Results 61 to 70 of about 1,212,365 (214)
User's Privacy in Recommendation Systems Applying Online Social Network Data, A Survey and Taxonomy
Recommender systems have become an integral part of many social networks and extract knowledge from a user's personal and sensitive data both explicitly, with the user's knowledge, and implicitly.
Aghasian, Erfan+2 more
core +1 more source
Introduction. This article provides an overview regarding privacy and data protection laws and principles around the world. It is based on lectures by the author on May 17, 2018 at Moscow State Institute of International Relations (MGIMO) and Lomonosov ...
L. Determann
doaj +1 more source
FL-ASB: A Fuzzy Logic Based Adaptive-period Single-hop Broadcast Protocol
In vehicular ad hoc networks, vehicle-to-vehicle–based broadcast can fast disseminate safety messages between vehicles within the whole network and hence expand drivers perception vision, which will reduce the accident probability and ensure the ...
Bin Pan, Hao Wu, Jin Wang
doaj +1 more source
A Taxonomy of Syntactic Privacy Notions for Continuous Data Publishing
Continuous data publishing aims to anonymise the next publication of changing microdata while preserving privacy. The microdata can change between publications via additions, deletions, insertions, and updates.
Adrian Tobar Nicolau+2 more
doaj +1 more source
Privacy and Data Protection Act 2014 [PDF]
This report establishes a data security regime for all information held by the Victorian public sector. Authorised Version No. 001 - Privacy and Data Protection Act 2014 - No.
Commissioner for Privacy and Data Protection
core
The United States famously lacks a comprehensive federal data privacy law. In the past year, however, over half the states have proposed broad privacy bills or have established task forces to propose possible privacy legislation. Meanwhile, congressional
Chander, Anupam+2 more
core +1 more source
While many of our daily practices have become intertwined with media and communication technologies, data privacy concerns are on the rise. Privacy is an essentially contested concept, contingent on context and perspective, which poses pragmatic problems in protecting it.
Ine Van Zeeland, Jo Pierson
openaire +1 more source
Developing a Secure Internet-based Network of Trusted Data
Our world has not caught up with technology, and as a result has become more dangerous and nefarious with clandestine actors. Learn what reputable organizations, businesses and academic pioneers are doing to preserve digital identity, data provenance ...
Thomas Hardjono, PhD+1 more
doaj +1 more source
Efficient perturbation techniques for preserving privacy of multivariate sensitive data
Cloud data is increasing significantly recently because of the advancement of technology which can contain individuals’ sensitive information, such as medical diagnostics reports.
Mahbubur Rahman+2 more
doaj
Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing
Sensors, portable devices, and location-based services, generate massive amounts of geo-tagged, and/or location- and user-related data on a daily basis.
Manos Katsomallos+2 more
doaj +1 more source