Results 31 to 40 of about 703,183 (313)

On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]

open access: yes, 2013
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea   +3 more
core   +1 more source

Impact of Users’ Comprehension of the Privacy Policy of FemTech Apps on their Information Disclosure Intentions: The Mediating Effects of Privacy Fatigue and Privacy Data Control [PDF]

open access: yesColombo Business Journal, 2023
FemTech stands for female technology, which encompasses a wide range of software, products, and services designed to improve women’s health through technology.
Neethu Mohan, K. A. Zakkariya
doaj   +1 more source

Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data [PDF]

open access: yes, 2019
When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain.
Dodero Beardo, Juan Manuel   +3 more
core   +2 more sources

Privacy, Software and Insurance

open access: yes, 2021
This paper deals with the use of software in insurance production and distribution considering the privacy issues that can arise. With regards to those uses, we will first consider the use of software in distribution that is needed to better perform the compliance with the regulations in insurance distribution (submission of information documents ...
openaire   +2 more sources

A qualitative study of stakeholders' perspectives on the social network service environment [PDF]

open access: yes, 2014
Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information.
Arazy O.   +48 more
core   +1 more source

A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution

open access: yesIEEE Access, 2018
As people have become more and more connected, there are certain scenarios where items need to be recommended to groups of users rather than individual user, which motivate studies on group recommender systems (GRSs).
Zhiwei Guo   +4 more
doaj   +1 more source

My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud [PDF]

open access: yes, 2011
Based on the assumption that cloud providers can be trusted (to a certain extent) we define a trust, security and privacy preserving infrastructure that relies on trusted cloud providers to operate properly.
Alhadeff, Joseph   +4 more
core   +3 more sources

Children's data and privacy online: Growing up in a digital age [PDF]

open access: yesPolitika nacionalne bezbednosti, 2023
Adolescents in the age of technology face a variety of security issues, but one of the most significant ones, that needs to be addressed by legislators, is privacy and data protection.
Domazet Siniša S.   +1 more
doaj   +1 more source

Retaining Expression on De-identified Faces [PDF]

open access: yes, 2017
© Springer International Publishing AG 2017The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents.
AK Ho   +18 more
core   +3 more sources

Embedding Privacy Into Design Through Software Developers: Challenges and Solutions [PDF]

open access: yesIEEE Security & Privacy, 2023
To be published in "IEEE Security & Privacy: Special Issue on Usable Security for Security Workers" 11 pages, 4 ...
Mohammad Tahaei   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy