Search results for "privacy"
showing 10 items of 402 documents
Generations of Stateless People: Many Years of The Rohingya’s Personal Security at Risk and the Support of the EU
2021
The Rohingya is an ethnic-religious Muslim minority that has struggled with serious human rights violations for decades. Indian migration to Burma, stimulated by British colonial rule, is pointed to as the main cause of the Muslim-Buddhist conflict. Although Indians in Burma currently constitute a fraction of the population (2.3%), resentment remained. The aim of the article is to analyze the threats to many aspects of the personal security of the Rohingya population. It is one of the most populous groups of stateless persons in the world; moreover, since the 1960s, this ethnic group has experienced oppression on a huge scale: from restrictions related to work and movement as well as diffic…
Information sharing in the era of social media
2016
Social media has become ubiquitous in just a few years. Their success depends on users’ willingness to continue investing their time and attention in this media and share their knowledge with each other in the absence of formal contract. This thesis attempts to examine social media users’ information sharing activities with three essays. Specifically, this thesis investigates 1 Why do social networking sites (SNS) users have online information privacy? 2 What are the antecedents of blog users’ online information privacy concerns? and 3 Why virtual team members want to sharing knowledge among each other in social media platform? To answer these questions, we conducted three studies. Specific…
Organisational GDPR Investments and Impacts
2023
The aim of this empirical multi-case study is to understand the GDPR investments and impacts of the organisations. Among these, the measuring experiences related to GDPR and information security (Isec), and the future expectations are examined. Several interesting findings were recognised, which also enabled further suggestions. First, an understanding of the organisations’ investments and their impact is built by gathering information about the actions that organisations made to fulfil the GDPR requirements. In the second phase, it is deemed necessary to examine how organisations experience the measures and evaluation of GDPR development and progress, in order to understand how respondents…
Making Sense of Interactional Trouble Through Mobile-Supported Sharing Activities
2019
acceptedVersion Peer reviewed
Anonymization as homeomorphic data space transformation for privacy-preserving deep learning
2021
Industry 4.0 is largely data-driven nowadays. Owners of the data, on the one hand, want to get added value from the data by using remote artificial intelligence tools as services, on the other hand, they concern on privacy of their data within external premises. Ideal solution for this challenge would be such anonymization of the data, which makes the data safe in remote servers and, at the same time, leaves the opportunity for the machine learning algorithms to capture useful patterns from the data. In this paper, we take the problem of supervised machine learning with deep feedforward neural nets and provide an anonymization algorithm (based on the homeomorphic data space transformation),…
PRIVACY E RAPPORTI DI LAVORO
2022
L'A. esamina da un punto di vista critico la recente disciplina del trattamento dei dati personali dei lavoratori mettendone in luce gli aspetti più significativi di modifica del sistema dopo l'entrata in vigore del reg. UE 2016/679 del Parlamento europeo e del Consiglio, del 27.4.2016, “relativo alla protezione delle persone fisiche con riguardo al trattamento dei dati personali, nonché alla libera circolazione di tali dati e che abroga la direttiva 95/46/CE (Regolamento generale sulla protezione dei dati)”. Il riferimento è in particolare alla dimensione nazionale nel cui ambito il recepimento della normativa eurounitaria è avvenuto con il d.lgs. 10.8.2018, n. 101
Enhancing the European Cyber Threat Prevention Mechanism
2021
This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.
Pricavy-Preserving Aspects for Data Mining in ICT Services
The steady adoption of systems for profiling users behavior, collecting and critically interpreting as much information as possible about likes and dislikes, interests and habits of Internet residents and generic services consumers have rapidly become some of the hottest keywords within networking research community. Indeed, mining information about users behavior is an advantage for both service providers and service customers: on one side, providers can improve their revenues by focusing on the most successful features of their services, while on the other side, users can enjoy services which reflect closer their specific needs. There are many examples of user profiling applications. Inte…
Online support for vulnerable consumers: a safe place?
2017
Purpose This paper aims to examine the service experience in an online support community of consumers to understand the nature of social support and how it is experienced and enacted by vulnerable consumers. Design/methodology/approach A netnographic study was conducted to examine vulnerable consumers’ participation in an online support group for weight management. The Linguistic Inquiry Word Count (LIWC) program was used, and additionally data were coded using open coding. A hybrid approach to data analysis was undertaken using inductive and deductive methods. Findings The findings suggest online social support groups can be used as an online “third place” to support vulnerable consumers, …
How to apply privacy by design in osint and big data analytics?
2019
In a world where technology grows exponentially, more information is available to us every day. States and their governments have collected information on their citizens for a long time now. On the other hand, people give out more and more personal information voluntarily through social media. Information available on the Internet is easier to analyze with modern technologies and the original source of information is also easier to track down. Information is available to all of us and that information can be used to investigate personal data, defeat competitors in a corporate world, solve crimes or even win wars. This study analyses open source intelligence (OSINT) and big data analytics (B…