Results 71 to 80 of about 130,061 (203)

Data Privacy in the Internet of Things: A Perspective of Personal Data Store-Based Approaches

open access: yesJournal of Cybersecurity and Privacy
Data generated by Internet of Things devices enable the design of new business models and services, improving user experience and satisfaction. This data also serve as an essential information source for many fields, including disaster management, bio ...
George P. Pinto, Cássio Prazeres
doaj   +1 more source

A Copyright Right of Publicity [PDF]

open access: yes, 2016
This Article identifies a striking asymmetry in the law’s disparate treatment of publicity-rights holders and copyright holders. State-law publicity rights generally protect individuals from unauthorized use of their name and likeness by others ...
Weisbord, Reid Kress
core   +1 more source

Privacy and peer-to-peer payment apps

open access: yesJournal of Global Business Insights
Apps for our smartphones are ubiquitous. Free apps usually require exchanging personal information. Mobile payments in the U.S. are expected to almost double by 2027. Peer-to-peer (P2P) payment apps are a subcategory of said apps.
Stephen L Baglione, Louis A Tucci
doaj   +1 more source

Big Data Ethics in Research [PDF]

open access: yes
The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union.
Sfetcu, Nicolae
core  

How Teenagers Deal with their Privacy on Social Network Sites? Results from a National Survey in France [PDF]

open access: yes
This paper proposes to examine the case of privacy concerns and privacy management for teenagers on Social Network Sites, according to a national survey being carried out in France since January 2008 by two University research teams in management ...
Alexandre Coutant, Thomas Stenger
core  

Alexandra Nickerson, The Privacy Paradox

open access: yesAmeriQuests, 2019
Privacy is as complex a concept as it is ubiquitous. But Vanderbilt law and history professor Sarah Igo bravely takes on the challenge of chronicling the history of this mutable, yet fundamental American value. In doing so, she demonstrates the irreconcilable trade-off between privacy and exposure, both of which can be liberating and oppressive in ...
openaire   +2 more sources

The role of risk attitudes in shaping digital privacy preferences: evidence from a large-scale survey

open access: yesHumanities & Social Sciences Communications
This paper investigates the relationship between individuals’ heterogeneous risk attitudes and privacy preferences using survey data from 24,899 respondents.
Jing Chen   +3 more
doaj   +1 more source

Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences

open access: yesInformation
While existing studies explore smartphone privacy setting risks for adolescents, they provide limited insight into the role of gender in these dynamics.
Yeslam Al-Saggaf, Julie Maclean
doaj   +1 more source

Is the Private Language Argument a Transcendental Argument? [PDF]

open access: yes, 2002
Comparisons between Kant´s critique of pure reason and Wittgenstein´s critique of language, which became current in analytic philosophy (Cf. e.g Hacker 1972, 30.) seem not far-fetched in view of the impetus for the destruction of dogmatic metaphysics ...
Mom, Karel
core  

PRIVACY PREFERENCES AND TRUST IN CENTRAL BANKS: HETEROGENEITY IN CASE OF CBDC

open access: yesФінансово-кредитна діяльність: проблеми теорії та практики
Broad societal uptake of Central Bank Digital Currency (CBDC) is contingent on both its design features and public confidence in the issuing central bank.
Віктор Козюк   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy