Search results for "privacy"

showing 10 items of 402 documents

Towards better privacy preservation by detecting personal events in photos shared within online social networks

2015

Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…

CybersecurityDétection d’évènements[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Cyber SecurityEvent relationsData analysisRéseaux sociauxAnonymization[INFO] Computer Science [cs]Regroupement d’imagesRelations entre les évènementsCyber sécuritéPrivacy protection[INFO]Computer Science [cs]Protection de la vie privéeOnline social networksDétection d'évènementsMetadataAnonymisationIdentité numériqueAnalyse de donnéesOnline identityImage clustering[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]MétadonnéesSocial Networks[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Event detection
researchProduct

Privacy preserving data collection for smart grid using self-organizing map

2017

Homomorphic encryption is widely researched in the smart grid area to publish and transfer electricity consumption data between electricity companies. This method makes it feasible to calculate total electricity consumption of neighborhoods without sharing any raw electricity consumption data. In the area of demand response(DR), calculating the total consumption of electricity is important in order to create DR reports which are published by third party to reduce the peak period of electricity usage such as 7 am or 6pm. Nevertheless, the possibility of data exposing or data decryption may lead to individual households private information revealing, for example, the timing of leaving home, t…

DRPrivacy-preservingsähköverkotyksityisyysK-MeansSmart GridSOM
researchProduct

Protection of Personal Data and Human Rights between the ECHR and the EU Legal Order

2020

The present paper deals with the relationship between privacy and data protection, having regard to the European Union and the European Convention of Human Rights. Such an analysis moves from the normative context (art. 8 ECHR and art. 7 and 8 of the Charter of Fundamental Rights of the European Union). Moreover, the case law of the Court of Justice of the European Union and of the European Court of Human RIghts is taken into account, in order to enlighten the dfferent scopes of privacy and data protection.

Data Protection Privacy European Court of Human Rights European Court of Justice scope of art. 8 ECHR scope of art 7 and 8 of the Charter of Nice.Settore IUS/13 - Diritto Internazionale
researchProduct

Reverse-Safe Text Indexing

2021

We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z - reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D . The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z , we propose an algorithm that constructs a z -reverse-safe data structure ( z -RSDS) that has size O(n) and answers decision and counting pattern matc…

Data structuresComputer scienceSuffix treesuffix tree0102 computer and information sciences02 engineering and technologytext indexing01 natural sciencesTheoretical Computer Sciencelaw.inventionSet (abstract data type)law020204 information systems0202 electrical engineering electronic engineering information engineeringPattern matchingdata privacySettore INF/01 - InformaticaSearch engine indexingdata privacy; Data structures; pattern matching; suffix tree; text indexingData structureMatrix multiplicationpattern matching010201 computation theory & mathematicsData structureAlgorithmAdversary modelInteger (computer science)ACM Journal of Experimental Algorithmics
researchProduct

Fire simulation-based adaptation of SmartRescue App for serious game: Design, setup and user experience

2015

Managing the crisis by embracing game and simulation elements and human participation into an interactive system is a mean to learn about responding to unexpected events. This so-called serious game approach is adopted in a summer school for crisis management attended by doctoral students and practitioners, as a part of its learning curriculum. The participants took part in the Disaster in my Backyard serious game, designed as a realistic crisis environment. A smartphone app encompassing fire simulations of a five-story apartment, showing how the flame, smoke and temperature of the fire developed over time from floor to floor, was tested in this serious game scenario. The color-coding of sm…

Decision support systemMultimediaEmergency managementComputer sciencebusiness.industryInternet privacyCrisis managementSerious gamecomputer.software_genreGeneralLiterature_MISCELLANEOUSUnexpected eventsUser experience designArtificial IntelligenceControl and Systems EngineeringElectrical and Electronic EngineeringAdaptation (computer science)businessCurriculumcomputerEngineering Applications of Artificial Intelligence
researchProduct

The quality of Internet information relating to 2019-nCov transmission control in dental practice

2020

Background: To date, the quality of the Internet information regarding the control and management of 2019-nCov virus transmission in dental clinics has not been evaluated The aim of this study was to evaluate the quality of Internet information about the control of 2019-nCov transmission in dental practice Material and Methods: Internet websites were identified daily using two search engines: Google and Yahoo! during the week from 20-06-2020 to 26-06-2020, applying the search term "2019-nCov transmission control in dental practice " The first 100 consecutive sites identified in each search were visited and classified The quality of information contained in each website was analyzed using th…

Dental practiceCode of conductComputer sciencebusiness.industry030503 health policy & servicesSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)media_common.quotation_subjectResearchInternet privacyControl (management)Information qualitylaw.invention03 medical and health sciences0302 clinical medicineTransmission (mechanics)lawThe InternetQuality (business)Odontostomatology for the Disabled or Special Patients030212 general & internal medicine0305 other medical sciencebusinessGeneral DentistryUNESCO:CIENCIAS MÉDICASmedia_common
researchProduct

Do the mobile-rich get richer? Internet use, travelling and social differentiations in Finland

