Results 61 to 70 of about 225,999 (330)

Semi-Supervised First-Person Activity Recognition in Body-Worn Video [PDF]

open access: yes, 2019
Body-worn cameras are now commonly used for logging daily life, sports, and law enforcement activities, creating a large volume of archived footage. This paper studies the problem of classifying frames of footage according to the activity of the camera ...
Akar, Osman   +8 more
core   +1 more source

Privacy and Cloud Computing in Public Schools [PDF]

open access: yes, 2013
Today, data driven decision-making is at the center of educational policy debates in the United States. School districts are increasingly turning to rapidly evolving technologies and cloud computing to satisfy their educational objectives and take ...
Alvarado, Daniela   +5 more
core   +2 more sources

Parents' WhatsApp coping resources in the context of ongoing political conflicts: An ecological exploration

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract Mobile technologies have become significant resources for crisis communication and social support in recent years. However, despite empirical evidence pointing to the centrality of these technologies for parenthood in everyday life, it is yet unknown how parents' coping resources play a role in the digital environment.
Daphna Yeshua‐Katz   +2 more
wiley   +1 more source

The Value of Online Information Privacy: An Empirical Investigation [PDF]

open access: yes
Concern over online information privacy is widespread and rising. However, prior research is silent about the value of information privacy in the presence of potential benefits from sharing personally identifiable information.
Hann, Il-Horn   +3 more
core   +4 more sources

PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]

open access: yes, 2012
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David   +3 more
core  

Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data

open access: yes, 2014
In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living
Acquisti A.   +10 more
core   +1 more source

“And in some cases, we're the best option:” A qualitative study of community‐based doula support for black perinatal mental health

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson   +5 more
wiley   +1 more source

Improving Inter-Agency Data Sharing Through Linkage Spine Interoperability

open access: yesInternational Journal of Population Data Science, 2020
Introduction Linkage of Federal Government data in Australia is conducted primarily through Accredited Integrating Authorities (AIAs). These agencies hold different dataset from Commonwealth and state/territory government agencies.
Nick von Sanden
doaj   +1 more source

A Study of Compensation in Personal Identifiable Information Leakage

open access: yesResearch Briefs on Information and Communication Technology Evolution, 2015
The organizations and companies that have the leakage of personal identifiable information (sometimesabbreviated as PII) should take a lot of necessary actions such as investigation, public relations,and compensation for customers. Especially, in Japan, mass media tend to broadcast security newsand these information leakage incidents as daily news ...
null Tomohisa Ishikawa   +1 more
openaire   +1 more source

An efficient solution for privacy-preserving, secure remote access to sensitive data

open access: yes, 2012
Sharing data that contains personally identifiable or sensitive information, such as medical records, always has privacy and security implications. The issues can become rather complex when the methods of access can vary, and accurate individual data ...
Batten, Lynn M.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy