Filters








466 Hits in 7.1 sec

Privacy Please: A Privacy Curriculum Taxonomy (PCT) For The Era Of Personal Intelligence

E. Vincent Carter
2011 College Teaching Methods & Styles Journal (CTMS)  
The PCT is advanced as an initial framework for engaging business curriculum planners in the considerations required to repurpose existing disciplines around digital society information and privacy processes  ...  The seminal challenge confronting business education leaders is to respond to the ontological paradigm shift from a physical society driven by material and monetary processes, towards a digital society  ...  The graduated directives for each discipline are conceptually consistent and at each level maintain the same three module symbiosis that was established at the onset in Figure 1 .  ... 
doi:10.19030/ctms.v3i3.5284 fatcat:zbr6hj3es5hypncnbebwhlyzbq

Privacy as a Tool for Antidiscrimination

Jessica L. Roberts
2013 Social Science Research Network  
Although information related to many antidiscrimination categories, like race and sex, may be immediately apparent upon meeting a person, privacy law can still do significant work to prevent discrimination  ...  on the basis of less visible traits such as genetic information, age, national origin, ethnicity, and religion, as well as in cases of racial or gender ambiguity.  ...  The privacy/antidiscrimination symbiosis is just that-a true symbiosis running in both directions. CONCLUSION Privacy law can do the work of antidiscrimination.  ... 
doi:10.2139/ssrn.2263583 fatcat:rxp67kgptzewhfvgfecxulta3i

The language of privacy

Michael Boyle, Saul Greenberg
2005 ACM Transactions on Computer-Human Interaction  
These studies suggest that although they are widely suspected to be useful for mitigating privacy issues in video media spaces, these techniques fail to adequately balance awareness and privacy in high-risk  ...  descriptive theory of privacy to analyse and describe video media space design and use.  ...  -New directions in supporting privacy regulation in video media spaces were revealed through the analysis procedure.  ... 
doi:10.1145/1067860.1067868 fatcat:zrkyacghsfdmzpn6zm7r442bke

Symbiosis or Sporting Tool? Competition and the Horse–Rider Relationship in Elite Equestrian Sports

Rachel C. Hogg, Gene A. Hodgins
2021 Animals  
Thirty-six international elite riders from eight countries and six equestrian disciplines participated in a single in-depth interview.  ...  The horse–rider relationship was positioned in three different ways in relation to elite sporting outcomes: as pivotal to success; non-essential to success; or as antithetical to success.  ...  Acknowledgments: The authors wish to thank the athletes who generously gave of their time and insights and contributed to this research.  ... 
doi:10.3390/ani11051352 pmid:34068606 pmcid:PMC8151029 fatcat:onno2avgqna7hfszwp4q5c7sv4

Transparent hashing in the encrypted domain for privacy preserving image retrieval

Kannan Karthik, Sachin Kashyap
2013 Signal, Image and Video Processing  
The encryption scheme has been shown to be perceptually secure and does not impair the search reliability and accuracy of the hashing procedure.  ...  Search through a database of encrypted images against a crumpled and encrypted query will remain privacy preserving only if comparisons between selective features derived from these images is executed  ...  Conclusions In this paper, we have proposed a new framework for comparing encrypted images to facilitate privacy preserving search and retrieval.  ... 
doi:10.1007/s11760-013-0471-0 fatcat:5gvr6jryarha5f74mtwvvjvcym

How Smart is the Grid? [article]

Ermanno Lo Cascio, Zhenjun Ma, François Maréchal
2020 arXiv   pre-print
Finally, from the scenario portrayed, a set of issues involving engineering, regulation, security, and social frameworks have been derived in a theoretical fashion.  ...  To this end, in this article, a systematic review of the emerging paradigms is presented, identifying intersectoral synergies and limitations with respect to the 'smart grid' concept.  ...  However, ICT brings new challenges for privacy and cyber-security which are destined to call the society to develop novel frameworks and technologies that concretely allow us to create a "secure" energy  ... 
arXiv:2006.04943v2 fatcat:j4msv64kwzdr5dgrrzzvayvola

Strategies for social engagement and acceptance

Marion Courtois
2020 Zenodo  
It can be a very powerful and important strategic approach to promoting sustainability in the European Union.  ...  In this report, the first section describes the project context i.e. industrial symbiosis, the main foreseen outputs and the governance around social engagement and acceptance.  ...  Some new skills/competences could be needed and mobilized to implement the synergies related to IS.  ... 
doi:10.5281/zenodo.3690657 fatcat:26mbmbxnrnfhtdgfnwuwir5l4i

2020 Miles Conrad award lecture: James G. Neal

James G. Neal, Bonnie Lawlor
2020 Information Services and Use  
The lecture lists five commandments to which all stakeholders in the Information Community need to adhere in order to be successful moving forward together: (1) Thou shall preserve the cultural and scientific  ...  Neal at the inaugural NISO Plus conference held from February 23–25, 2020 in Baltimore, MD (USA).  ...  Neal has served in many leadership capacities in the information community.  ... 
doi:10.3233/isu-200092 fatcat:sqdxt5zla5bhjmii2c2k4kspkm

