Results 61 to 70 of about 225,999 (330)
Semi-Supervised First-Person Activity Recognition in Body-Worn Video [PDF]
Body-worn cameras are now commonly used for logging daily life, sports, and law enforcement activities, creating a large volume of archived footage. This paper studies the problem of classifying frames of footage according to the activity of the camera ...
Akar, Osman +8 more
core +1 more source
Privacy and Cloud Computing in Public Schools [PDF]
Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take ...
Alvarado, Daniela +5 more
core +2 more sources
Abstract Mobile technologies have become significant resources for crisis communication and social support in recent years. However, despite empirical evidence pointing to the centrality of these technologies for parenthood in everyday life, it is yet unknown how parents' coping resources play a role in the digital environment.
Daphna Yeshua‐Katz +2 more
wiley +1 more source
The Value of Online Information Privacy: An Empirical Investigation [PDF]
Concern over online information privacy is widespread and rising. However, prior research is silent about the value of information privacy in the presence of potential benefits from sharing personally identifiable information.
Hann, Il-Horn +3 more
core +4 more sources
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David +3 more
core
Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data
In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living
Acquisti A. +10 more
core +1 more source
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson +5 more
wiley +1 more source
Improving Inter-Agency Data Sharing Through Linkage Spine Interoperability
Introduction Linkage of Federal Government data in Australia is conducted primarily through Accredited Integrating Authorities (AIAs). These agencies hold different dataset from Commonwealth and state/territory government agencies.
Nick von Sanden
doaj +1 more source
A Study of Compensation in Personal Identifiable Information Leakage
The organizations and companies that have the leakage of personal identifiable information (sometimesabbreviated as PII) should take a lot of necessary actions such as investigation, public relations,and compensation for customers. Especially, in Japan, mass media tend to broadcast security newsand these information leakage incidents as daily news ...
null Tomohisa Ishikawa +1 more
openaire +1 more source
An efficient solution for privacy-preserving, secure remote access to sensitive data
Sharing data that contains personally identifiable or sensitive information, such as medical records, always has privacy and security implications. The issues can become rather complex when the methods of access can vary, and accurate individual data ...
Batten, Lynn M. +3 more
core +2 more sources

