Results 71 to 80 of about 130,061 (203)
Data Privacy in the Internet of Things: A Perspective of Personal Data Store-Based Approaches
Data generated by Internet of Things devices enable the design of new business models and services, improving user experience and satisfaction. This data also serve as an essential information source for many fields, including disaster management, bio ...
George P. Pinto, Cássio Prazeres
doaj +1 more source
A Copyright Right of Publicity [PDF]
This Article identifies a striking asymmetry in the law’s disparate treatment of publicity-rights holders and copyright holders. State-law publicity rights generally protect individuals from unauthorized use of their name and likeness by others ...
Weisbord, Reid Kress
core +1 more source
Privacy and peer-to-peer payment apps
Apps for our smartphones are ubiquitous. Free apps usually require exchanging personal information. Mobile payments in the U.S. are expected to almost double by 2027. Peer-to-peer (P2P) payment apps are a subcategory of said apps.
Stephen L Baglione, Louis A Tucci
doaj +1 more source
Big Data Ethics in Research [PDF]
The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union.
Sfetcu, Nicolae
core
How Teenagers Deal with their Privacy on Social Network Sites? Results from a National Survey in France [PDF]
This paper proposes to examine the case of privacy concerns and privacy management for teenagers on Social Network Sites, according to a national survey being carried out in France since January 2008 by two University research teams in management ...
Alexandre Coutant, Thomas Stenger
core
Alexandra Nickerson, The Privacy Paradox
Privacy is as complex a concept as it is ubiquitous. But Vanderbilt law and history professor Sarah Igo bravely takes on the challenge of chronicling the history of this mutable, yet fundamental American value. In doing so, she demonstrates the irreconcilable trade-off between privacy and exposure, both of which can be liberating and oppressive in ...
openaire +2 more sources
This paper investigates the relationship between individuals’ heterogeneous risk attitudes and privacy preferences using survey data from 24,899 respondents.
Jing Chen +3 more
doaj +1 more source
Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences
While existing studies explore smartphone privacy setting risks for adolescents, they provide limited insight into the role of gender in these dynamics.
Yeslam Al-Saggaf, Julie Maclean
doaj +1 more source
Is the Private Language Argument a Transcendental Argument? [PDF]
Comparisons between Kant´s critique of pure reason and Wittgenstein´s critique of language, which became current in analytic philosophy (Cf. e.g Hacker 1972, 30.) seem not far-fetched in view of the impetus for the destruction of dogmatic metaphysics ...
Mom, Karel
core
PRIVACY PREFERENCES AND TRUST IN CENTRAL BANKS: HETEROGENEITY IN CASE OF CBDC
Broad societal uptake of Central Bank Digital Currency (CBDC) is contingent on both its design features and public confidence in the issuing central bank.
Віктор Козюк +2 more
doaj +1 more source

