12,275 Hits in 8.1 sec

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey [article]

Abdelhakim Hannousse and Salima Yahiouche and Mohamed Cherif Nait-Hamoud
2022 arXiv   pre-print
Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the navigation of trusted web applications.  ...  We summarize and categorize existent endeavors that aim to protect against XSS attacks and develop XSS-free web applications.  ...  The final adopted search string is : "XSS" OR "Cross-site scripting" OR "Cross site scripting" We observed that many papers address generic attacks but refer to XSS in their abstracts as a comparable attack  ... 
arXiv:2205.08425v2 fatcat:mz2upyb3d5ekllmw66t7s4rsom

The Future of Social Is Personal: The Potential of the Personal Data Store [chapter]

Max Van Kleek, Kieron OHara
2014 Social Collective Intelligence  
This chapter argues that technical architectures that facilitate the longitudinal, decentralised and individual-centric personal collection and curation of data will be an important, but partial, response  ...  Towards framing the scope and role of such Personal Data Stores (PDSes), the legalistic notion of personal data is examined, and it is argued that a more inclusive, intuitive notion expresses more accurately  ...  Acknowledgements The work described in this chapter is supported through an interdisciplinary ES-PRC Research Grant EP/J017728/1, The Theory and Practice of Social Machines.  ... 
doi:10.1007/978-3-319-08681-1_7 fatcat:z3o2ygczmzbcphxsn7lqa3hmyu

Using ICF codes to match assistive technology to persons and property

A. Bialokoz, A. Turner-Smith, A. Tinker, P. Lansley, K. Bright
2002 Gerontechnology  
Often, staying in their homes is key to such independence.  ...  In addition, viewers completed a user evaluation.  ...  of the World Wide Web Consortium, we evaluated web sites that provide general information for retired persons, medical information of interest to older adults and the elderly, and financial information  ... 
doi:10.4017/gt.2002. fatcat:ltrslepvwfazffg3xsoltlciuu

Freedom to Personalize My Digital Classroom

Laton Vermette, Joanna McGrenere, Colin Birge, Adam Kelly, Parmit K. Chilana
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
We found that teachers largely depended on their own experimentation and professional circles to find, personalize, and troubleshoot software tools to support student needs or their own preferences.  ...  We derive several design implications for HCI to better support teachers in sharing their personalized setups and helping their students benefit from digital immersion.  ...  A common example was installing the Learning Tools add-in for OneNote to provide reading and writing assistance to students with learning disabilities or ESL needs.  ... 
doi:10.1145/3290605.3300548 dblp:conf/chi/VermetteMBKC19 fatcat:ttqzeukgajgl5k433n7xmdjstm

Mobile alert app to engage community volunteers to help locate missing persons with dementia

Noelannah Neubauer, Christine Daum, Antonio Miguel-Cruz, Lili Liu, Jeffrey Jutai
2021 PLoS ONE  
system that engages community citizens, as volunteers, to look out for persons with dementia reported missing.  ...  In this study, we engaged persons living with dementia, care partners, police services, search and rescue organizations, and health and social service providers to develop Community ASAP, a mobile alert  ...  and feedback including the Calgary Coordinated Response to Missing Older adults, the Alzheimer Society of Ontario, Alzheimer Society of Durham, Coquitlam Search and Rescue, as well as police services in  ... 
doi:10.1371/journal.pone.0254952 pmid:34280219 pmcid:PMC8289012 fatcat:3mosajqgyrhqbit6llrfjt72zu

The implementation and evaluation of passive monitoring and computer-based nurse-call technology based on resident movement for use in improving safety and quality of care in persons with dementia

K. Curyto, K. Van Haitsma
2002 Gerontechnology  
Often, staying in their homes is key to such independence.  ...  In addition, viewers completed a user evaluation.  ...  of the World Wide Web Consortium, we evaluated web sites that provide general information for retired persons, medical information of interest to older adults and the elderly, and financial information  ... 
doi:10.4017/gt.2002. fatcat:posdm4scuzbvdawu7ceescqzi4

Putting Personal Knowledge Management under the Macroscope of Informing Science

Ulrich Schmitt
2015 Informing Science  
It also addresses the scenario recently put forward by Levy which foresees a decentralizing revolution of knowledge management that gives more power and autonomy to individuals and self-organized groups  ...  The paper introduces a novel Personal Knowledge Management (PKM) concept and prototype system.  ...  A vector is anything that transports a meme between hosts without the capacity to reflect on the meme, e.g. books, spoken message, observed behavior, CD, pictures, or artefacts (G. Grant, 1990) .  ... 
doi:10.28945/2161 fatcat:ujbslztvsbdodiwpa3p4g2hwmu

Facilitating an Equal Right to Vote for Persons with Disabilities

J. E. Lord, M. A. Stein, J. Fiala-Butora
2014 Journal of Human Rights Practice  
Emerging practices around the globe nonetheless bear out that persons with disabilities can be successfully incorporated in all phases of an electoral process.  ...  Article 29 addresses the design and imple mentation of an electoral process that is non-discriminatory, while also requiring states to provide voters with disability-related accommodations and other facilitative  ...  Witness, for example, the efforts of a DPO coalition in Macedonia that received international assistance and that undertook accessibility audits, complete with tagging sites with stickers indicating accessibility  ... 
doi:10.1093/jhuman/hut034 fatcat:gjr3uibv3bbjpc5xzjcmqahy2q

