Results 21 to 30 of about 2,873,813 (294)

Privacy Protection and Secondary Use of Health Data: Strategies and Methods

open access: yesBioMed Research International, 2021
Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges.
Dingyi Xiang, Wei Cai
semanticscholar   +1 more source

DECONSTRUCTING NIGERIA’S DATA PROTECTION REGIME FROM CONSUMER PROTECTION PERSPECTIVE

open access: yesRevista de Direito, Estado e Telecomunicações, 2021
Purpose – The purpose of this paper is to make a case for the recognition of privacy and personal data protection as species of consumer rights in Nigeria in line with the revised United Nations Guidelines for Consumer Protection (UNGCP) by amending ...
Festus Okechukwu Ukwueze   +1 more
doaj   +1 more source

Data Security and Privacy Protection for Cloud Storage: A Survey

open access: yesIEEE Access, 2020
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar   +1 more source

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

open access: yesIEEE Access, 2021
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.
L. Malina   +9 more
semanticscholar   +1 more source

Online taxi users' optimistic bias: China youths' digital travel and information privacy protection

open access: yesFrontiers in Psychology, 2022
Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection.
Xiaoyang Meng, Bobo Feng
doaj   +1 more source

An Examination of Privacy Policies of US Government Senate Websites. [PDF]

open access: yes, 2010
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core   +2 more sources

Anonymous subject identification and privacy information management in video surveillance [PDF]

open access: yes, 2017
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro   +4 more
core   +1 more source

Paralinguistic Privacy Protection at the Edge

open access: yesACM Transactions on Privacy and Security, 2023
Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions.
Ranya Aloufi, Hamed Haddadi, David Boyle
openaire   +4 more sources

Between protection and disclosure: applying the privacy calculus to investigate the intended use of privacy-protecting tools and self-disclosure on different websites

open access: yesStudies in Communication, Media, 2021
Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the ...
Yannic Meier   +2 more
doaj   +1 more source

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

open access: yesIEEE Transactions on Information Forensics and Security, 2020
With an increasing number of cloud service providers (CSPs), research works on multi-cloud environments to provide solutions to avoid vendor lock-in and deal with the single-point failure problem have expanded considerably.
Jie Cui   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy