Results 241 to 250 of about 121,345 (302)
The law of data (privacy) protection: a comparative and theoretical study
Anneliese Roos
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Nature Reviews Genetics, 2001
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to ...
P A, Roche, G J, Annas
openaire +2 more sources
This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to ...
P A, Roche, G J, Annas
openaire +2 more sources
Privacy, Patience, and Protection
SSRN Electronic Journal, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Ronen Gradwohl, Rann Smorodinsky
openaire +1 more source
Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017
Cloud computing services have gained a lot of attraction in the recent years, but the shift of data from user-owned desktops and laptops to cloud storage systems has led to serious data privacy implications for the users. Even though privacy notices supplied by the cloud vendors details the data practices and options to protect their privacy, the ...
Surya Karunagaran +2 more
openaire +1 more source
Cloud computing services have gained a lot of attraction in the recent years, but the shift of data from user-owned desktops and laptops to cloud storage systems has led to serious data privacy implications for the users. Even though privacy notices supplied by the cloud vendors details the data practices and options to protect their privacy, the ...
Surya Karunagaran +2 more
openaire +1 more source
2022
The technical report consists of a review of literature on modern Wordle solving methods and seeks to extend computer science principles taught by the Department of Computer Science at the University of Virginia in an effort to solve Wordle puzzles efficiently. This technical report is unrelated to the STS portion of this paper. In the STS portion,
openaire +1 more source
The technical report consists of a review of literature on modern Wordle solving methods and seeks to extend computer science principles taught by the Department of Computer Science at the University of Virginia in an effort to solve Wordle puzzles efficiently. This technical report is unrelated to the STS portion of this paper. In the STS portion,
openaire +1 more source
Privacy policy Improvements to Protect Children Privacy
2011The achievement of an adequate level of privacy protection is a demanding objective, especially for new technologies. One relatively new but increasing class of users of Internet related services consists of children and young people. However, if Internet services can improve social skills and widen the knowledge minors have, it could open the doors to
openaire +2 more sources
ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2019
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Chau Yi Li +4 more
openaire +1 more source
Images shared on social media are routinely analysed by classifiers for content annotation and user profiling. These automatic inferences reveal to the service provider sensitive information that a naive user might want to keep private. To address this problem, we present a method designed to distort the image data so as to hinder the inference of a ...
Chau Yi Li +4 more
openaire +1 more source

