Filters








15,560 Hits in 3.8 sec

What the Right to be Forgotten Means to Companies: Threat or Opportunity?

Jongwon Lee
2016 Procedia Computer Science  
This paper illustrate the meaning of the right to be forgotten and the controversies surrounding it. And then the opportunities and implications for the company are suggested.  ...  This study is conducted to review the meaning of the right to be forgotten in a digital age in order to discuss implications on the information technology companies.  ...  Korea also introduced a rule called "a temporary measure" under the Act on Promotion of Information and Communications Network Utilization and Information protection in 2008 which allows users to ask for  ... 
doi:10.1016/j.procs.2016.07.138 fatcat:3rg5byymbbhndpobphvhtlpbmy

Middleware for social computing: a roadmap

Licia Capra, Daniele Quercia
2011 Journal of Internet Services and Applications  
for (re)defining social conventions and contexts once again.  ...  In the last decade, the advent of Web 2.0 and its social networking services, wikis, blogs, and social bookmarking has revolutionised social computing, creating new online contexts within which people  ...  The fact that the Internet never forgets is threatening our ability to control our identities. Before the digital age, remembering was costly and hard, and the default for humans was to forget.  ... 
doi:10.1007/s13174-011-0045-8 fatcat:xjpdfxzabzgmvcgbhy7aixfnqu

Research on Achieving Data Security with the Cloud Computing Adoption Framework

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
CCAF is outlined through using the framework route of action depending on the fundamentals and the execution confirmed up thru the CCAF multi-layered protection. while you do not forget that our records  ...  This paper has correspondingly tested that CCAF multi-layered protection can ensure statistics coherently and it has 3 layers of safety: 1) firewall and get admission to govern; 2) personality affiliation  ...  The digital device capacity is a functionality for the acknowledgment of digital device condition.  ... 
doi:10.35940/ijitee.f1316.0486s419 fatcat:evw6qqrwqrdrppx6rlsgzza334

Highlighting a Digital Platform to Assess Young People Needs: Reaching and Engaging Adolescents and Young Adults for Care Continuum in Health Project (REACH)

Peter Memiah, Monica Lathan-Dye, Yvonne Opanga, Samuel Muhula, Nyawira Gitahi-Kamau, Anne Kamau, Lillian Otiso
2022 Adolescents  
Leveraging digital platforms to reach YP is essential in identifying protective and risk behaviors among this population.  ...  This is one of the few studies that demonstrate user-centric methodologies of app development and real-life application in identifying protective and risk factors for the wellbeing of YP.  ...  Our sincere gratitude also goes to Rachel Mbugua for supporting the facilitation of the REACH study. Appreciation to  ... 
doi:10.3390/adolescents2020014 fatcat:5jr45gsy5nffjj3iic52aa63iq

Deletion Practices in the Era of Permanent Digital Memory

Eric Kula
2014 Fast Capitalism  
He argues that the creation of language, and then writing, are both evolutionary steps in the battle for perfect memory and that digitization has pushed the social default permanently away from forgetting  ...  He does so in a way that identifies the associated "costs" of remembering and forgetting and ultimately concludes that the cost of opting for permanent data retention is far too low and the cost of "forgetting  ... 
doi:10.32855/fcapital.201401.007 fatcat:3ddrtztanbf5jertl3ofh72jfa

Using Fairy Pitta as a case study for multimedia ecological learning materials

Ting-Sheng Weng
2012 African Journal of Agricultural Research  
Therefore, this study applies multimedia technology to design a digital system that is user-friendly and can serve as teaching materials, featuring sound effects, games, puzzles, and tests, to introduce  ...  Under the increased awareness of ecological and environmental protection in recent years, many websites have especially introduced the fairy pitta.  ...  , Linnei Township, Chiayi City Government, and students including Yu-wei Chang, Chong-qi Liao, Bo-yi Chiang, and Kai-min Wang.  ... 
doi:10.5897/ajar11.1333 fatcat:hhlwitqsovd27nws6wnphqi5gi

Optimized DWT Based Digital Image Watermarking and Extraction Using RNN-LSTM

R. Radha Kumari, V. Vijaya Kumar, K. Rama Naidu
2021 International Journal of Interactive Multimedia and Artificial Intelligence  
Watermarking digital data for copyright protection is a current need of the community. For embedding watermarks, robust algorithms in die media will resolve copyright infringements.  ...  In this paper, the optimized Discrete Wavelet Transform (DWT) is utilized for embedding the watermark.  ...  Digital images must be protected because they have high-value added contents for intellectual property rights.  ... 
doi:10.9781/ijimai.2021.10.006 fatcat:dwr6zwpevbfszmeefhajh6c23m

