Filters








28,865 Hits in 3.0 sec

User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study

Cormac Callanan, Borka Jerman-Blažič, Andrej Jerman Blažič
2016 Telematics and informatics  
The results and findings are drawn from a collection of data gathered from ten countries which have a low reputation for respecting human rights.  ...  For a better understanding of the issue, a brief introduction explains the capacity of smartphones to ensure user privacy, and availability of the circumvention tools for smartphones.  ...  They were also involved in the data collection and management for the purposes of this study (Callanan and Dries-Ziekenheiner, 2012) .  ... 
doi:10.1016/j.tele.2015.04.009 fatcat:oz5kw4d6kfdlvg7lm3py4hndty

Standing Your Ground: The Importance of Health Information Managers Sharing What They Do

Joan Henderson
2015 Health Information Management Journal  
HIMs have access to a wealth of data that could improve patient care and reduce unnecessary service utilisation, and that could be used to answer many research questions.  ...  HIMs have access to a wealth of data that could improve patient care and reduce unnecessary service utilisation, and that could be used to answer many research questions.  ... 
doi:10.1177/183335831504400301 pmid:26744758 fatcat:ybn5ciqt6zbhldv4s6qdowar6a

Data Science For All [article]

Lorena A. Barba
2017 Figshare  
And not only do they reflect the inequalities of society, they can inflame our differences. In this new world, every citizen needs data-science literacy.  ...  Keynote at the BIDS Data Science Faire, 2 May 2017, UC Berkeley.Video:https://youtu.be/xMNLiHm_MBsAbstract:Data Science—understood broadly as a merger between computation, statistics, data management and  ...  The UC Berkeley Foundations of Data Science course combines three perspectives: inferential thinking, computational thinking, and real-world relevance. […] It delves into social issues surrounding data  ... 
doi:10.6084/m9.figshare.5039500 fatcat:dqjkceyru5c45axj6jbx3frqqi

Repacking 'Privacy' for a Networked World

Andy Crabtree, Peter Tolmie, Will Knight
2017 Computer Supported Cooperative Work (CSCW)  
managing their relationships in and with the networked world.  ...  In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing.  ...  Data supporting this publication is not openly available as our ethics approval does not allow for the release of transcripts to third parties.  ... 
doi:10.1007/s10606-017-9276-y pmid:32025101 pmcid:PMC6979540 fatcat:lvx6nw3fg5axth6y3yjrs7idby

A pragmatic approach to privacy risk optimization: privacy by design for business practices

Terry McQuay, Ann Cavoukian
2010 Identity in the Information Society  
This paper introduces Nymity's Privacy Risk Optimization Process (PROP), a process that enables the implementation of privacy into operational policies and procedures, which embodies in Privacy by Design  ...  The PROP uses these concepts to implement privacy into operational policies and procedures.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided  ... 
doi:10.1007/s12394-010-0067-6 fatcat:spyjxqtrfbcive26ydd3ekszua

The Political Economy of Privacy on Facebook

Christian Fuchs
2012 Television & New Media  
Aspects of a socialist internet privacy strategy are outlined and it is shown how they can be applied to social networking sites.  ...  Capital accumulation on Facebook is based on the commodification of users and their data.  ...  Acknowledgment The research presented in this paper was conducted in the project "Social Networking Sites in the Surveillance Society" funded by the Austrian Science Fund (FWF; project no.: P 22445-G17  ... 
doi:10.1177/1527476411415699 fatcat:dof6qmwo3fczxioxlunx74e76a

Data, Consent, Privacy and Insight

Dan Reed
2017 Merrill Series on The Research Mission of Public Universities  
of the world's wealth in an increasingly small fraction of the population.  ...  Toward a New Model of Data Sharing As noted earlier, our models of privacy are all rooted in concepts of person and place. Moreover, data sharing is largely a binary choice -to share or not to share.  ... 
doi:10.17161/merrill.2017.7757 fatcat:s4kgittkmvhzheyqom7huqn3ta

Stabilisation policies in Ukraine in the time of the COVID-19 pandemic
Cтабілізаційна політика в Україні під час пандемії COVID-19

POLYAKOVA Juliia POLYAKOVA Juliia, Lviv University of Trade and Economics, Solomiya SOKURENKO, Lviv University of Trade and Economics
2021 Fìnansi Ukraïni  
This paper aims at both theoretical and empirical assessment of stabilization policies in Ukraine in the wake of a contractionary macroeconomic shock of the COVID-19 pandemic.  ...  As suggested by a dummy variable, a deep economic slump of 2014-2015 was not caused by structural shifts in the Ukraine's economy, with a large depreciation of the hryvna and excessive money supply being  ...  Personal data will be collected, stored and processed by J.P. Morgan Asset Management in accordance with our Company's Privacy Policy (www.jpmorgan.com/global/privacy).  ... 
doi:10.33763/finukr2021.03.099 fatcat:cw4wuca33ng55lhza2swgiet4q

