Results 31 to 40 of about 12,885 (184)
Practices, policies, and problems in the management of learning data: A survey of libraries’ use of digital learning objects and the data they create [PDF]
This study analyzed libraries’ management of the data generated by library digital learning objects (DLO’s) such as forms, surveys, quizzes, and tutorials.
Atwood, Gary +2 more
core +2 more sources
Predicting age and gender from network telemetry: Implications for privacy and impact on policy.
The systematic monitoring of private communications through the use of information technology pervades the digital age. One result of this is the potential availability of vast amount of data tracking the characteristics of mobile network users.
Lida Kuang +4 more
doaj +1 more source
Objective The aim of this study was to determine whether a secure, privacy-preserving record linkage (PPRL) methodology can be implemented in a scalable manner for use in a large national clinical research network.
Daniel Kiernan +17 more
doaj +1 more source
Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data
In the context of a myriad of mobile apps which collect personally identifiable information (PII) and a prospective market place of personal data, we investigate a user-centric monetary valuation of mobile PII. During a 6-week long user study in a living
Acquisti A. +10 more
core +1 more source
Targeted online password guessing:an underestimated threat [PDF]
While trawling online/offline password guessing has been intensively studied, only a few studies have examined targeted online guessing, where an attacker guesses a specific victim's password for a service, by exploiting the victim's personal information
Huang, Xinyi +4 more
core +1 more source
Reconciling Personal Information in the United States and European Union [PDF]
US and EU privacy law diverge greatly. At the foundational level, they diverge in their underlying philosophy: In the US, privacy law focuses on redressing consumer harm and balancing privacy with efficient commercial transactions.
Schwartz, Paul M., Solove, Daniel J.
core +4 more sources
Link Before You Share: Managing Privacy Policies through Blockchain
With the advent of numerous online content providers, utilities and applications, each with their own specific version of privacy policies and its associated overhead, it is becoming increasingly difficult for concerned users to manage and track the ...
Banerjee, Agniva, Joshi, Karuna Pande
core +1 more source
Safeguarding Personal-Identifiable Information (PII) after Smartphone Pairing with Connected Vehicle
The integration of connected autonomous vehicles into the transportation system introduces significant enhancements in driving experience and convenience. Yet, it simultaneously raises important concerns regarding the security and privacy of passenger data.
Jason Carlton, Hafiz Malik
openaire +2 more sources
WHOIS Data Redaction and its Impact on Unsolicited Emails: A Field Experiment
The Internet Corporation for Assigned Names and Numbers (ICANN) mandates the disclosure of certain information regarding registered domain names.
Tobias Sattler
doaj +1 more source
Abstract This study examines how financial knowledge and personal financial involvement relate to financial information search behaviors and the mediating roles of financial self‐efficacy, information‐gathering capacity, and risk tolerance. Using survey data from U.S.
Lu Fan
wiley +1 more source

