Results 31 to 40 of about 12,885 (184)

Practices, policies, and problems in the management of learning data: A survey of libraries’ use of digital learning objects and the data they create [PDF]

open access: yes, 2019
This study analyzed libraries’ management of the data generated by library digital learning objects (DLO’s) such as forms, surveys, quizzes, and tutorials.
Atwood, Gary   +2 more
core   +2 more sources

Predicting age and gender from network telemetry: Implications for privacy and impact on policy.

open access: yesPLoS ONE, 2022
The systematic monitoring of private communications through the use of information technology pervades the digital age. One result of this is the potential availability of vast amount of data tracking the characteristics of mobile network users.
Lida Kuang   +4 more
doaj   +1 more source

Establishing a framework for privacy-preserving record linkage among electronic health record and administrative claims databases within PCORnet®, the National Patient-Centered Clinical Research Network

open access: yesBMC Research Notes, 2022
Objective The aim of this study was to determine whether a secure, privacy-preserving record linkage (PPRL) methodology can be implemented in a scalable manner for use in a large national clinical research network.
Daniel Kiernan   +17 more
doaj   +1 more source

Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data

open access: yes, 2014
In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living
Acquisti A.   +10 more
core   +1 more source

Targeted online password guessing:an underestimated threat [PDF]

open access: yes, 2016
While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information
Huang, Xinyi   +4 more
core   +1 more source

Reconciling Personal Information in the United States and European Union [PDF]

open access: yes, 2013
US and EU privacy law diverge greatly. At the foundational level, they diverge in their underlying philosophy: In the US, privacy law focuses on redressing consumer harm and balancing privacy with efficient commercial transactions.
Schwartz, Paul M., Solove, Daniel J.
core   +4 more sources

Link Before You Share: Managing Privacy Policies through Blockchain

open access: yes, 2017
With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned users to manage and track the ...
Banerjee, Agniva, Joshi, Karuna Pande
core   +1 more source

Safeguarding Personal-Identifiable Information (PII) after Smartphone Pairing with Connected Vehicle

open access: yesJournal of Sensor and Actuator Networks
The integration of connected autonomous vehicles into the transportation system introduces significant enhancements in driving experience and convenience. Yet, it simultaneously raises important concerns regarding the security and privacy of passenger data.
Jason Carlton, Hafiz Malik
openaire   +2 more sources

WHOIS Data Redaction and its Impact on Unsolicited Emails: A Field Experiment

open access: yesIEEE Access
The Internet Corporation for Assigned Names and Numbers (ICANN) mandates the disclosure of certain information regarding registered domain names.
Tobias Sattler
doaj   +1 more source

Financial information search: An exploration of personal motivational, cognitive, and psychological characteristics

open access: yesFamily and Consumer Sciences Research Journal, Volume 54, Issue 3, March 2026.
Abstract This study examines how financial knowledge and personal financial involvement relate to financial information search behaviors and the mediating roles of financial self‐efficacy, information‐gathering capacity, and risk tolerance. Using survey data from U.S.
Lu Fan
wiley   +1 more source

Home - About - Disclaimer - Privacy