Secure multiparty computation based privacy preserving smart metering system

Cory Thoma, Tao Cui, Franz Franchetti
2012 2012 North American Power Symposium (NAPS)  
In this work, we propose a secure multi-party computation (SMC) based privacy preserving protocol for smart meter based load management.  ...  Using SMC and a proper designed electricity plan, the utility is able to perform real time demand management with individual users, without knowing the actual value of each user's consumption data.  ...  CONCLUSION In this paper we propose and implement a privacy preserving smart meter based load management system.  ... 
doi:10.1109/naps.2012.6336415 fatcat:ljzwcj64andx5b4yigjgmjyzgm

Big data and analytics in tourism and hospitality: opportunities and risks

Anca Yallop, Hugues Seraphin
2020 Journal of Tourism Futures  
data management in both tourism and hospitality.  ...  and ethical data management in both tourism and hospitality.  ...  information from the wealth of data (Fulgoni, 2013) , mistakes in interpretation (Mayer-Schö nberger and Cukier, 2013) and not least the risk of data breaches (Mayer-Schö nberger and Cukier, 2013).  ... 
doi:10.1108/jtf-10-2019-0108 fatcat:uqv2gdspf5gs5pagaen4x2znua

Fairness and flexibility: consumer expectations for a more responsive personal data system

Liz Coll
2016 Journal of Information Rights Policy and Practice  
Although there is a wealth of existing knowledge on general consumers' attitudes to privacy issues and the collection and use of personal data, there is a lack of detailed, qualitative evidence of howa  ...  to better meet their expectations and needs in the digital world.  ...  Although there is a wealth of existing knowledge on general consumers' attitudes to privacy issues and the collection and use of personal data, there is a lack of detailed, qualitative evidence regarding  ... 
doi:10.21039/irpandp.v1i1.18 fatcat:zuuqh4b4dna5dlvjerlg5tk2o4

The consumer data revolution: The reshaping of industry competition and a new perspective on privacy

Michael J Becker
2014 Journal of Direct Data and Digital Marketing Practice  
In this new data age, however, the individual is gaining a new power to demand a fairer share of the economic value of personal information.  ...  Competitive advantage for businesses is now to be found in the use of data to understand customers.  ...  and so onto manage and take control of their privacy in the data age.  ... 
doi:10.1057/dddmp.2014.3 fatcat:lbavkyofojajddkbzjpwv2ygca

Household wealth proxies for socio-economic inequality policy studies in China

Jacqueline C. K. Lam, Yang Han, Ruiqiao Bai, Victor O. K. Li, Jeff Leong, Kamal J. Maji
2020 Data & Policy  
We also capitalize on everyday economic activity data retrieved from personal mobile phones and online transaction/social platforms in the composition of our wealth proxy to achieve a higher accuracy in  ...  Finally, we summarize the challenges in improving both the quality and the availability of Chinese socio-economic datasets, while protecting personal privacy and information security during the data collection  ...  We gratefully acknowledge the insights shared by Stephanie Sun, on using the house prices as a proxy for household wealth in China, the research assistance of Shanshan Wang, and the editorial assistance  ... 
doi:10.1017/dap.2020.4 fatcat:kxbm2pahmfcvtbfrmcsfnut2fy

Strengthening Legal Protection Of Personal Data Through Technical Protection Regulation In Line With Human Rights

Tomy Prihananto, Damar Apri Sudarmadi
2018 Zenodo  
This paper aims to describe the arrangement of data management and data management in Indonesia.  ...  Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights.  ...  This indicates that data management is an important thing to do in relation to each regulatory substance that governs it, in order to provide protection and create a sense of security for the owner of  ... 
doi:10.5281/zenodo.1474386 fatcat:v3st2mtvq5citnxohb5mx6cm7q

Research on the Construction of Security System of Big Data

Manling Cheng, Zhihua Sun
2017 DEStech Transactions on Computer Science and Engineering  
In the background of big data era, through the analysis about the features and development tendency of big data, this paper elaborates the hidden dangers of the big data applications triggered by its application  ...  This paper establishes a comprehensive application security system of big data from five aspects, namely, storage security of big data, protection of private information, security of big data cloud, construction  ...  management ability and professional qualification of big data technology and strengthen the security and privacy management of big data.  ... 
doi:10.12783/dtcse/iceiti2016/6181 fatcat:lxpmy26wbfgdzhctqadqi5kzpy
« Previous Showing results 1 — 15 out of 28,865 results