Seven HCI Grand Challenges

Constantine Stephanidis, Gavriel Salvendy, Margherita Antona, Jessie Y. C. Chen, Jianming Dong, Vincent G. Duffy, Xiaowen Fang, Cali Fidopiastis, Gino Fragomeni, Limin Paul Fu, Yinni Guo, Don Harris (+20 others)
2019 International Journal of Human-Computer Interaction  
This article aims to investigate the Grand Challenges which arise in the current and emerging landscape of rapid technological evolution towards more intelligent interactive technologies, coupled with  ...  A perspective oriented to humane and social values is adopted,  ...  to ethics, privacy, and security as they emerge in such contexts.  ... 
doi:10.1080/10447318.2019.1619259 fatcat:4gugxdzqb5acxiapdb6f4ihi5m

Future of Humanity: Energy and Knowledge Engineering

A. Ziya Aktaş
2017 Computer Science and Information Technology  
Knowledge may be defined as the information needed for good planning and intelligent decisions for any human being, from a lay man to a top man in a public or private organization up to even the country  ...  As a conclusion, the synergy and even a symbiosis between energy and knowledge is noted and it is stated that energy engineering and knowledge engineering together with nano science and technology will  ...  In addition to nanoscience and technology and energy and ICT relation, Cloud Computing is the relatively new field for energy and ICT symbiosis and synergy. Addis et al.  ... 
doi:10.13189/csit.2017.050102 fatcat:doyqeilcoff2dck6edsk3ddn7u

Ethical Aspects of the Internet of Things in eHealth

Kashif Habib
2014 International Review of Information Ethics  
However, the comfort may bring along some worries in the form of people's concerns such as right or wrong actions by things, unauthorised tracking, illegal monitoring, trust relationship, safety, and security  ...  This paper presents the ethical implications of the IoT in eHealth on people and society, and more specifically discusses the ethical issues that may arise due to distinguishing characteristics of the  ...  Acknowledgment The work presented here has been carried out in the research project ASSET -Adaptive Security for Smart Internet of Things in eHealth (2012)(2013)(2014)(2015) funded by The Research Council  ... 
doi:10.29173/irie129 fatcat:ux44cip4lbgzlavl27xeirbnly

A brief introduction to agent mining

Longbing Cao, Gerhard Weiss, Philip S. Yu
2012 Autonomous Agents and Multi-Agent Systems  
It will also bring about symbiosis and symbionts that combine advantages from the corresponding constituent systems.  ...  It brings new opportunities to tackling issues in relevant fields more efficiently by engaging together the individual technologies.  ...  Acknowledgments Thanks are given to all the authors, reviewers and editors who have helped to make this special issue possible.  ... 
doi:10.1007/s10458-011-9191-4 fatcat:us225ya6vnhndi6pngmv3jzqne

Application of Digital Ecosystem Design Methodology Within the Health Domain

Maja Hadzic, Elizabeth Chang
2010 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
In this paper, we illustrate how a DES design methodology can be used to systematically create a Digital Health Ecosystem (DHES).  ...  The integration of multiple technologies and the resulting synergetic effects contribute to the creation of highly complex, dynamic, and powerful systems.  ...  The smart cards differ from each other in the way they store, process, and manage information, and they way they deal with the associated privacy and security issues.  ... 
doi:10.1109/tsmca.2010.2048022 fatcat:k5ibxb2ncrcllfew7rmmv2sw3y

Strengthening human-robot symbiosis through multimodal sensing

Daniel Freer, Benny Lo
2021
The advancements made by studying each of these platforms and sensors provide a new link between humans and robots, which in turn creates more shared understanding between the biological and digital domains  ...  As robotic technology has advanced throughout the ages, one of its primary functions has been to assist humans in completing difficult or dangerous tasks.  ...  Acknowledgements Upon completion of this thesis, I would like to express my regards to:  ... 
doi:10.25560/88276 fatcat:apglqtxnk5h2tkyjx7ijtyctoe

Identification of IoT Actors

Suada Hadzovic, Sasa Mrdovic, Milutin Radonjic
2021 Sensors  
and privacy rules.  ...  In this regard, we have introduced identification of IoT actors according to a new five-computing layer IoT model based on the cloud, fog, edge, mist, and dew computing.  ...  Acknowledgments: We thank to Sreenivasan Jayashree (Multimedia University, Faculty of Management, 6300 Cyberjaya, Malaysia) for proof reading and invaluable discussion.  ... 
doi:10.3390/s21062093 pmid:33802673 fatcat:aulv6e3uozgilftjov3q5y2kpe
« Previous Showing results 1 — 15 out of 466 results