Filters








1,165,996 Hits in 4.1 sec

LIBER FIM4L Recommendations 2020 v.01 [article]

Jos Westerbeke, Jiri Pavlik, Peter Gietz
2020 Zenodo  
Publishers and suppliers of licensed online resources want to provide authorized users of institutions for higher education and research with access to their services in a controlled way.  ...  This document aims to function as a reference for libraries and publishers who want to set up an SSO connection.  ...  Principle 4: Authentication There are two recommended options for authentication attributes, Transitory Access (4.A) and Personalized Access (4.B).  ... 
doi:10.5281/zenodo.4118124 fatcat:kresko3t2jbyfcwhj4m7uhq5iu

Fighting Information Overflow with Personalized Comprehensive Information Access: A Proactive Job Recommender

Danielle H. Lee, Peter Brusilovsky
2007 Third International Conference on Autonomic and Autonomous Systems (ICAS'07)  
In this paper, comprehensive job recommender system is introduced. From user's perspective, four different kinds of recommendations are implemented.  ...  Job search sites require recommender system to meet diversified information needs.  ...  The authors argue that the next generation of the information access systems should focus on comprehensive personalized information access -i.e., using several information access technologies and personalization  ... 
doi:10.1109/conielecomp.2007.76 fatcat:kawcvkrjfndi3m4wjjrz7tl7hi

Page 2 of Freedom of Information Center Report Vol. , Issue 447 [page]

1981 Freedom of Information Center Report  
Right of Access to Personal Information — The bill provides the individual with a legal right to know what per- sonal information relating to him or her is contained in gov- ernment files,3 and a right  ...  It may make recommendations to covered agencies con- cerning changes in the manner in which official information is provided or protected; may respond to public concerns on matters of information access  ... 

Proactive: Comprehensive Access to Job Information

Danielle Lee, Peter Brusilovsky
2012 Journal of Information Processing Systems  
We designed Proactive, a recommendation system providing comprehensive and personalized information access.  ...  In contrast, our work focused on exploring a value of comprehensive access to job information in a single system (i.e., a system which supports multiple ways).  ...  Information filtering and recommendation methods address this shortcoming by providing personalized information access.  ... 
doi:10.3745/jips.2012.8.4.721 fatcat:7ywpyrvfkjhplgthuo6sgmift4

Role Performance Trust-Based Access Control for Protecting Sensitive Attributes

Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd. Sani, Hamidah Ibrahim
2016 International Journal of Security and Its Applications  
Based on the results, role performance trust-based access control may significantly permit or prohibit access to personal information, especially sensitive attributes by authorized users.  ...  However, there are still issues that impede the development of effective access control. The issue highlight in this paper is inappropriate access and use of sensitive attributes by authorized users.  ...  In this proposed system, authorized user without trust are able to access personal information, but authorized user with higher level of trust are granted to access personal information with sensitive  ... 
doi:10.14257/ijsia.2016.10.12.13 fatcat:55rkdww2nbajzc2vrw4ud3x75a

An Optimization of Collaborative Filtering Personalized Recommendation Algorithm Based on Time Context Information [chapter]

Xian Jin, Qin Zheng, Lily Sun
2015 IFIP Advances in Information and Communication Technology  
Through the experiment, the improved algorithm has higher accuracy than the traditional filter algorithms without time factor in the TOP-N recommendation list.  ...  In this paper the time information includes three aspects: the time context information; the interest decays with the time; items similarity factor.  ...  Therefore, how to accurately predict the information of interest to users has become a key issue in personalized recommendation problems.  ... 
doi:10.1007/978-3-319-16274-4_15 fatcat:kmraxn6lebcdte6rr2gig6nh5q

Page 30 of Journal of Research and Practice in Information Technology Vol. 16, Issue 1 [page]

1984 Journal of Research and Practice in Information Technology  
, para 1195, and para 638, footnote 171). ee 5, Access to Records of Personai Information states that: “Where a person has in his possession or under his control records of personal information, the record-subject  ...  The ALRC (1983, para 1236), proposes ten informa- tion Privacy Principles and recommends “‘a right, enforce- able under Commonwealth law, for an individual to have access to records of personal information  ... 

