Zobrazeno 1 - 10
of 5 967
pro vyhledávání: '"Privacy software"'
Publikováno v:
AIS Transactions on Human-Computer Interaction. 15:1-21
Mobile Applications (a.k.a. apps) have rapidly grown into a multi-billion-dollar industry. Because they are available through devices that are “always on” and often with the user, mobile apps are often adopted “on the fly” as needed. As a res
This report documents the outcomes of Dagstuhl Seminar 22342 "Privacy in Speech and Language Technology". The seminar brought together 27 attendees from 9 countries (Australia, Belgium, France, Germany, the Netherlands, Norway, Portugal, Sweden, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5889179cd3a444cbc980d85c039709ed
Advances in service personalization are driven by low-cost data collection and processing, in addition to the wide variety of third-party frameworks for authentication, storage, and marketing. New privacy regulations, such as the General Data Protect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4342ea163e431275dcfb937591b74334
https://dl.acm.org/doi/10.1145/3490754
https://dl.acm.org/doi/10.1145/3490754
Autor:
Paul M. Schwartz
Publikováno v:
Schwartz, PM. (2017). Beyond Lessig's Code for Internet Privacy: Cyberspace Filters, Privacy Control and Fair Information Practices. UC Berkeley: Retrieved from: http://www.escholarship.org/uc/item/1h80117d
In Code, the most influential book yet written about law and cyberspace, Lawrence Lessig makes an intriguing proposal for shaping privacy on the Internet: (1) the legal assignment to every individual of a property interest in her own personal informa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec376480feddaae3e4030acc89c4b03d
https://escholarship.org/uc/item/1h80117d
https://escholarship.org/uc/item/1h80117d
Due to the increasing dependency on IT systems in both the private and industrial sectors, IT security training is becoming increasingly important. One way to teach IT security topics is through serious games, which besides being fun to play, impart
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::52dcd5fce7290f8baea1d03fe174a453
Publikováno v:
ISTI Research report, pp.35–66, 2022
This report documents the program and the outcomes of Dagstuhl Seminar 22022 "Mobility Data Analysis: from Technical to Ethical" that took place fully remote and hosted by Schloss Dagstuhl from 10-12 January 2022. An interdisciplinary team of 23 rese
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::73ea5aea3bac7a05dcc101c9de1aa321
Publikováno v:
ECRTS 2022-34th Euromicro Conference on Real-Time Systems
ECRTS 2022-34th Euromicro Conference on Real-Time Systems, Jul 2022, Modène, Italy. pp.1-24, ⟨10.4230/LIPIcs.ECRTS.2022.18⟩
ECRTS 2022-34th Euromicro Conference on Real-Time Systems, Jul 2022, Modène, Italy. pp.1-24, ⟨10.4230/LIPIcs.ECRTS.2022.18⟩
The emergence of Real-Time Systems with increased connections to their environment has led to a greater demand in security for these systems. Memory corruption attacks, which modify the memory to trigger unexpected executions, are a significant threa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b43ef1f214e964ab4ad5f9935f7f18af
Autor:
Mike Halsey
Publikováno v:
Windows 10 Troubleshooting ISBN: 9781484274705
Windows 10 Troubleshooting ISBN: 9781484209264
Windows 10 Troubleshooting ISBN: 9781484209264
How would you feel if your laptop or tablet were stolen, with your files and data on board, including shopping logins and passwords, financial details, and personal photos? Worse, how would you feel if you didn’t have a password on your PC, or if t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d0c2d7e1c70760d2f99da3d012d5fc2e
https://doi.org/10.1007/978-1-4842-7471-2_18
https://doi.org/10.1007/978-1-4842-7471-2_18
Autor:
Sara Landini
Publikováno v:
Services and Business Process Reengineering ISBN: 9789811630484
This paper deals with the use of software in insurance production and distribution considering the privacy issues that can arise. With regards to those uses, we will first consider the use of software in distribution that is needed to better perform
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40dd371e7ac709e13302c0c160ab6763
https://doi.org/10.1007/978-981-16-3049-1_14
https://doi.org/10.1007/978-981-16-3049-1_14
Publikováno v:
IEEE Transactions on Big Data. 5:408-422
The Internet of Things (IoT) represents a technology revolution transforming the current environment into a ubiquitous world, whereby everything that benefits from being connected will be connected. Despite the benefits, the privacy of these things b