Results 111 to 120 of about 32,405,099 (343)
BPDIMS: A Blockchain-based Personal Data and Identity Management System
Recent scandals on the abuse of personal information from social media platforms and numerous user identity data breaches raise concerns about technical, commercial, and ethical aspects of privacy and security of user data.
Ben Faber +4 more
semanticscholar +1 more source
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks [PDF]
This work presents a failure data analysis campaign on Bluetooth Personal Area Networks (PANs) conducted on two kind of heterogeneous testbeds (working for more than one year).
CINQUE, MARCELLO +2 more
core +1 more source
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein +7 more
wiley +1 more source
Smart city development strategies: Data determinism and technological sovereignty [PDF]
This paper analyzes the role of the citizen through the nexus between the notion of 'the right to the city' and the current challenges of data integrity.
Dimitrijević Lazar A.
doaj
Personal Data Security: Divergent Standards in the European Union and the United States [PDF]
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core +1 more source
Use of Symptomatic Drug Treatment for Fatigue in Multiple Sclerosis and Patterns of Work Loss
ABSTRACT Objective To describe the use of central stimulants and amantadine for fatigue in MS and evaluate a potential association with reduced work loss in people with MS. Methods We conducted a nationwide, matched, register‐based cohort study in Sweden (2006 to 2023) using national registers with prospective data collection.
Simon Englund +3 more
wiley +1 more source
Testing Methodology of Breaking into Secured Storages of Mobile Operational System Google Android
The methodology is developed for carrying out the test of breaking into internal storages of mobile operational system Google Android in order to detect security threats for personal data.
Elena Vyacheslavovna Elistratova +1 more
doaj
TRADE IN DATA: DIFFERENT APPROACHES, ONE REALITY
The development of the digital economy and new technologies raises the question whether it is possible to consider personal data as a new economic asset. Provides an overview of the positions on this issue in foreign and domestic scholarships.
Olga S. Magomedova +2 more
doaj +1 more source
Children’s understanding of personal data and privacy online – a systematic evidence mapping
Privacy is both a protective and an enabling right. This article identifies the available research on how children understand, value and negotiate their personal data and privacy online.
M. Stoilova +2 more
semanticscholar +1 more source
Personalized recommender systems rely on each user's personal usage data in the system, in order to assist in decision making. However, privacy policies protecting users' rights prevent these highly personal data from being publicly available to a wider ...
B. Berendt +13 more
core +1 more source

