Results 81 to 90 of about 1,628,358 (345)

Ensuring Privacy with Constrained Additive Noise by Minimizing Fisher Information [PDF]

open access: yes, 2018
The problem of preserving the privacy of individual entries of a database when responding to linear or nonlinear queries with constrained additive noise is considered.
Farokhi, Farhad, Sandberg, Henrik
core   +2 more sources

Multiplex single‐cell profiling of putative cancer stem cell markers ALDH1, SOX9, SOX2, CD44, CD133 and CD15 in endometrial cancer

open access: yesMolecular Oncology, EarlyView.
Cancer stem cells are associated with aggressive disease, but a deep characterization of such markers is lacking in endometrial cancer. This study uses imaging mass cytometry to explore putative cancer stem cell markers in endometrial tumors and corresponding organoid models.
Hilde E. Lien   +7 more
wiley   +1 more source

Global Education Industry - Exploring the state of affairs in Austria

open access: yesSeminar.net, 2021
Digitization initiatives in the field of education always correspond with developments in the education industry. In recent years, globally networked development dynamics have emerged that are essentially characterized by an education-industrial complex ...
English English, Reinhold Madritsch
doaj   +1 more source

On the Relationship Between Information-Theoretic Privacy Metrics And Probabilistic Information Privacy [PDF]

open access: yesarXiv, 2023
Information-theoretic (IT) measures based on $f$-divergences have recently gained interest as a measure of privacy leakage as they allow for trading off privacy against utility using only a single-value characterization. However, their operational interpretations in the privacy context are unclear.
arxiv  

The information privacy domain

open access: yesInternational Journal of Information Privacy, Security and Integrity, 2016
A definition of information privacy is elusive due to its multi-facetted aspects. The paper presents the position that information privacy is a domain and not a property, and elaborates various components of this domain. It goes on to use the provided definition of information privacy domain to test Gramm-Leach-Bliley Act.
Frank Ono   +5 more
openaire   +2 more sources

Privacy as an Asset [PDF]

open access: yes, 2017
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the
Gryz, Jarek
core  

Mandatory Enforcement of Privacy Policies using Trusted Computing Principles [PDF]

open access: yes, 2010
Modern communication systems and information technology create significant new threats to information privacy. In this paper, we discuss the need for proper privacy protection in cooperative intelligent transportation systems (cITS), one instance of such
Dietzel, Stefan   +2 more
core   +3 more sources

The roles and applications of extracellular vesicles in cancer

open access: yesMolecular Oncology, EarlyView.
Extracellular vesicles (EVs) are minute versions of cells limited by a lipid bilayer containing cytoplasm from the cell that releases them, but without a nucleus and thus unable to self‐reproduce. EVs contain multiple molecules (proteins, lipids, glycans, and nucleic acids) they can induce complex responses in cells.
Clotilde Théry, Daniel Louvard
wiley   +1 more source

Juxtaposing the persuasion knowledge model and privacy paradox: An experimental look at advertising personalization, public policy and public understanding

open access: yesCyberpsychology: Journal of Psychosocial Research on Cyberpspace, 2016
Recent studies suggest the expanding collection and use of big data by advertisers to target messages to consumers based on their location, demographics and online behaviors is escalating information privacy concerns and negatively impacting campaign ...
Nancy Howell Brinson, Matthew S. Eastin
doaj   +1 more source

Perception of Information Sensitivity for Internet Users in Saudi Arabia

open access: yesActa Informatica Pragensia, 2020
The rapid evolution of Internet use has led to the collection of big data about users, which has raised users' privacy concerns about their personal information.
Khaled Almotairi, Bilal Bataineh
doaj   +1 more source

Home - About - Disclaimer - Privacy