing 10 items of 402 documents

‘I’m still the master of the machine.’ Internet users’ awareness of algorithmic decision-making and their perception of its effect on their autonomy

2020

Algorithms are an integral part of our everyday lives and shape the selection and presentation of information and communication on the internet. At the same time, media users are faced with a lack of control and transparency when interacting with these systems because algorithms largely remain black boxes to end users. Relying on the notion that algorithms are socio-technical systems that comprise both technical and human components, this paper examines internet users’ awareness of algorithms in different areas of internet use and inquires into users’ perceptions of the impact of algorithms on their autonomy when interacting online. Empirically, we rely on qualitative interviews with 30 Ger…

Sociotechnical systembusiness.industryComputer scienceCommunicationmedia_common.quotation_subject05 social sciencesInternet privacy050801 communication & media studiesLibrary and Information SciencesTransparency (behavior)0506 political sciencePresentation0508 media and communicationsPerception050602 political science & public administrationSelection (linguistics)The InternetInternet usersbusinessAutonomymedia_common
researchProduct

Leveraging technology for healthcare and retaining access to personal health data to enhance personal health and well-being

2021

Abstract Health data are a sensitive category of personal data. They can result in a high risk to individuals and health information-handling rights and opportunities unless there is a sufficient defense. Reasonable security standards are needed to protect electronic health records (EHRs). All personal data handling needs adequate explanation. Maintaining access to medical data, even in the developing world, would favor health and well-being across the world. Unfortunately, there are still countries that hinder the portability of medical records. Numerous occurrences have shown that it still takes weeks for medical data to be ported from one general physician to another. Cross-border portab…

Software portabilityStandardizationComputer sciencebusiness.industryProcess (engineering)Medical recordInternet privacyWell-beingHealth careDeveloping countrybusiness
researchProduct

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

Using privacy-transformed speech in the automatic speech recognition acoustic model training

2020

Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…

Speaker verificationevaluationvoice conversionComputer scienceSpeech recognitionautomatic speech recognitionLatvianAcoustic model[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG]privacylanguage.human_language[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]anonymization[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-CL] Computer Science [cs]/Computation and Language [cs.CL]Identity (object-oriented programming)languageConversion methodautomatic speaker verification
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct

Designing Transport Supporting Services Together with Users with Intellectual Disabilities

2020

Transportation is an important yet challenging aspect in terms of mobility for persons with intellectual disabilities (ID). Despite positive implications of designing services with users, persons with ID are rarely given the opportunity to be involved in such design processes. In this action design research (ADR) study we involve persons with ID in the design through observations, photovoice interviews and in a staged, yet naturalistic user enactments on a bus. Our research contributes with design insights on transport supporting services and insights on user involvement of persons with ID in ADR. The three ADR cycles showed that people with ID is a heterogenous group of users and as such e…

Stress managementbusiness.industryUser involvementmedia_common.quotation_subjectInternet privacyCognitionArtifact (software development)medicine.diseaseWork (electrical)Intellectual disabilitymedicinePhotovoicePsychologybusinessAutonomymedia_common
researchProduct

The impact of user’s availability on On-line Ego Networks: a Facebook analysis

2016

We have defined and implemented a Facebook application to log a Facebook dataset.We have studied and validated the structural properties of the whole dataset and of the Dunbar ego networks.We have analyzed the interactions of the users.The availability of the users in the Dunbar ego networks have been investigated.Our results reveal the presence of the temporal homophily property in the Dunbar ego networks. Online Social Networks (OSNs) are the most popular applications in todays Internet and they have changed the way people interact with each other. Understanding the structural properties of OSNs and, in particular, how users behave when they connect to OSNs is crucial for designing user-c…

Structure (mathematical logic)Dunbar's circleOnline Social NetworksOnline Social NetworkSocial networkComputer Networks and CommunicationsProperty (programming)business.industryComputer scienceInternet privacy020206 networking & telecommunicationsSample (statistics)02 engineering and technologyHomophilyTemporal homophilyWorld Wide WebOnline Social Networks; Temporal homophily; Dunbar's circlesLine (geometry)0202 electrical engineering electronic engineering information engineeringDunbar's circles020201 artificial intelligence & image processingThe InternetbusinessSet (psychology)Computer Communications
researchProduct

Public availability of published research data in substance abuse journals

2014

[EN] Sharing research data is an increasingly necessary requirement for the advancement of science. The aim of this study was to analyse the policies on openness in sharing scientific research data in substance abuse journals. Journals included in the Substance abuse area of the Journal Citation Reports were used for the analysis, with reference to the instructions to authors published on the journals websites. In 67.6% of the journals, it is possible to store materials in thematic or institutional repositories; 47% accept supplemental material; 64.7% allow the reuse of data, and 41.2% admit the publication of their data on a website. Most journals recommend that authors deposit their data …

Substance-Related DisordersInternet privacyMedicine (miscellaneous)Poison controlOpen research dataBIBLIOTECONOMIA Y DOCUMENTACIONSharing dataReuseSuicide preventionAccess to InformationOpenness to experiencemedicineHumansGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)Data CurationSubstance abuse journalsImpact factorbusiness.industryHealth PolicyHuman factors and ergonomicsmedicine.diseaseSubstance abuseJournal Impact FactorPeriodicals as TopicCitationbusiness
researchProduct

The Content of the Websites: Emergence of Intimate Cyberplaces

2017

On the basis of an interpretation of the content of the contrade’s websites, this chapter proposes that these communities unlock cyberspace through inhabiting cyberplaces. They local ise cyberspace, making it concrete and create intimacy by highlighting their history, special places, and maps of their district, announcing events and posting pictures of them, presenting and explaining their symbol ism, exhibiting emblems and artefacts, and by listing the names and showing pictures of community members and horses that have taken part in the palio. By constructing websites in such a way, the contrade inhabit cyberplaces that are characterised by intimacy and familiarity , as they present their…

SymbolHistorybusiness.industryEmblemmedia_common.quotation_subjectInterpretation (philosophy)Internet privacyMedia studiesListing (computer)CyberspaceContent (Freudian dream analysis)businessmedia_common
researchProduct

Cyber Situational Awareness in Critical Infrastructure Protection

2020

The European Union promotes collaboration between authorities and the private sector, and the providers of the most critical services to society face security related obligations. In this paper, critical infrastructure is seen as a system of systems that can be subject to cyber-attacks and other disturbances. Situational awareness (SA) enhances preparations for and decision-making during assessed and unforeseen disruptive incidents, and promoting Cyber effective situational awareness (CSA) requires information sharing between the different interest groups. This research is constructive in nature, where innovative constructions developed as solutions for domain-specific real world problem…

System of systemsSituation awarenessbusiness.industryInternet privacyCritical infrastructure protectionOcean EngineeringCritical infrastructureOODA loopmedia_common.cataloged_instanceBusinessEuropean unionSituational ethicsResilience (network)media_commonAnnals of Disaster Risk Sciences
researchProduct