Results 91 to 100 of about 5,046,112 (378)
Recent studies suggest the expanding collection and use of big data by advertisers to target messages to consumers based on their location, demographics and online behaviors is escalating information privacy concerns and negatively impacting campaign ...
Nancy Howell Brinson, Matthew S. Eastin
doaj +1 more source
Privacy Policy Negotiation in Social Media [PDF]
Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users’ individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users’ privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either
Such, Jose M., Rovatsos, Michael
openaire +7 more sources
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy
Since more than 96 percent of mobile malware targets the Android platform, various techniques based on static code analysis or dynamic behavior analysis have been proposed to detect malicious apps.
Le Yu+4 more
semanticscholar +1 more source
In this study, a novel photothermal catalyst, Mn7Co3Ce1Ox has been developed, which features a type‐II heterojunction structure that enables broad‐spectrum absorption, including visible and infrared light. This material significantly enhances the photothermal catalytic efficiency by overcoming the limitations of traditional catalysts that struggle to ...
Niansi Li+9 more
wiley +1 more source
Disposition toward privacy and information disclosure in the context of emerging health technologies. [PDF]
ObjectiveWe sought to present a model of privacy disposition and its development based on qualitative research on privacy considerations in the context of emerging health technologies.Materials and methodsWe spoke to 108 participants across 44 interviews
Bloss, Cinnamon S+5 more
core +1 more source
The Overview of Privacy Labels and their Compatibility with Privacy Policies
Privacy nutrition labels provide a way to understand an app's key data practices without reading the long and hard-to-read privacy policies. Recently, the app distribution platforms for iOS(Apple) and Android(Google) have implemented mandates requiring app developers to fill privacy nutrition labels highlighting their privacy practices such as data ...
Khandelwal, Rishabh+3 more
openaire +2 more sources
Policy Privacy in Cryptographic Access Control [PDF]
Cryptographic access control offers selective access to encrypted data via a combination of key management and functionality-rich cryptographic schemes, such as attribute-based encryption. Using this approach, publicly available meta-data may inadvertently leak information on the access policy that is enforced by cryptography, which renders ...
Ferrara, Anna Lisa+3 more
openaire +4 more sources
This study uses a high‐resolution DNA methylation reference panel for 19 immune cell‐types, as well as transcriptomic, metabolomic, and large population cohort data to show that age‐related epigenetic heterogeneity within monocytes correlates with inflammaging, biological age, and all‐causemortality, and does so more strongly than existing monocyte ...
Xiaolong Guo+17 more
wiley +1 more source
Uma contravenção controvertida: reflexões acerca da tutela penal do jogo do bicho
This article is the result of an empirical research that brings together historical representations, ethnographic data collected in the field and theoretical and journalistic sources of the “jogo do bicho” ́s lottery, that explains the ...
Rômulo Bulgarelli Labronici+1 more
doaj +1 more source
Undoing of Privacy Policies on Facebook [PDF]
Facebook has a very flexible privacy and security policy specification that is based on intensional and extensional categories of user relationships. The former is fixed by Facebook but controlled by users whereas the latter is facilitated by Facebook with limited control to users.
Vishwas Patil, R. K. Shyamasundar
openaire +3 more sources