Results 21 to 30 of about 232,045 (243)

Towards Privacy by Design on the Internet of Things (IoT) Use: A Qualitative Descriptive Study

open access: yesJournal of Information Systems and Informatics, 2022
From remote control and surveillance to energy and health monitoring, IoT devices provide cutting-edge services to improve our lives. Nevertheless, IoT technologies raise complicated, innovative privacy-related issues that might limit their widespread ...
Ahmad Luthfi, Emigawaty Emigawaty
doaj   +1 more source

Privacy framework for context-aware robot development

open access: yesPaladyn, 2021
Privacy is an essential topic in (social) robotics and becomes even more important when considering interactive and autonomous robots within the domestic environment.
Heuer Tanja   +2 more
doaj   +1 more source

Designing Technologies with and for Youth: Traps of Privacy by Design

open access: yesMedia and Communication, 2020
Media and communication scholars studying young people’s privacy often involve them in research in order to better understand their interactions with digital technologies.
Bieke Zaman
doaj   +1 more source

Business Process Modeling of a GDPR Compliant System for Research Project Management

open access: yesJournal of Applied Computer Science & Mathematics, 2019
The digitization process and the wide use of Internet technologies have brought easy access to information and a significant improvement in the quality of life.
ARBA Raluca, ARBA Adrian Vasile
doaj   +1 more source

Multiple sclerosis clinical decision support system based on projection to reference datasets

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 1863-1873, December 2022., 2022
Abstract Objective Multiple sclerosis (MS) is a multifactorial disease with increasingly complicated management. Our objective is to use on‐demand computational power to address the challenges of dynamically managing MS. Methods A phase 3 clinical trial data (NCT00906399) were used to contextualize the medication efficacy of peg‐interferon beta‐1a vs ...
Chadia Ed‐driouch   +13 more
wiley   +1 more source

Reasons and Strategies for Privacy Features in Tracking and Tracing Systems—A Systematic Literature Review

open access: yesSensors, 2021
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry.
Christian Jandl   +3 more
doaj   +1 more source

The anterior nucleus of the thalamus plays a role in the epileptic network

open access: yesAnnals of Clinical and Translational Neurology, Volume 9, Issue 12, Page 2010-2024, December 2022., 2022
Abstract Objectives We investigated both the metabolic differences and interictal/ictal discharges of the anterior nucleus of the thalamus (ANT) in patients with epilepsy to clarify the relationship between the ANT and the epileptic network. Methods Nineteen patients with drug‐resistant epilepsy who underwent stereoelectroencephalography were studied ...
Hao Yan   +9 more
wiley   +1 more source

A Privacy-Aware Zero Interaction Smart Mobility System

open access: yesIEEE Access, 2022
Smart cities often rely on technological innovations to improve citizens’ safety and quality of life. This paper presents a novel smart mobility system that facilitates people’s access to public mobility while preserving their privacy.
Stefano Righini   +2 more
doaj   +1 more source

Enhancing Data Protection in Dynamic Consent Management Systems: Formalizing Privacy and Security Definitions with Differential Privacy, Decentralization, and Zero-Knowledge Proofs

open access: yesSensors, 2023
Dynamic consent management allows a data subject to dynamically govern her consent to access her data. Clearly, security and privacy guarantees are vital for the adoption of dynamic consent management systems.
Muhammad Irfan Khalid   +2 more
doaj   +1 more source

Data Protection by Design and by Default : Deciphering the EU’s Legislative Requirements

open access: yesOslo Law Review, 2017
In this paper, a critical examination is conducted of Article 25 of the European Union’s General Data Protection Regulation (Regulation 2016/679). Bearing the title ʻdata protection by design and by default’, Article 25 requires that core data protection
Lee A. Bygrave
doaj   +1 more source

Home - About - Disclaimer - Privacy