Results 341 to 350 of about 1,752,942 (359)
Some of the next articles are maybe not open access.

Preserving privacy on the searchable internet

International Journal of Web Information Systems, 2011
PurposeThe Web is the largest repository of information. Personal information is usually scattered on various pages of different websites. Search engines have made it easier to find personal information. An attacker may collect a user's scattered information together via search engines, and infer some privacy information.
Xiaofeng Meng, Zhongyuan Wang, Ruxia Ma
openaire   +3 more sources

OSINT, the Internet and Privacy

2012 European Intelligence and Security Informatics Conference, 2012
In just 17 years the Internet has transformed practically every facet of modern life. The launch of Mosaic, the first web browser in 1993 was the catalyst for a communication revolution, whose implications are still unraveling. The Web was always intended to be a two-way multi-user publishing system undermining state controlled one way broadcasting ...
openaire   +2 more sources

Privacy in the Internet of Things

2016
Privacy protection is gaining public attention, and even more so with the advances of the Internet of Things (IoT). But there is still no consensus on how privacy can be engineered, even for traditional Information Technology (IT) systems. This chapter, after discussing the main challenges, proposes a general methodology to manage the privacy ...
Jorge Cuellar, Santiago Reinhard Suppan
openaire   +2 more sources

Context Privacy in the Internet of Things

2011
Recent advances in electronics, communications, and information technologies make possible to collect, process and store a large amount of information from the physical world. Once generated, such information is rarely erased and it is almost impossible to fully control its diffusion. This raises serious privacy problems.
GALLUCCIO, LAURA   +3 more
openaire   +2 more sources

Internet privacy — RIP?

Practice Nursing, 2000
On 2 October 2000 the Human Rights Act (HRA) 1998 came into force in the UK. These rights are protected by the European Convention on Human Rights. While most of us are unlikely to be directly affected by this legislation, the Regulation of Investigatory Powers Act (RIPA), which was delayed in its passage through the House of Lords and will come into ...
openaire   +2 more sources

Privacy, the Workplace and the Internet

2017
This paper examines workplace surveillance and monitoring. It is argued that privacy is a moral right, and while such surveillance and monitoring can be justified in some circumstances, there is a presumption against the infringement of privacy. An account of privacy precedes consideration of various arguments frequently given for the surveillance and ...
John Weckert, Seumas Miller
openaire   +2 more sources

Privacy and internet governance

Proceedings of the 8th ACM Conference on Web Science, 2016
Many of the game-changing innovations the Internet brought and continues to bring to all of our daily professional and private lifes come with privacy-related costs. The more day-to-day activities are based on the Internet, the more personal data are generated, collected, stored and used. Big Data, Internet of Things, cyber-physical-systems and similar
openaire   +1 more source

Identity and Privacy on the Internet

International Journal of Applied Research on Information Technology and Computing, 2011
The Internet is responsible for a “structural transformation of the public sphere”, which in a radical way changed the concepts of privacy too. The most important issue of the public debate is the invasion of privacy accompanying this transformation. But new ways of self-expression emerged as well.
openaire   +2 more sources

Internet of Things Security and Privacy

2016
This chapter outlines the main security and privacy issues in IoT and surveys the techniques that were proposed to address them. Some of the discussed techniques prevent security breaches from taking place while others try to detect malicious behavior and trigger an appropriate mitigating countermeasure.
Ammar Rayes, Mehiar Dabbagh
openaire   +2 more sources

Home - About - Disclaimer - Privacy