2,618 Hits in 5.7 sec

Editorial: Human-Centric Security and Privacy

Surya Nepal, Ryan K. L. Ko, Marthie Grobler, L. Jean Camp
2022 Frontiers in Big Data  
Keywords: cyber security, human-centric security, usable security, usable privacy, HCI and cyber security Citation: Nepal S, Ko RKL, Grobler M and Camp LJ (2022) Editorial: Human-Centric Security  ...  EDITORIAL article Editorial: Human-Centric Security and Privacy 1 CSIRO's Data61, Eveleigh, NSW, Australia 2 Cyber Security Cooperative Research  ... 
doi:10.3389/fdata.2022.848058 pmid:35252852 pmcid:PMC8891649 fatcat:77quizrkrnbonh7ovxekhggkem


R. Ramesh, H. Raghav Rao
2011 Information Systems Frontiers  
The results of the model testing show that IT human, relational, and infrastructure resources have significant impacts on information security.  ...  A user-centric evaluation of the readability of privacy policies in popular web sites is carried out by Singh Ravi and co-authors (Singh et al. 2011) .  ... 
doi:10.1007/s10796-011-9323-z fatcat:omqgayzz5bdwnl6fdxnz7tutru

Guest editorial: Privacy-aware multimedia surveillance systems

Pradeep K. Atrey, Sabu Emmanuel, Sharad Mehrotra, Mohan S. Kankanhalli
2011 Multimedia Systems  
The first paper of this special issue "User centric privacy protection in video surveillance" by Thomas Winkler and Bernhard Rinner presents a concept for user-centric privacy awareness in video surveillance  ...  Although many submissions were of good quality, guest editorial committee recommended to accept only five top quality papers after a careful and highly competitive review process.  ...  The first paper of this special issue ''User centric privacy protection in video surveillance'' by Thomas Winkler and Bernhard Rinner presents a concept for user-centric privacy awareness in video surveillance  ... 
doi:10.1007/s00530-011-0251-z fatcat:5ivjgiczyndkldwodzmzfsqtee


2020 European Pharmaceutical Law Review  
Her article provides an introduction to the presence and future of AI in health inventions and shows that the human invention centric patent system might reach its limits where no human intervention is  ...  Security Policy and a Transnational Market' (2017) 8 European Journal of Risk Regulation 4, 686-699.  ... 
doi:10.21552/eplr/2020/1/3 fatcat:zktfsoovizbell6ds4dvzzxvwu

Editorial: Inaugural issue

Juan Carlos Augusto, Hamid Aghajan
2009 Journal of Ambient Intelligence and Smart Environments  
Augusto and H. Aghajan / Editorial: Inaugural issue  ...  Spoken dialogue is a key enabler of user-centric human-computer interaction.  ... 
doi:10.3233/ais-2009-0011 fatcat:ei3vbdl7fjfijneqik3kbmhw6q


Neil Yen, Hwa-Young Jeong, Kurosh Madani, Francisco Massetto
2021 Computer Science and Information Systems  
Prediction, and/or anticipation, of human beings through the support of artificial ii  ...  Almost all of above mentioned instances imply that an impartible relation between human beings and ICT services exists.  ...  privacy and security related issues for next-generation web which have brought lively discussions to the publics.  ... 
doi:10.2298/csis210200iy fatcat:4kn3awbwera73jq6obnegqhagy

Editorial to first issue

Vincenzo Loia
2010 Journal of Ambient Intelligence and Humanized Computing  
Mobile Computing and Wireless Communications • Next Generation Multimedia Systems • Security, Privacy and Trust • Service and Semantic Computing • Advanced Networking Architectures • Dependable, Reliable  ...  On behalf of the Editorial Board, it is with great pride and sincere privilege that I am writing this message to present the first issue of the Journal of Ambient Intelligence and Humanized Computing.  ... 
doi:10.1007/s12652-010-0009-z fatcat:hriziltshneflilvbwumpfxyry

Trends in consumer communications [Series editorial]

Ali Begen, Mario Kolberg, Madjid Merabti
2013 IEEE Communications Magazine  
He is chairing the track on Human Centric Computing at IEEE GLOBECOM 2014. He has published more than 50 papers in leading journals and conferences.  ...  The article discusses security and privacy vulnerabilities and explores approaches to address these.  ... 
doi:10.1109/mcom.2013.6658661 fatcat:e3kbeua6evhwlifkhxft3rbvmm

