Results 91 to 100 of about 667,722 (335)

Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems

open access: yesIEEE Access, 2017
Crowdsourcing activities, carrying out large-scale tasks via wisdoms of crowds, are widely used in practice. However, it is hard for users to find tasks that are suitable for them.
Zhiwei Guo   +6 more
doaj   +1 more source

An investigation into the feasibility and efficacy of stereotactic radiosurgery for 1–3 cm single brain lesions on the ring‐mounted Halcyon LINAC

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood   +5 more
wiley   +1 more source

Money for Nothing and Privacy for Free? [PDF]

open access: yes, 2011
Privacy in the context of ubiquitous social computing systems has become a major concern for the society at large. As the number of online social computing systems that collect user data grows, this privacy threat is further exacerbated.
Kaiser, Gail E.   +2 more
core   +2 more sources

Data Security and Privacy in Cloud Computing

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun   +3 more
doaj   +1 more source

Why developers cannot embed privacy into software systems? An empirical investigation [PDF]

open access: yes22nd International Conference on Evaluation and Assessment in Software Engineering, 2018, 2018
Pervasive use of software applications continues to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear in- structions for software developers to embed privacy into software designs, those practices are yet to become a common practice among software developers.
arxiv  

A Foundation for Requirements Analysis of Privacy Preserving Software [PDF]

open access: yes, 2012
Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still ...
Beckers, Kristian, Heisel, Maritta
openaire   +3 more sources

Towards better understanding of factors contributing to medical physicist well‐being in academic medical centers: A systems‐analysis approach

open access: yesJournal of Applied Clinical Medical Physics, EarlyView.
Abstract The well‐being of medical physicists can impact overall system performance, patient safety, and quality of patient care. There are limited formal assessments of factors contributing to physicists well‐being. Nine medical physicists at a US academic medical center were surveyed on 21 workplace factors, drawn from the National Academy of ...
Elizabeth Kwong   +13 more
wiley   +1 more source

Why are Developers Struggling to Put GDPR into Practice when Developing Privacy-Preserving Software Systems? [PDF]

open access: yesUSENIX Symposium on Usable Privacy and Security (SOUPS) 2020. August 9 -- 11, 2020, Boston, MA, USA, 2020
The use of software applications is inevitable as they provide different services to users. The software applications collect, store users' data, and sometimes share with the third party, even without the user consent. One can argue that software developers do not implement privacy into the software applications they develop or take GDPR (General Data ...
arxiv  

Privacy Explanations - A Means to End-User Trust [PDF]

open access: yesarXiv, 2022
Software systems are ubiquitous, and their use is ingrained in our everyday lives. They enable us to get in touch with people quickly and easily, support us in gathering information, and help us perform our daily tasks. In return, we provide these systems with a large amount of personal information, often unaware that this is jeopardizing our privacy ...
arxiv  

Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories

open access: yesIEEE Access
Privacy requirements engineering acts as a role to systematically elicit privacy requirements from system requirements and legal requirements such as the GDPR.
Guntur Budi Herwanto   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy