Results 51 to 60 of about 2,332,315 (339)

Validity and Reliability of the Scale Internet Users’ Information Privacy Concerns (IUIPC)

open access: yesProceedings on Privacy Enhancing Technologies, 2021
Internet Users’ Information Privacy Concerns (IUIPC-10) is one of the most endorsed privacy concern scales. It is widely used in the evaluation of human factors of PETs and the investigation of the privacy paradox. Even though its predecessor Concern For
Thomas Gross
semanticscholar   +1 more source

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis

open access: yesTechnologies
While Internet privacy is a subjective term that is challenging to define, describe, and quantify, assessing the level of privacy provided by data processors offering services over the Internet is essential for detecting privacy flaws and enabling ...
David Cevallos-Salas   +2 more
doaj   +1 more source

An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment

open access: yesIEEE Access, 2020
Aiming at the problems for existing data transmission mechanisms in Internet of vehicles, such as real-time performance, high efficiency of computing tasks, vehicle data privacy, etc., this paper proposes an efficient and secure data transmission ...
Wenjuan Zhang, Gang Li
doaj   +1 more source

Economic location-based services, privacy and the relationship to identity [PDF]

open access: yes, 2005
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core  

User-centric Privacy Engineering for the Internet of Things [PDF]

open access: yes, 2018
User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should ...
Barhamgi, Mahmoud   +3 more
core   +3 more sources

Physician Referral Patterns to Physical Therapists for Managing Knee Osteoarthritis: A Retrospective Analysis of Electronic Health Records from an Integrated Health System

open access: yesArthritis Care &Research, Accepted Article.
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja   +4 more
wiley   +1 more source

Data privacy preservation for the search of Internet of things based on fine-grained authorization

open access: yes网络与信息安全学报, 2017
With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic.
Jia-hui WANG, Chuan-yi LIU,Bin-xing FANG
doaj   +3 more sources

Leveraging Secure Multiparty Computation in the Internet of Things

open access: yes, 2018
Centralized systems in the Internet of Things---be it local middleware or cloud-based services---fail to fundamentally address privacy of the collected data.
Carle, Georg, von Maltitz, Marcel
core   +1 more source

Privacy Laws and Privacy by Design Schemes for the Internet of Things

open access: yesACM Computing Surveys, 2021
Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws ...
Atheer Aljeraisy   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy