Search results for "privacy"

showing 10 items of 402 documents

Generations of Stateless People: Many Years of The Rohingya’s Personal Security at Risk and the Support of the EU

2021

The Rohingya is an ethnic-religious Muslim minority that has struggled with serious human rights violations for decades. Indian migration to Burma, stimulated by British colonial rule, is pointed to as the main cause of the Muslim-Buddhist conflict. Although Indians in Burma currently constitute a fraction of the population (2.3%), resentment remained. The aim of the article is to analyze the threats to many aspects of the personal security of the Rohingya population. It is one of the most populous groups of stateless persons in the world; moreover, since the 1960s, this ethnic group has experienced oppression on a huge scale: from restrictions related to work and movement as well as diffic…

threats to personal securityRohingyaStateless protocolhumanitarian crisisbusiness.industryPolitical scienceInternet privacyPersonal securitybusinessBurmadiscriminationSecurity Dimensions
researchProduct

Information sharing in the era of social media

2016

Social media has become ubiquitous in just a few years. Their success depends on users’ willingness to continue investing their time and attention in this media and share their knowledge with each other in the absence of formal contract. This thesis attempts to examine social media users’ information sharing activities with three essays. Specifically, this thesis investigates 1 Why do social networking sites (SNS) users have online information privacy? 2 What are the antecedents of blog users’ online information privacy concerns? and 3 Why virtual team members want to sharing knowledge among each other in social media platform? To answer these questions, we conducted three studies. Specific…

tietobloggaajatsocial mediaverkkoyhteisötsosiaalinen mediaLMXknowledge managementtiimityöblogittietämyksenhallintatiimitprivacy concerninformation sharingsocial tieyksityisyyspsykologinen omistajuustiedon jakaminen
researchProduct

Organisational GDPR Investments and Impacts

2023

The aim of this empirical multi-case study is to understand the GDPR investments and impacts of the organisations. Among these, the measuring experiences related to GDPR and information security (Isec), and the future expectations are examined. Several interesting findings were recognised, which also enabled further suggestions. First, an understanding of the organisations’ investments and their impact is built by gathering information about the actions that organisations made to fulfil the GDPR requirements. In the second phase, it is deemed necessary to examine how organisations experience the measures and evaluation of GDPR development and progress, in order to understand how respondents…

tietosuojaGDPR investmentsorganisational GDPR impactsprivacy development assessmentempirical GDPR researchorganisaatiotprivacy impactsinformation security developmenttietoturva
researchProduct

Making Sense of Interactional Trouble Through Mobile-Supported Sharing Activities

2019

acceptedVersion Peer reviewed

toinen kielivuorovaikutusinteractional competenceoppiminensuomen kielibusiness.industrykeskustelunanalyysiInternet privacyyhteisoppiminenSense (electronics)älypuhelimetkontekstuaalisuus6121 LanguagesPsychologybusinessjoint learning
researchProduct

Anonymization as homeomorphic data space transformation for privacy-preserving deep learning

2021

Industry 4.0 is largely data-driven nowadays. Owners of the data, on the one hand, want to get added value from the data by using remote artificial intelligence tools as services, on the other hand, they concern on privacy of their data within external premises. Ideal solution for this challenge would be such anonymization of the data, which makes the data safe in remote servers and, at the same time, leaves the opportunity for the machine learning algorithms to capture useful patterns from the data. In this paper, we take the problem of supervised machine learning with deep feedforward neural nets and provide an anonymization algorithm (based on the homeomorphic data space transformation),…

topologyComputer scienceneural network02 engineering and technologyneuroverkotMachine learningcomputer.software_genreprivacyServeryksityisyys0202 electrical engineering electronic engineering information engineeringAdded valueesineiden internetindustry 4.0topologiaGeneral Environmental ScienceArtificial neural networkbusiness.industryDeep learningdeep learning020206 networking & telecommunicationsData spaceTransformation (function)koneoppiminenGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligencetiedonlouhintabusinesscomputer
researchProduct

