Results 91 to 100 of about 667,722 (335)
Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems
Crowdsourcing activities, carrying out large-scale tasks via wisdoms of crowds, are widely used in practice. However, it is hard for users to find tasks that are suitable for them.
Zhiwei Guo+6 more
doaj +1 more source
Abstract Purpose An evaluation of the accuracy, safety, and efficiency of the Halcyon ring delivery system (RDS) for stereotactic radiosurgery (SRS) treatment to relatively small (1–3 cm) brain lesions. Methods After completing the extensive in‐house quality assurance checks including Winston–Lutz test and independent dose verification via MD Anderson ...
Kate Hazelwood+5 more
wiley +1 more source
Money for Nothing and Privacy for Free? [PDF]
Privacy in the context of ubiquitous social computing systems has become a major concern for the society at large. As the number of online social computing systems that collect user data grows, this privacy threat is further exacerbated.
Kaiser, Gail E.+2 more
core +2 more sources
Data Security and Privacy in Cloud Computing
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe.
Yunchuan Sun+3 more
doaj +1 more source
Why developers cannot embed privacy into software systems? An empirical investigation [PDF]
Pervasive use of software applications continues to challenge user privacy when users interact with software systems. Even though privacy practices such as Privacy by Design (PbD), have clear in- structions for software developers to embed privacy into software designs, those practices are yet to become a common practice among software developers.
arxiv
A Foundation for Requirements Analysis of Privacy Preserving Software [PDF]
Privacy requirements are difficult to elicit for any given software engineering project that processes personal information. The problem is that these systems require personal data in order to achieve their functional requirements and privacy mechanisms that constrain the processing of personal information in such a way that the requirement still ...
Beckers, Kristian, Heisel, Maritta
openaire +3 more sources
Abstract The well‐being of medical physicists can impact overall system performance, patient safety, and quality of patient care. There are limited formal assessments of factors contributing to physicists well‐being. Nine medical physicists at a US academic medical center were surveyed on 21 workplace factors, drawn from the National Academy of ...
Elizabeth Kwong+13 more
wiley +1 more source
Why are Developers Struggling to Put GDPR into Practice when Developing Privacy-Preserving Software Systems? [PDF]
The use of software applications is inevitable as they provide different services to users. The software applications collect, store users' data, and sometimes share with the third party, even without the user consent. One can argue that software developers do not implement privacy into the software applications they develop or take GDPR (General Data ...
arxiv
Privacy Explanations - A Means to End-User Trust [PDF]
Software systems are ubiquitous, and their use is ingrained in our everyday lives. They enable us to get in touch with people quickly and easily, support us in gathering information, and help us perform our daily tasks. In return, we provide these systems with a large amount of personal information, often unaware that this is jeopardizing our privacy ...
arxiv
Leveraging NLP Techniques for Privacy Requirements Engineering in User Stories
Privacy requirements engineering acts as a role to systematically elicit privacy requirements from system requirements and legal requirements such as the GDPR.
Guntur Budi Herwanto+2 more
doaj +1 more source