Editorial: Reliable Communication for Emerging Wireless Networks

Trung Q. Duong, Chinmoy Kundu, Antonino Masaracchia, Van-Dinh Nguyen
2020 Journal on spesial topics in mobile networks and applications  
Coexistence of human-centric and machine-type services as well as hybrids of these will make next generation wireless networks more diverse and complex.  ...  smart cities and factories, remote medical diagnosis and surgery, and artificial intelligence-based personalized assistants along with traditional human-centric communications.  ...  Coexistence of human-centric and machine-type services as well as hybrids of these will make next generation wireless networks more diverse and complex.  ... 
doi:10.1007/s11036-019-01508-z fatcat:7ytsidrmrbcofoytyuzzlnox3m

Guest Editorial: Special Issue on the ARES-Workshops 2021

Peter Kieseberg, Simon Tjoa
2022 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
of automated tools more user centric and thus improve the development of secure software.  ...  increasingly important for safety and (non-IT) security, privacy is a primary concern.  ...  Pölten University of Applied Sciences and academic director of the master programs "Information Security" and "Cyber Security and Resilience".  ... 
doi:10.22667/jowua.2022.03.31.001 dblp:journals/jowua/KiesebergT22 fatcat:hyjoekmvbjgmbeeysvgjzgsqpu

Guest editorial

Charles M. Ess
2021 Journal of Information, Communication and Ethics in Society  
While Capurro centers his likewise human-centric approach on the work of Martin Heidegger, Kantar and Bynum rather take up both VE and deontological emphases central to modern conceptions of the human  ...  Within ICTE, this debate has further played out in the debate between Capurro's human-centric IIE and Floridi's critiques thereof (Ess, 2009b, p. 165) .  ... 
doi:10.1108/jices-08-2021-140 fatcat:6hxgj5zp7vfzxdh2vai2jq5rgq


G E Gorman
2015 Online information review (Print)  
Cross-cutting principles Ownership, privacy and security Digital technologies can threaten the privacy and security of poor and marginalised groups, whether that threat is from global powers, corporations  ...  Global pressure should be exerted on states that violate basic principles of privacy and security.  ...  digital knowledge creation and sharing.  ... 
doi:10.1108/oir-06-2015-0215 fatcat:v7mh5zonhrfahkg4qsnl5fowzm

Guest editorial

Abhishek Behl, Angappa Gunasekaran, Rajesh Singh, Sachin Kamble
2021 Journal of Global Operations and Strategic Sourcing  
This calls for performing interdisciplinary research to decode the complex nature of blockchain and its use.  ...  These questions would help next-generation researchers to unfold the mysteries of blockchain technologies using innovative methodological lenses and exploring their use in different businesses across the  ...  The findings from the study indicate that the barriers, such as "data privacy, ownership and security issues," "funding issues and cost complexity," and "technological complexities," are relatively more  ... 
doi:10.1108/jgoss-02-2021-066 fatcat:jkcmy5w7ovdovoiydytbifego4

Editorial: Blockchain in Health Care

Nichola Cooper
2022 Frontiers in Blockchain  
All authors highlight the importance of locating, verifying and sharing user-centric data to aid in treatment and safety-based interventions, prepare for and manage incidents, calibrate state and national  ...  EDITORIAL article Editorial on the Research Topic Blockchain in Healthcare As the editors compiled the submissions for this review, the COVID-19 pandemic (the pandemic) swept across the world,  ... 
doi:10.3389/fbloc.2021.830459 fatcat:57sd57u4zjhuxpxvj2kribguca

Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing

An Liu, Guanfeng Liu, Mehmet A. Orgun, Qing Li
2020 World wide web (Bussum)  
The human-centric and cooperationoriented feature of crowdsourcing prompts us to reexamine the trust, privacy, and security issues in this new paradigm since the individuals in the crowd typically are  ...  an atmosphere for funding new trust, privacy and security projects.  ...  studies the security problem of applying differential privacy into spatial docomposition.  ... 
doi:10.1007/s11280-019-00772-z fatcat:sm4giziwtzetvdl6jtymhravyy
« Previous Showing results 1 — 15 out of 2,618 results