Results 41 to 50 of about 367,444 (216)

SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors

open access: yesSensors, 2011
People with special medical monitoring needs can, these days, be sent home and remotely monitored through the use of data logging medical sensors and a transmission base-station.
Tai-Hoon Kim   +2 more
doaj   +1 more source

Juxtaposing the persuasion knowledge model and privacy paradox: An experimental look at advertising personalization, public policy and public understanding

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace, 2016
Recent studies suggest the expanding collection and use of big data by advertisers to target messages to consumers based on their location, demographics and online behaviors is escalating information privacy concerns and negatively impacting campaign ...
Nancy Howell Brinson, Matthew S. Eastin
doaj   +1 more source

An Exploratory Study on the Taiwanese Higher Education Students’ Understanding of Personal Data Protection Act 台灣高等教育學生對個人資料保護法理解之初探

open access: yesJiàoyù zīliào yǔ túshūguǎn xué, 2023
資訊隱私權是現代人生活中重要權利之一,高等教育階段學生對資訊隱私之個人資料保護法(簡稱個資法)的理解程度,是落實此權利之基礎。本研究設計情境案例問卷,蒐集到745 位高等教育學生對個資法理解之情形,結果顯示:1. 高度理解部分為「通知義務」。2. 中度理解是關於公務機關之定義,以及委託者負擔損害賠償責任。3.
Mei-Lien Hsueh, Chien Chou
doaj   +1 more source

Protecting Privacy of Genomic Information

open access: yes, 2017
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
Delgado Mercè, Jaime   +2 more
openaire   +5 more sources

Comparing Threshold Selection Methods for Network Anomaly Detection

open access: yesIEEE Access
The use of unsupervised machine learning models for anomaly detection is a common thing nowadays. While many research papers focus on improving and testing these models, there is a lack of those that deal with threshold selection, which is an important ...
Adrian Komadina   +3 more
doaj   +1 more source

Information management and patient privacy [PDF]

open access: yesBMJ, 1994
EDITOR, - Alison Tonk's editorial was a useful summary of some of the key parts of the NHS Management Executive's information management and technology strategy and will assist in further disseminating the objectives of the strategy to the medical profession.1 Ensuring that the clinical professions are aware and involved is important, and we are making
G P, Winyard, R T, Rogers
openaire   +2 more sources

Internet Users’ Valuation of Enhanced Data Protection on Social Media: Which Aspects of Privacy Are Worth the Most?

open access: yesFrontiers in Psychology, 2018
As the development of the Internet and social media has led to pervasive data collection and usage practices, consumers’ privacy concerns have increasingly grown stronger.
Jasmin Mahmoodi   +6 more
doaj   +1 more source

JonDonym Users’ Information Privacy Concerns [PDF]

open access: yes, 2018
Privacy concerns as well as trust and risk beliefs are important factors that can influence users’ decision to use a service. One popular model that integrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs.
David Harborth, Sebastian Pape
openaire   +3 more sources

Home - About - Disclaimer - Privacy