Results 91 to 100 of about 703,137 (389)
Measuring the gap between elicited and revealed risk for investors: An empirical study
Abstract Financial advisors use questionnaires and discussions with clients to determine investment goals, elicit risk preference and tolerance and establish a suitable portfolio allocation for different risk categories. Financial institutions assign risk ratings to their financial products.
John R. J. Thompson+4 more
wiley +1 more source
The PII Problem: Privacy and a New Concept of Personally Identifiable Information [PDF]
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved.
Schwartz, Paul M., Solove, Daniel J.
core +2 more sources
The Biomedical Research Informatics Computing System (BRICS) was developed to support multiple disease-focused research programs. Seven service modules are integrated together to provide a collaborative and extensible web-based environment.
Vivek Navale+7 more
doaj +1 more source
The Traits of the Personable [PDF]
Information personalization is fertile ground for application of AI techniques. In this article I relate personalization to the ability to capture partial information in an information-seeking interaction. The specific focus is on personalizing interactions at web sites.
arxiv
Folktales - Contemporary Legend, Cucuy, 2002-2003 [PDF]
Folktales collected by anthropology students 2002–2003. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1020/thumbnail ...
core +1 more source
Abstract Mentorship and sponsorships play a significant role in faculty experiences, career trajectories, well‐being and academic success in higher education. In this study, 23 racially and culturally minoritised (RACM) academics were interviewed about their experiences working in Australian universities, and all spoke about the key importance of their
Kathomi Gatwiri+2 more
wiley +1 more source
Personal Information Databases [PDF]
One of the most important aspects of security organization is to establish a framework to identify security significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology.
arxiv
Folktales- La Llorona - Heard story from - Father - Male (1979-1993) [PDF]
Folktales collected by anthropology students from 1979–1993. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1007/thumbnail ...
core +1 more source
Abstract This paper explores the animating ethos of digital unemployment services. Unlike human‐to‐human services, where the intention of policy is normally mediated by professionals, digital services are fully designed in the policy imagination. As a result, it is a pressing issue to understand the ethos that animates their development.
Ray Griffin+2 more
wiley +1 more source
European Trends in Privacy: How can we increase internet security and protect individual privacy? [PDF]
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases ...
Soren Duus Ostergaard
doaj