Results 21 to 30 of about 672,157 (285)
Localizing the Politics of Privacy in Communication and Media Research
While previous communication and media research has largely focused on either studying privacy as personal boundary management or made efforts to investigate the structural (legal or economic) condition of privacy, we observe an emergent body of research
Johanna E. Möller, Leyla Dogruel
doaj +1 more source
Key Agreement Between User and Drone With Forward
Many applications are equipped to utilize drones to provide various services to users in Internet of Drones (IoD) environments. In such applications, it is necessary to make a session key between a drone and a user to establish an authenticated and ...
Jae Yeol Jeong +2 more
doaj +1 more source
Re-thinking the regulatory environment of credit reporting: Could legislation stem privacy and discrimination concerns? [PDF]
This paper examines the activities carried out in the UK by Credit Reference Agencies, current business practices, and the legal standing of credit reporting. It suggests areas and issues for further legal debate and policy consideration.
Ferretti, F
core +1 more source
Privacy in context-based and epidemic forwarding
Autonomic and opportunistic communications require specific routing algorithms, like replication-based algorithms or context-based forwarding. Privacy is a major concern for protocols which disseminate the context of their destination. In this paper, we focus on the privacy issue inherent to context-based protocols, in the framework of an original ...
Abdullatif Shikfa +2 more
openaire +4 more sources
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj +1 more source
Metaverse: Security and Privacy Concerns
The term “metaverse”, a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s.
Zhongyun Hua +4 more
doaj +1 more source
Privacy in the Genomic Era [PDF]
Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized ...
Ayday, Erman +7 more
core +4 more sources
Data Confidentiality in Mobile Ad hoc Networks [PDF]
Mobile ad hoc networks (MANETs) are self-configuring infrastructure-less networks comprised of mobile nodes that communicate over wireless links without any central control on a peer-to-peer basis.
Al-Bayatti, Ali +3 more
core +2 more sources
A Privacy-Preserving Protocol for Utility-Based Routing in DTNs
In the utility-based routing protocol of delay-tolerant networks (DTNs), nodes calculate routing utility value by encounter time, frequency, and so on, and then forward messages according to the utility.
Qingfeng Jiang +3 more
doaj +1 more source
Managing Access to Biobanks:How Can We Reconcile Privacy and Public Interests in Genetic Research? [PDF]
This article is concerned with the ultimate objectives of genetic biobanks set up to promote the public interest—being the sharing of samples and data for medical research—and the consequences for personal privacy of realising them.
Frenkel, D. A. +7 more
core +1 more source