The second generation of digital commerce solutions

Steve Mott
2000 Computer Networks  
safe and sound technology infrastructure have scrambled to oer the"ultimate" solution for digital commerce.  ...  Since early 1995, when the invocation of the World Wide Web (WWW) ®rst triggered mass adoption of the Internet for public access to digital communications and exchanges across the globe, purveyors of a  ...  These include digital rights and user management (crucial for digital content) on a distributed basis; multiple payment (debit, stored value, micropayment, and other ways to pay be-sides credit cards)  ... 
doi:10.1016/s1389-1286(00)00024-4 fatcat:v5dlykr3lfgwrnfx5sidcmiqxu

Workplace consequences of electronic exhibitionism and voyeurism

William A. Herbert
2010 2010 IEEE International Symposium on Technology and Society  
The popularity of email, blogging and social networking raises important issues for employers, employees and labor unions.  ...  In the conclusion, the article will discuss various means for responding to the workplace issues resulting from electronic exhibitionism and voyeurism on and off the job. 1  ...  Herbert would like to acknowledge his daughters Beth Lee-Herbert and Lisa Lee-Herbert. For over a decade, they have patiently tutored him with respect to computer-based technologies.  ... 
doi:10.1109/istas.2010.5514626 dblp:conf/istas/Herbert10 fatcat:fdhmlurarre6hf4himmbbz3yxm

Workplace Consequences of Electronic Exhibitionism and Voyeurism

William Herbert
2011 IEEE technology & society magazine  
The popularity of email, blogging and social networking raises important issues for employers, employees and labor unions.  ...  In the conclusion, the article will discuss various means for responding to the workplace issues resulting from electronic exhibitionism and voyeurism on and off the job. 1  ...  Herbert would like to acknowledge his daughters Beth Lee-Herbert and Lisa Lee-Herbert. For over a decade, they have patiently tutored him with respect to computer-based technologies.  ... 
doi:10.1109/mts.2011.942310 fatcat:6c4ojtux6vcgzbjy4nexaglvni

DIGITAL ACCOUNTS AFTER DEATH: A CASE STUDY IN IRAN LAW

Abbas Mirshekari, Ramin Ghasemi, Alireza Fattahi
2020 UUM Journal of Legal Studies  
This paper aims to show what happens to a digital account after its user passes away and examine the subject using the content analysis method in various legal systems in the world, especially in Iran  ...  Undoubtedly, one of the main issues is that what fate awaits the account and its content upon the account holder's death?  ...  people are allowed to utilize work after the expiration of the legal protection time frame.  ... 
doi:10.32890/uumjls.11.2.2020.7505 fatcat:ms2o3ct2bzcg7o2wuhkaort6gy

Trademarks and Cyberspace

Georgios I. Zekos
2006 Journal of World Intellectual Property  
of markets for digital content in Europe.  ...  The making of the EU Digital Single Market is a policy objective rooted in the "Digital Agenda for Europe." 150 Markets for digital content are disintegrated and highly differentiated for grounds that  ... 
doi:10.1111/j.1422-2213.2006.00301.x fatcat:b67wqmh7yzfptj6qwiz3ezsxuu

Dream Journal Design for Creative Inspiration Recording

Yuan-Ling Hsu, Fong-Gong Wu
2015 Procedia Manufacturing  
The sensor on pillow controls the power of the dream journal device and adjusts its projection. Users make the dream image board with voice input and edit contents with gestures.  ...  This study is aim to develop a dream journal or dream recording device that for recording ideas in dreams.  ...  interrupt recording, reason for forgetting, ways to avoid forgetting, ways of recording and dream applications of dreams. Moreover the 8 themes are sub classified into 27 concepts.  ... 
doi:10.1016/j.promfg.2015.07.950 fatcat:vid3n5mowjbcxg3o556igpur7e

Beyond Totem and Taboo

Alessandro Corda
2018 Federal Sentencing Reporter  
I will then proceed to consider and discuss pros and cons of ''forgetting'' and ''forgiving'' models, expressing a preference for a third option, which I term ''forgetting through forgiving.''  ...  Forgetting in American Justice: A 50-State Guide to Expungement (Apr. 2018, rev. ed.), http://ccresourcecenter.org/wp-content/uploads/ 2017/10/Forgiving-Forgetting-CCRC-Jan-2018.pdf; Collat- eral Consequences  ...  urgent emphasis upon the need for security, the containment of danger, the identification and management of any kind of risk.  ... 
doi:10.1525/fsr.2018.30.4-5.241 fatcat:p47zmyunxfh7lnxrykhu3u77f4

Moral Rights 2.0

Peter K. Yu
2014 2013 Fall Intellectual Property Symposium Articles  
Fox Europe3 and Turner Entertainment Co. v.  ...  When the protection of moral rights is brought up in the United States, commentators have always emphasized the differences between continental Europe and the United States.2 Cases that have been widely  ...  Fox Europe 3 and Turner Entertainment Co. v.  ... 
doi:10.37419/lr.v1.i4.3 fatcat:wriaphl2ovcl7f4vazahf2avbm
« Previous Showing results 1 — 15 out of 15,560 results