2014

This article investigates the daily travelling practices that are related to mobile-only, fixed-only and combined mobile/fixed use of the Internet, and the social differentiations that are related to these three ways of accessing the Internet. Survey data ( N = 612) collected from Finland in 2011 are analysed. The article shows that mobile-only Internet use is not associated with particularly diverse or frequent daily travelling practices, whereas combined mobile/fixed use is. Mobile-only Internet users are, in fact, in a relatively disadvantaged position – compared with other users, they are more typically unemployed and their household income is lower. The mobility of Internet access as …

Differentiationbusiness.product_categorySociology and Political ScienceInternet privacy050801 communication & media studiesaccess0508 media and communicationsInternet use050602 political science & public administrationInternet accessSocial positionta518travelling practicesFinlandbusiness.industryCommunication05 social sciencesta5142fixed-onlymobile-only0506 political scienceDisadvantagedHousehold incomeSurvey data collectionPosition (finance)The Internetbusinesssocial differentiationNew Media & Society
researchProduct

The MOBI-Kids Study Protocol: Challenges in Assessing Childhood and Adolescent Exposure to Electromagnetic Fields from Wireless Telecommunication Tec…

2014

The rapid increase in mobile phone use in young people has generated concern about possible health effects of exposure to radiofrequency (RF) and extremely low frequency (ELF) electromagnetic fields (EMF). MOBI-Kids, a multinational case–control study, investigates the potential effects of childhood and adolescent exposure to EMF from mobile communications technologies on brain tumor risk in 14 countries. The study, which aims to include approximately 1,000 brain tumor cases aged 10–24 years and two individually matched controls for each case, follows a common protocol and builds upon the methodological experience of the INTERPHONE study. The design and conduct of a study on EMF exposure an…

ELF–EMFmedia_common.quotation_subjectPopulationInternet privacyBrain tumorSocio-culturalecomputer.software_genreAdolescentsBrain tumors03 medical and health sciences0302 clinical medicineEconomicaMethods ArticlemedicineWirelessMobile phones030212 general & internal medicineeducationAssociation (psychology)Childrenmedia_commonTumorsSelection biasProtocol (science)education.field_of_studybusiness.industrylcsh:Public aspects of medicinePublic Health Environmental and Occupational HealthELF-EMFAmbientaleTumors en els infantslcsh:RA1-1270medicine.diseaseTelèfon mòbil i adolescents3. Good healthCervell Localització de funcionsMobile phoneTelèfon mòbil030220 oncology & carcinogenesisadolescentMobile telephonyData miningPublic HealthRF-EMFbusinesscomputerbrain tumor
researchProduct

Consumer Neuroscience-Based Metrics Predict Recall, Liking and Viewing Rates in Online Advertising

2017

[EN] The purpose of the present study is to investigate whether the effectiveness of a new ad on digital channels (YouTube) can be predicted by using neural networks and neuroscience-based metrics (brain response, heart rate variability and eye tracking). Neurophysiological records from 35 participants were exposed to 8 relevant TV Super Bowl commercials. Correlations between neurophysiological-based metrics, ad recall, ad liking, the ACE metrix score and the number of views on YouTube during a year were investigated. Our findings suggest a significant correlation between neuroscience metrics and self-reported of ad effectiveness and the direct number of views on the YouTube channel. In add…

EXPRESION GRAFICA EN LA INGENIERIAlcsh:BF1-990Internet privacyNeuromarketingContext (language use)eye trackingCorrelation03 medical and health sciences0302 clinical medicineTEORIA DE LA SEÑAL Y COMUNICACIONES0502 economics and businessPsychologyNeuromarketingBrain responseHeart rate variabilityGeneral PsychologyOriginal ResearchEye trackingArtificial neural networksArtificial neural networkRecallbusiness.industryYouTube05 social sciencesheart rate variabilityOnline advertisinglcsh:Psychologybrain responseEye tracking050211 marketingneuromarketingbusinessPsychologyConsumer neuroscienceartificial neural networks030217 neurology & neurosurgeryCognitive psychologyFrontiers in Psychology
researchProduct

Towards an integration of individualistic, networked, and institutional approaches to online disclosure and privacy in a networked ecology

2020

In this paper, we review three different approaches to disclosure and privacy: a) an individualistic approach, which emphasizes an individual's control over information access and flow, b) a networked approach focused on information flow in horizontal relations between people, and c) an institutional approach concerned with public and societal privacy risks from platforms, providers, and governments. These approaches co-exist largely independently of each other in privacy and disclosure literature. However, with overlapping public and private spheres of communication where a presumption of individual agency over personal information is no longer tenable, we argue for the importance of bridg…

EcologyPresumptionEcology (disciplines)05 social sciencesControl (management)Agency (philosophy)Information accessDisclosure050105 experimental psychology03 medical and health sciencesIndividualism0302 clinical medicinePrivacyHumansComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesInformation flow (information theory)PsychologyPersonally identifiable informationConfidentiality030217 neurology & neurosurgeryGeneral PsychologyCurrent Opinion in Psychology
researchProduct