Design and Implementation of College Graduation Employment Recommendation Service Platform under the Background of Big Data

Dong Feng
2018 Educational Sciences: Theory & Practice  
related information, establishes the search link, and helps the college graduates to find the required employment information more effectively and timely.  ...  But due to the rapid development of Internet technology, which results in the explosive growth of information, the network is full of massive employment-related data.  ...  Personalized recommendation refers to recommend the information that the user is interested in to the user, and prompts the user to browse when the user accesses the Internet.  ... 
doi:10.12738/estp.2018.6.202 fatcat:v5agwwxd5ze77lxzg7rhive7pa

PACMAN: Personal Agent for Access Control in Social Media

Gaurav Misra, Jose M. Such
2017 IEEE Internet Computing  
In this paper, we propose PACMAN, a personal assistant agent that recommends personalized access control decisions based on the social context of any information disclosure by incorporating communities  ...  generated from the network structure of the user and utilizing information in their profiles, in addition to the particular content to be shared.  ...  In this paper, we present PACMAN, a personal agent which provides a novel approach to learning access control decisions by combining social relationships and information about the content.  ... 
doi:10.1109/mic.2017.4180831 fatcat:trzr246xwbbtxceivh3fuuxnvy

Data Protection in Services and Support Roles – a Qualitative Research amongst ICT Professionals

Pedro Ruivo, Vítor Santos, Tiago Oliveira
2014 Procedia Technology - Elsevier  
This qualitative research studied which recommendations service and support professionals should follow in their daily tasks to ensure customer data protection.  ...  It present 12 recommendations: Data classification (three categories: low, medium and high business impact)  ...  Recommendation 11 -Escalating issues, ICT personal is likely to engage customers every day that may require to access, collect, or manage customers' personal information.  ... 
doi:10.1016/j.protcy.2014.10.020 fatcat:p2kgbku7frdmrkw5brocfbhbji

Information Access Assistant Service (IAAS)

Kiswendsida K. Kabore, Oumarou Sie, Florence Sedes, Andre Peninou
2013 2013 IEEE Third International Conference on Information Science and Technology (ICIST)  
Our work aims improving access to information through recommendations made by system users with access to information.  ...  Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using.  ...  MECHANISMS FOR CUSTOMIZATION IN IAAS A. General Mechanism We designed a support service for personalized access to information. This service is described in the image below.  ... 
doi:10.1109/icist.2013.6747612 fatcat:nafuaa3ucbfnnklgvjjepggfie

Information Access Assistant Service (IAAS)

Kiswendsida K. Kabore, Oumarou Sie, Florence Sedes, Andre Peninou
2013 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)  
Our work aims improving access to information through recommendations made by system users with access to information.  ...  Despite the multitude of solutions, the web users are still looking for more and more simple assistant in web using.  ...  MECHANISMS FOR CUSTOMIZATION IN IAAS A. General Mechanism We designed a support service for personalized access to information. This service is described in the image below.  ... 
doi:10.1109/icitst.2013.6750263 dblp:conf/icitst/KaboreSSP13 fatcat:zongvv3mizg7pmzvoa6333xpda

Spontaneous and Context-Aware Media Recommendation in Heterogeneous Spaces

Daqing Zhang, Zhiwen Yu
2007 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring  
A general platform for spontaneous media access and context-aware media recommendation has been proposed and implemented.  ...  This paper deals with two important issues in pervasive media access: one is the spontaneous media access in heterogeneous environments, the other is the context-aware media recommendation in different  ...  This precipitates the need to recommend the right content from the overabundant media information, in the right form, to the right person.  ... 
doi:10.1109/vetecs.2007.67 dblp:conf/vtc/ZhangY07 fatcat:zccwa2kdyfg5nnrfm7vkopoz3u

Development of best practice recommendations to enhance access to and use of formal community care services for people with dementia in Europe: a Delphi process conducted by the Actifcare project

Janne Røsvik, Mona Michelet, Knut Engedal, Sverre Bergh, Anja Bieber, Manuel Gonçalves-Pereira, Daniel Michael Portolani, Louise Hopper, Kate Irving, Hannah Jelley, Liselot Kerpershoek, Gabriele Meyer (+10 others)
2020 Aging & Mental Health  
An appointed contact person was central in Recommendations to enhance access. Coordination and flexibility in setting and type of services were among the Recommendations to enhance use.  ...  Training of health care personnel and person-centred care were central Recommendations that can facilitate access or use indirectly.  ...  RECOMMENDATIONS TO ENHANCE ACCESS Recommendations that can enhance access to services directly People with dementia and their carer/family should have a named contact person The contact person may be  ... 
doi:10.1080/13607863.2020.1822286 pmid:33030026 fatcat:ci3dzpoqqfaxrpcak2maji2cau

An agent-based framework for secure and privacy-preserving personalized information services

Richard Cissée, Andreas Rieger, Nicolas Braun, Sahin Albayrak
2006 Revista Colombiana de Computación  
In order to attract and satisfy customers, these services must offer added value e.g. by delivering personalized information in a seamless and multi-modal way.  ...  Personalized services, however, bring about additional requirements related to privacy and security, which have to be addressed if the services are to become widely accepted.  ...  We are currently working on the implementation of additional community services for connecting users with similar interests and preferences.  ... 
doaj:da84ca6c0c81446588574ba84c1db474 fatcat:fd2uimubm5brrpxruohdfy3syq
« Previous Showing results 1 — 15 out of 1,165,996 results