Results 21 to 30 of about 2,873,813 (294)
Privacy Protection and Secondary Use of Health Data: Strategies and Methods
Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges.
Dingyi Xiang, Wei Cai
semanticscholar +1 more source
DECONSTRUCTING NIGERIA’S DATA PROTECTION REGIME FROM CONSUMER PROTECTION PERSPECTIVE
Purpose – The purpose of this paper is to make a case for the recognition of privacy and personal data protection as species of consumer rights in Nigeria in line with the revised United Nations Guidelines for Consumer Protection (UNGCP) by amending ...
Festus Okechukwu Ukwueze+1 more
doaj +1 more source
Data Security and Privacy Protection for Cloud Storage: A Survey
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar +1 more source
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.
L. Malina+9 more
semanticscholar +1 more source
Online taxi users' optimistic bias: China youths' digital travel and information privacy protection
Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection.
Xiaoyang Meng, Bobo Feng
doaj +1 more source
An Examination of Privacy Policies of US Government Senate Websites. [PDF]
US Government websites are rapidly increasing the services they offer, but users express concerns about their personal privacy protection. To earn user's trust, these sites must show that personal data is protected, and the sites contain explicit privacy
Kuzma, Joanne
core +2 more sources
Anonymous subject identification and privacy information management in video surveillance [PDF]
The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection.
Barni, Mauro+4 more
core +1 more source
Paralinguistic Privacy Protection at the Edge
Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions.
Ranya Aloufi, Hamed Haddadi, David Boyle
openaire +4 more sources
Using privacy-protecting tools and reducing self-disclosure can decrease the likelihood of experiencing privacy violations. Whereas previous studies found people’s online self-disclosure being the result of privacy risk and benefit perceptions, the ...
Yannic Meier+2 more
doaj +1 more source
With an increasing number of cloud service providers (CSPs), research works on multi-cloud environments to provide solutions to avoid vendor lock-in and deal with the single-point failure problem have expanded considerably.
Jie Cui+4 more
semanticscholar +1 more source