Results 91 to 100 of about 703,137 (389)

Measuring the gap between elicited and revealed risk for investors: An empirical study

open access: yesFINANCIAL PLANNING REVIEW, Volume 5, Issue 4, December 2022., 2022
Abstract Financial advisors use questionnaires and discussions with clients to determine investment goals, elicit risk preference and tolerance and establish a suitable portfolio allocation for different risk categories. Financial institutions assign risk ratings to their financial products.
John R. J. Thompson   +4 more
wiley   +1 more source

The PII Problem: Privacy and a New Concept of Personally Identifiable Information [PDF]

open access: yes, 2011
Personally identifiable information (PII) is one of the most central concepts in information privacy regulation. The scope of privacy laws typically turns on whether PII is involved.
Schwartz, Paul M., Solove, Daniel J.
core   +2 more sources

Development of an informatics system for accelerating biomedical research. [version 2; peer review: 2 approved]

open access: yesF1000Research, 2020
The Biomedical Research Informatics Computing System (BRICS) was developed to support multiple disease-focused research programs. Seven service modules are integrated together to provide a collaborative and extensible web-based environment.
Vivek Navale   +7 more
doaj   +1 more source

The Traits of the Personable [PDF]

open access: yesarXiv, 2002
Information personalization is fertile ground for application of AI techniques. In this article I relate personalization to the ability to capture partial information in an information-seeking interaction. The specific focus is on personalizing interactions at web sites.
arxiv  

Folktales - Contemporary Legend, Cucuy, 2002-2003 [PDF]

open access: yes, 2002
Folktales collected by anthropology students 2002–2003. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1020/thumbnail ...

core   +1 more source

Mentors and sponsors: Making a difference for racially and culturally minoritised academics in Australian universities

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract Mentorship and sponsorships play a significant role in faculty experiences, career trajectories, well‐being and academic success in higher education. In this study, 23 racially and culturally minoritised (RACM) academics were interviewed about their experiences working in Australian universities, and all spoke about the key importance of their
Kathomi Gatwiri   +2 more
wiley   +1 more source

Personal Information Databases [PDF]

open access: yesSabah S. Al-Fedaghi, Bernhard Thalheim, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 11-20, August 2009, USA, 2009
One of the most important aspects of security organization is to establish a framework to identify security significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology.
arxiv  

Folktales- La Llorona - Heard story from - Father - Male (1979-1993) [PDF]

open access: yes, 1979
Folktales collected by anthropology students from 1979–1993. NOTE: Personally identifiable information has been redacted.https://scholarworks.utrgv.edu/tmafglazer/1007/thumbnail ...

core   +1 more source

Considering the animating ethos of designing digital first unemployment services: On the motivation of others

open access: yesAustralian Journal of Social Issues, EarlyView.
Abstract This paper explores the animating ethos of digital unemployment services. Unlike human‐to‐human services, where the intention of policy is normally mediated by professionals, digital services are fully designed in the policy imagination. As a result, it is a pressing issue to understand the ethos that animates their development.
Ray Griffin   +2 more
wiley   +1 more source

European Trends in Privacy: How can we increase internet security and protect individual privacy? [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2004
In the aftermath of September 11 2001 security has been at the top of any Government or Enterprise agenda. Scrutinizing flight passenger lists, conference participants' background, customers' profile and securing access to public and private databases ...
Soren Duus Ostergaard
doaj  

Home - About - Disclaimer - Privacy