PRIVACY E RAPPORTI DI LAVORO

2022

L'A. esamina da un punto di vista critico la recente disciplina del trattamento dei dati personali dei lavoratori mettendone in luce gli aspetti più significativi di modifica del sistema dopo l'entrata in vigore del reg. UE 2016/679 del Parlamento europeo e del Consiglio, del 27.4.2016, “relativo alla protezione delle persone fisiche con riguardo al trattamento dei dati personali, nonché alla libera circolazione di tali dati e che abroga la direttiva 95/46/CE (Regolamento generale sulla protezione dei dati)”. Il riferimento è in particolare alla dimensione nazionale nel cui ambito il recepimento della normativa eurounitaria è avvenuto con il d.lgs. 10.8.2018, n. 101

trattamento dei datirapporti di lavoroSettore IUS/07 - Diritto Del Lavorocontrolli a distanzadati personaliprivacy
researchProduct

Enhancing the European Cyber Threat Prevention Mechanism

2021

This research will determine how it is possible to implement the national cyber threat prevention system into the EU level Early Warning System. Decision makers have recognized that the lack of cooperation between EU member countries affects public safety at the international level. Separate operational functions and procedures between national cyber situation centers create challenges. One main problem is that the European Union does not have a common cyber ecosystem concerning intrusion detection systems for cyber threats. Also, privacy and citizens’ security as topics are set against each other. The research will comprise a new database for the ECHO Early Warning System concept.

turvajärjestelmätcybersecurityprivacy early warninginformation sharingInformation Sharing Cybersecurity HAVARO Privacy Early Warningkansainvälinen yhteistyöHAVAROtietojenvaihtoinfrastruktuuritkyberturvallisuusturvallisuuspolitiikkatietojärjestelmättiedonhankinta
researchProduct

Pricavy-Preserving Aspects for Data Mining in ICT Services

The steady adoption of systems for profiling users behavior, collecting and critically interpreting as much information as possible about likes and dislikes, interests and habits of Internet residents and generic services consumers have rapidly become some of the hottest keywords within networking research community. Indeed, mining information about users behavior is an advantage for both service providers and service customers: on one side, providers can improve their revenues by focusing on the most successful features of their services, while on the other side, users can enjoy services which reflect closer their specific needs. There are many examples of user profiling applications. Inte…

user profilingsecure multi-party computationSettore ING-INF/03 - Telecomunicazionisecret sharingdata miningprivacyclustering
researchProduct

Online support for vulnerable consumers: a safe place?

2017

Purpose This paper aims to examine the service experience in an online support community of consumers to understand the nature of social support and how it is experienced and enacted by vulnerable consumers. Design/methodology/approach A netnographic study was conducted to examine vulnerable consumers’ participation in an online support group for weight management. The Linguistic Inquiry Word Count (LIWC) program was used, and additionally data were coded using open coding. A hybrid approach to data analysis was undertaken using inductive and deductive methods. Findings The findings suggest online social support groups can be used as an online “third place” to support vulnerable consumers, …

verkkomainontamedia_common.quotation_subjectmedicine.medical_treatmentInternet privacyWord countpalvelualaSupport groupSocial supportasiakkaatOriginality0502 economics and businessmedicineMarketingverkkopalvelutmedia_commonMarketingService (business)Netnographybusiness.industryonline support05 social sciencesTransformative learningpalvelumarkkinointiAction (philosophy)markkinointi050211 marketingvulnerable consumersbusinessPsychology050203 business & managementJournal of Services Marketing
researchProduct

How to apply privacy by design in osint and big data analytics?

2019

In a world where technology grows exponentially, more information is available to us every day. States and their governments have collected information on their citizens for a long time now. On the other hand, people give out more and more personal information voluntarily through social media. Information available on the Internet is easier to analyze with modern technologies and the original source of information is also easier to track down. Information is available to all of us and that information can be used to investigate personal data, defeat competitors in a corporate world, solve crimes or even win wars. This study analyses open source intelligence (OSINT) and big data analytics (B…

yksilönvapausmaritime surveillanceavoin lähdekoodibig dataturvallisuusprivacy by designbig data analyticsOSINTkyberturvallisuusyksilönsuoja
researchProduct