Results 111 to 120 of about 32,405,099 (343)

BPDIMS: A Blockchain-based Personal Data and Identity Management System

open access: yesHawaii International Conference on System Sciences, 2019
Recent scandals on the abuse of personal information from social media platforms and numerous user identity data breaches raise concerns about technical, commercial, and ethical aspects of privacy and security of user data.
Ben Faber   +4 more
semanticscholar   +1 more source

Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks [PDF]

open access: yes, 2006
This work presents a failure data analysis campaign on Bluetooth Personal Area Networks (PANs) conducted on two kind of heterogeneous testbeds (working for more than one year).
CINQUE, MARCELLO   +2 more
core   +1 more source

Prediction of Myasthenia Gravis Worsening: A Machine Learning Algorithm Using Wearables and Patient‐Reported Measures

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein   +7 more
wiley   +1 more source

Smart city development strategies: Data determinism and technological sovereignty [PDF]

open access: yesSociološki Pregled, 2023
This paper analyzes the role of the citizen through the nexus between the notion of 'the right to the city' and the current challenges of data integrity.
Dimitrijević Lazar A.
doaj  

Personal Data Security: Divergent Standards in the European Union and the United States [PDF]

open access: yes, 1995
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the ...
Fleischmann, Amy
core   +1 more source

Use of Symptomatic Drug Treatment for Fatigue in Multiple Sclerosis and Patterns of Work Loss

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To describe the use of central stimulants and amantadine for fatigue in MS and evaluate a potential association with reduced work loss in people with MS. Methods We conducted a nationwide, matched, register‐based cohort study in Sweden (2006 to 2023) using national registers with prospective data collection.
Simon Englund   +3 more
wiley   +1 more source

Testing Methodology of Breaking into Secured Storages of Mobile Operational System Google Android

open access: yesБезопасность информационных технологий, 2013
The methodology is developed for carrying out the test of breaking into internal storages of mobile operational system Google Android in order to detect security threats for personal data.
Elena Vyacheslavovna Elistratova   +1 more
doaj  

TRADE IN DATA: DIFFERENT APPROACHES, ONE REALITY

open access: yesRUDN Journal of Law, 2020
The development of the digital economy and new technologies raises the question whether it is possible to consider personal data as a new economic asset. Provides an overview of the positions on this issue in foreign and domestic scholarships.
Olga S. Magomedova   +2 more
doaj   +1 more source

Children’s understanding of personal data and privacy online – a systematic evidence mapping

open access: yesInformation, Communication & Society, 2019
Privacy is both a protective and an enabling right. This article identifies the available research on how children understand, value and negotiate their personal data and privacy online.
M. Stoilova   +2 more
semanticscholar   +1 more source

Synthetic sequence generator for recommender systems - memory biased random walk on sequence multilayer network

open access: yes, 2014
Personalized recommender systems rely on each user's personal usage data in the system, in order to assist in decision making. However, privacy policies protecting users' rights prevent these highly personal data from being publicly available to a wider ...
B. Berendt   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy