A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Publishers and suppliers of licensed online resources want to provide authorized users of institutions for higher education and research with access to their services in a controlled way. ... This document aims to function as a reference for libraries and publishers who want to set up an SSO connection. ... Principle 4: Authentication There are two recommended options for authentication attributes, Transitory Access (4.A) and Personalized Access (4.B). ...doi:10.5281/zenodo.4118124 fatcat:kresko3t2jbyfcwhj4m7uhq5iu
Third International Conference on Autonomic and Autonomous Systems (ICAS'07)
In this paper, comprehensive job recommender system is introduced. From user's perspective, four different kinds of recommendations are implemented. ... Job search sites require recommender system to meet diversified information needs. ... The authors argue that the next generation of the information access systems should focus on comprehensive personalized information access -i.e., using several information access technologies and personalization ...doi:10.1109/conielecomp.2007.76 fatcat:kawcvkrjfndi3m4wjjrz7tl7hi
Freedom of Information Center Report
Right of Access to Personal Information — The bill provides the individual with a legal right to know what per- sonal information relating to him or her is contained in gov- ernment files,3 and a right ... It may make recommendations to covered agencies con- cerning changes in the manner in which official information is provided or protected; may respond to public concerns on matters of information access ...
We designed Proactive, a recommendation system providing comprehensive and personalized information access. ... In contrast, our work focused on exploring a value of comprehensive access to job information in a single system (i.e., a system which supports multiple ways). ... Information filtering and recommendation methods address this shortcoming by providing personalized information access. ...doi:10.3745/jips.2012.8.4.721 fatcat:7ywpyrvfkjhplgthuo6sgmift4
Based on the results, role performance trust-based access control may significantly permit or prohibit access to personal information, especially sensitive attributes by authorized users. ... However, there are still issues that impede the development of effective access control. The issue highlight in this paper is inappropriate access and use of sensitive attributes by authorized users. ... In this proposed system, authorized user without trust are able to access personal information, but authorized user with higher level of trust are granted to access personal information with sensitive ...doi:10.14257/ijsia.2016.10.12.13 fatcat:55rkdww2nbajzc2vrw4ud3x75a
IFIP Advances in Information and Communication Technology
Through the experiment, the improved algorithm has higher accuracy than the traditional filter algorithms without time factor in the TOP-N recommendation list. ... In this paper the time information includes three aspects: the time context information; the interest decays with the time; items similarity factor. ... Therefore, how to accurately predict the information of interest to users has become a key issue in personalized recommendation problems. ...doi:10.1007/978-3-319-16274-4_15 fatcat:kmraxn6lebcdte6rr2gig6nh5q
, para 1195, and para 638, footnote 171). ee 5, Access to Records of Personai Information states that: “Where a person has in his possession or under his control records of personal information, the record-subject ... The ALRC (1983, para 1236), proposes ten informa- tion Privacy Principles and recommends “‘a right, enforce- able under Commonwealth law, for an individual to have access to records of personal information ...
related information, establishes the search link, and helps the college graduates to find the required employment information more effectively and timely. ... But due to the rapid development of Internet technology, which results in the explosive growth of information, the network is full of massive employment-related data. ... Personalized recommendation refers to recommend the information that the user is interested in to the user, and prompts the user to browse when the user accesses the Internet. ...doi:10.12738/estp.2018.6.202 fatcat:v5agwwxd5ze77lxzg7rhive7pa
In this paper, we propose PACMAN, a personal assistant agent that recommends personalized access control decisions based on the social context of any information disclosure by incorporating communities ... generated from the network structure of the user and utilizing information in their profiles, in addition to the particular content to be shared. ... In this paper, we present PACMAN, a personal agent which provides a novel approach to learning access control decisions by combining social relationships and information about the content. ...doi:10.1109/mic.2017.4180831 fatcat:trzr246xwbbtxceivh3fuuxnvy
This qualitative research studied which recommendations service and support professionals should follow in their daily tasks to ensure customer data protection. ... It present 12 recommendations: Data classification (three categories: low, medium and high business impact) ... Recommendation 11 -Escalating issues, ICT personal is likely to engage customers every day that may require to access, collect, or manage customers' personal information. ...doi:10.1016/j.protcy.2014.10.020 fatcat:p2kgbku7frdmrkw5brocfbhbji
2013 IEEE Third International Conference on Information Science and Technology (ICIST)
Our work aims improving access to information through recommendations made by system users with access to information. ... Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using. ... MECHANISMS FOR CUSTOMIZATION IN IAAS A. General Mechanism We designed a support service for personalized access to information. This service is described in the image below. ...doi:10.1109/icist.2013.6747612 fatcat:nafuaa3ucbfnnklgvjjepggfie
Our work aims improving access to information through recommendations made by system users with access to information. ... Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using. ... MECHANISMS FOR CUSTOMIZATION IN IAAS A. General Mechanism We designed a support service for personalized access to information. This service is described in the image below. ...doi:10.1109/icitst.2013.6750263 dblp:conf/icitst/KaboreSSP13 fatcat:zongvv3mizg7pmzvoa6333xpda
A general platform for spontaneous media access and context-aware media recommendation has been proposed and implemented. ... This paper deals with two important issues in pervasive media access: one is the spontaneous media access in heterogeneous environments, the other is the context-aware media recommendation in different ... This precipitates the need to recommend the right content from the overabundant media information, in the right form, to the right person. ...doi:10.1109/vetecs.2007.67 dblp:conf/vtc/ZhangY07 fatcat:zccwa2kdyfg5nnrfm7vkopoz3u
An appointed contact person was central in Recommendations to enhance access. Coordination and flexibility in setting and type of services were among the Recommendations to enhance use. ... Training of health care personnel and person-centred care were central Recommendations that can facilitate access or use indirectly. ... RECOMMENDATIONS TO ENHANCE ACCESS Recommendations that can enhance access to services directly People with dementia and their carer/family should have a named contact person The contact person may be ...doi:10.1080/13607863.2020.1822286 pmid:33030026 fatcat:ci3dzpoqqfaxrpcak2maji2cau
In order to attract and satisfy customers, these services must offer added value e.g. by delivering personalized information in a seamless and multi-modal way. ... Personalized services, however, bring about additional requirements related to privacy and security, which have to be addressed if the services are to become widely accepted. ... We are currently working on the implementation of additional community services for connecting users with similar interests and preferences. ...doaj:da84ca6c0c81446588574ba84c1db474 fatcat:fd2uimubm5brrpxruohdfy3syq
« Previous Showing results 1 — 15 out of 1,165,996 results