Results 11 to 20 of about 190,686 (266)

VloGraph: A Virtual Knowledge Graph Framework for Distributed Security Log Analysis

open access: yesMachine Learning and Knowledge Extraction, 2022
The integration of heterogeneous and weakly linked log data poses a major challenge in many log-analytic applications. Knowledge graphs (KGs) can facilitate such integration by providing a versatile representation that can interlink objects of interest ...
Kabul Kurniawan   +5 more
doaj   +1 more source

Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]

open access: yesColombo Business Journal, 2023
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj   +1 more source

Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance. [PDF]

open access: yesPLoS ONE, 2012
Medical devices increasingly depend on computing functions such as wireless communication and Internet connectivity for software-based control of therapies and network-based transmission of patients' stored medical information.
Daniel B Kramer   +6 more
doaj   +1 more source

A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution

open access: yesIEEE Access, 2018
As people have become more and more connected, there are certain scenarios where items need to be recommended to groups of users rather than individual user, which motivate studies on group recommender systems (GRSs).
Zhiwei Guo   +4 more
doaj   +1 more source

Children's data and privacy online: Growing up in a digital age [PDF]

open access: yesPolitika nacionalne bezbednosti, 2023
Adolescents in the age of technology face a variety of security issues, but one of the most significant ones, that needs to be addressed by legislators, is privacy and data protection.
Domazet Siniša S.   +1 more
doaj   +1 more source

Computer-Aided Identification and Validation of Privacy Requirements

open access: yesInformation, 2016
Privacy is a software quality that is closely related to security. The main difference is that security properties aim at the protection of assets that are crucial for the considered system, and privacy aims at the protection of personal data that are ...
Rene Meis, Maritta Heisel
doaj   +1 more source

OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python

open access: yesSoftwareX, 2023
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole   +5 more
doaj   +1 more source

A Systematic Mapping Study on Privacy by Design in Software Engineering

open access: yesCLEI Electronic Journal, 2019
Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their ...
Miguel Ehecatl Morales-Trujillo   +3 more
doaj   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

Looking Back to Move Forward: A Bibliometric Analysis of Consumer Privacy Research

open access: yesJournal of Theoretical and Applied Electronic Commerce Research, 2021
Information privacy has attracted considerable attention in the information system research field. However, little effort has been made to review its latest developments from a marketing perspective.
Sheng Shu, Yi Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy