Results 31 to 40 of about 2,896,645 (370)

Privacy protection methods of location services in big data

open access: yesOpen Computer Science, 2022
The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure.
Liu Wenfeng, Wu Juanjuan, Xi Zhong
doaj   +1 more source

A two‐stage privacy protection mechanism based on blockchain in mobile crowdsourcing

open access: yesInternational Journal of Intelligent Systems, 2021
With the rise of the Internet of Things (IoT) and fifth‐generation (5G) networks, which have led to a surge in data processing and increased data transfer time, traditional cloud computing could no longer meet the needs of workers, so edge computing has ...
Zice Sun   +5 more
semanticscholar   +1 more source

Privacy in (mobile) telecommunications services [PDF]

open access: yes, 2005
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den   +4 more
core   +1 more source

Data Security and Privacy Protection for Cloud Storage: A Survey

open access: yesIEEE Access, 2020
The new development trends including Internet of Things (IoT), smart city, enterprises digital transformation and world’s digital economy are at the top of the tide.
Pan Yang, N. Xiong, Jingli Ren
semanticscholar   +1 more source

Privacy Protection and Secondary Use of Health Data: Strategies and Methods

open access: yesBioMed Research International, 2021
Health big data has already been the most important big data for its serious privacy disclosure concerns and huge potential value of secondary use. Measurements must be taken to balance and compromise both the two serious challenges.
Dingyi Xiang, Wei Cai
semanticscholar   +1 more source

Technology, privacy and identity: a Hong Kong perspective [PDF]

open access: yes, 2008
This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial
Wong, R, Yap, JL
core   +1 more source

DECONSTRUCTING NIGERIA’S DATA PROTECTION REGIME FROM CONSUMER PROTECTION PERSPECTIVE

open access: yesRevista de Direito, Estado e Telecomunicações, 2021
Purpose – The purpose of this paper is to make a case for the recognition of privacy and personal data protection as species of consumer rights in Nigeria in line with the revised United Nations Guidelines for Consumer Protection (UNGCP) by amending ...
Festus Okechukwu Ukwueze   +1 more
doaj   +1 more source

Paralinguistic Privacy Protection at the Edge

open access: yesACM Transactions on Privacy and Security, 2023
Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions.
Ranya Aloufi, Hamed Haddadi, David Boyle
openaire   +4 more sources

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

open access: yesIEEE Access, 2021
As we move into a new decade, the global world of Intelligent Infrastructure (II) services integrated into the Internet of Things (IoT) are at the forefront of technological advancements.
L. Malina   +9 more
semanticscholar   +1 more source

Online taxi users' optimistic bias: China youths' digital travel and information privacy protection

open access: yesFrontiers in Psychology, 2022
Digital travel platforms not only provided people with convenient travel but also raised a series of problems regarding information privacy protection.
Xiaoyang Meng, Bobo Feng
doaj   +1 more source

Home - About - Disclaimer - Privacy