Protecting personal data respecting patients' privacy
Защита персональных данных пациентов

Elena Volskaya, Evdokimov Moscow State University of Medicine and Stomatology, Oksana Aleksandrova, Vladimirsky Moscow Regional Research Clinical Institute
2018 Remedium Journal about the Russian market of medicines and medical equipment  
The secretariat of the CSIRTs network is encouraged to maintain a website or to host a dedicated page on an existing website, where general information on major incidents that have occurred across the  ...  of that same Member State; (e) providing Member States with support in addressing cross-border incidents on the basis of their voluntary mutual assistance; (f) discussing, exploring and identifying further  ...  ANNEX II TYPES OF ENTITIES FOR THE PURPOSES OF POINT (4) OF ARTICLE 4 -Airport managing bodies as defined in point (2)  ... 
doi:10.21518/1561-5936-2018-10-6-11 fatcat:hwe5gffntzbm5jdzqlwkufrt5i

Evolving the Ecosystem of Personal Behavioral Data

Jason Wiese, Sauvik Das, Jason I. Hong, John Zimmerman
2017 Human-Computer Interaction  
The widespread adoption of the Internet, fueled by the proliferation of smartphones and data plans, has resulted in an amazing amount of digital information about each individual.  ...  Personal data is everywhere.  ...  This also addresses the need cited in (Karger & Jones, 2006) , that personal information must be defragmented (i.e. unified and linked together) in order for individuals to be able to realize the full  ... 
doi:10.1080/07370024.2017.1295857 fatcat:f6xcltcxvvbyrify3vsvzs6ske

Devising Enabling Spaces and Affordances for Personal Knowledge Management System Design

Ulrich Schmitt
2017 Informing Science  
relation to PKM are investigated in order to suggest further PKM capabilities and affordances in need to be conferred.  ...  Contribution: The affordances presented offer PKM system users the means to retain and build upon knowledge acquired in order to sustain personal growth and facilitate productive collaborations between  ...  While all (or most of the) content in existing social networking sites is user-generated, Cabitza et al. (2015) bemoan that the means (and the associated limitations) to produce, share, and consume it  ... 
doi:10.28945/3743 fatcat:f2uq2socwvbi3hesup6lsrfjym

Forget-me-block: Exploring digital preservation strategies using Distributed Ledger Technology in the context of personal information management [article]

James David Hackman
2020 arXiv   pre-print
Common use cases include Personal Information Management (PIM): e.g. calendars, diaries, tasks, etc.  ...  So enters a new risk: organisational change; by the time the information is required the organisational chain that links user to data may be broken: the employer transitions to a different provider, the  ...  aspects of a Personal Information Manager.  ... 
arXiv:2011.05759v1 fatcat:hrfkb56k7nhjde3i7bw6g7iclu

On enabling additional natural person and domain-specific attributes in the eIDAS network

Diana Gratiela Berbecaru, Antonio Lioy, Cesare Cameroni
2021 IEEE Access  
eIDAS services with Politecnico di Torino backend and with the official Italian eIDAS node, hosted by AgID.  ...  thank our partners from Graz University of Technology (Austria), Universidad Politénica de Madrid (Spain), Jozef Stefan Institute (Slovenia), and Universidade de Lisboa (Portugal) for their collaboration in  ...  If needed, the Tax Agency should ask for additional information about the person with that eIDAS PersonIdentifier in the citizen's country of origin.  ... 
doi:10.1109/access.2021.3115853 fatcat:jyqah6ujt5huxfjy5f4lgomfuy

Rationalizing a Personalized Conceptualization for the Digital Transition and Sustainability of Knowledge Management Using the SVIDT Method

Ulrich Schmitt
2018 Sustainability  
In following the SVIDT's nine steps, the broad span of the Personal Knowledge Management (PKM) concept's "wicked" problem space is presented.  ...  The rationale is rooted in today's accelerating information abundance and lack of adequate tools which signify-in the author's view-the presently emerging and most crucial barriers to individual and collective  ...  University of Stellenbosch Business School thankfully has provided the funds for covering the costs to publish in open access.  ... 
doi:10.3390/su10030839 fatcat:amcftginfve6tgswhhmsmm7biq

A Step-by-Step Guide to Using Secondary Data for Psychological Research

Judith Pizarro Andersen, JoAnn Prause, Roxane Cohen Silver
2011 Social & Personality Psychology Compass  
We seek to assist new users of SD by describing the process in a step-by-step manner.  ...  We address both benefits and challenges to anticipate when using SD, and discuss identifying and acquiring potential datasets, creating a personalized dataset, variable creation, statistical considerations  ...  Step Two: Creating a Personalized Dataset Organizing the project In order to keep track of the extensive amount of information needed when utilizing SD, we recommend creating an organizational scheme  ... 
doi:10.1111/j.1751-9004.2010.00329.x fatcat:kdzzujjvq5hbbg4al3zrcm3ymi
« Previous Showing results 1 — 15 out of 12,275 results