Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Ever since the evolution of banking, there have always been a number of unscrupulous individuals who have tried to breach its defenses in order to gain access to valuables. In the course of time, the physical attacks have become slowly... more
    • by 
    •   2  
      Social EngineeringInformation Privacy and Security
Internet Privacy and Myths Third Edition 2016
    • by 
    •   33  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
The paper lays out a roadmap for implementing privacy principles in an enterprise content management implementation.
    • by 
    •   8  
      PrivacyInformation EthicsPrivacy and data protectionData Privacy
Privacy is currently at the centre of a fierce battle. On one side, powerful data companies like Google, Facebook, and major data brokers are collecting and analysing as much personal data as they can. They are lobbying governments around... more
    • by 
    •   15  
      Artificial IntelligenceEthicsPrivacyInformation Ethics
    • by 
    •   40  
      Information SecurityDatabase SystemsPrivacyNetwork Security
There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major... more
    • by 
    • Information Privacy and Security
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
From the time when the life span of our Great Grand Fathers and Mothers Generations, a lot has been said about privacy. The ability to share information and communicate freely using Information and Communication Technology is vital to the... more
    • by 
    •   9  
      PrivacyTanzanian StudiesTanzaniaInformation Security and Privacy
The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the... more
    • by  and +1
    •   165  
      PhilosophyPolitical PhilosophyFree Will, Moral ResponsibilityDigital Divide
The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the... more
    • by  and +1
    •   300  
      BusinessInformation SystemsManagementRisk Management and Insurance
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in... more
    • by 
    •   3  
      Network SecurityCryptographyInformation Privacy and Security
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
    • by 
    •   32  
      PrivacyOnline CommunitiesOnline EducationOnline social networks
Amidst rapid urban development, sustainable transportation solutions are required to meet the increasing demands for mobility whilst mitigating the potentially negative social, economic, and environmental impacts. This study analyses... more
    • by  and +1
    •   218  
      Information SystemsRisk Management and InsuranceTransportation EngineeringInformation Science
Security concern has become the biggest obstacle to adoption of cloud because all information and data are completely under the control of cloud service providers. To provide optimal services on cloud, this paper introduces a new... more
    • by 
    •   26  
      Computer ScienceComputer EngineeringNetwork SecurityComputer Networks
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more
    • by 
    •   39  
      Risk Management and InsuranceLawCriminal LawConstitutional Law
Recently we have witnessed the worldwide adoption of many different types of innovative technologies, such as crowdsourcing, ridesharing, open and big data, aiming at delivering public services more efficiently and effectively. Among... more
    • by  and +1
    •   252  
      ManagementRisk Management and InsuranceInformation TechnologyPolicy Analysis/Policy Studies
The phenomenon of quantification and translating all elements of reality into data, in order to make them subject to aggregation and algorithmization, Viktor Mayer-Schonberger and Kenneth Cukier call datafication. This article will... more
    • by 
    •   7  
      PrivacyQuantificationBig DataInformation Privacy and Security
This paper aims to provide enhancements in the privacy preserving model that was published in our previous paper entitled "An Effective Privacy Preserving Model for Databases Using (α, β, k) - Anonymity Model and Lossy Join" [1]. The... more
    • by 
    •   11  
      Information SystemsComputer ScienceInformation TechnologyInformation Security
Aula para o Programa de Pós-graduação em Direito - Mestrado, da UNISC - Universidade de Santa Cruz do Sul, RS, Brasil. Dia 30 de agosto de 2019.
    • by 
    •   20  
      Information SecurityPrivacyPERSONAL DATA PROTECTIONEuropean Union Law
Few would deny that monitoring employees is a necessary part of doing business. The very act of paying someone for services would necessitate, in a competitive environment, that the product produced or time spent working be observed.... more
    • by 
    •   15  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
    • by 
    •   5  
      Computer ScienceNetwork SecurityCryptographyInformation Privacy and Security
    • by 
    •   31  
      Information SecurityInternet SecurityInformation Security, Assurance and AuditInformation Security and Privacy
    • by 
    •   15  
      PrivacyImmigrationImmigration LawFederalism
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in... more
    • by 
    •   5  
      Computer ScienceNetwork SecurityCryptographyInformation Privacy and Security
Spațiul cibernetic se caracterizează prin anonimat, dinamism și lipsa frontierelor. Acest lucru generează atât oportunități de dezvoltare a societății informaționale, cât și riscuri la adresa funcționării acesteia la nivel individual,... more
    • by 
    •   5  
      Information SecurityIntegrityConfidentialityInformation Privacy and Security
Ever since the evolution of banking, there have always been a number of unscrupulous individuals who have tried to breach its defenses in order to gain access to valuables. In the course of time, the physical attacks have become slowly... more
    • by 
    •   2  
      Social EngineeringInformation Privacy and Security
In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password authentication... more
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyInformation System Security
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important... more
    • by 
    •   7  
      Mobile LearningSecurityInformation Security and PrivacyMobile Game-based Learning
Le tecnologie dell’informazione e della comunicazione modulano gran parte della vita quotidiana dell’uomo del XXI secolo. Tali tecnologie, insieme a innumerevoli vantaggi, hanno portato con sé una sfida alla privacy così come eravamo... more
    • by 
    •   20  
      PrivacyLiberalismSurveillance StudiesDemocracy
FACEBOOK PRIVACY VIOLATION SCANDAL IN BROADER CONTEXT May -10-2018 In April, the CEO of Facebook, Mark Zuckerberg, testified in Congress about the alleged user privacy violations that occurred at Facebook. Several weeks later,Cambridge... more
    • by 
    •   20  
      Information SecurityPrivacyNetwork SecuritySecurity
<br>Password authentication with smart card is one of the simplest and efficient authentication mechanisms to ensure secure communication over insecure network environments. Recently, Tsai et al. proposed an improved password... more
    • by 
    •   18  
      Information SecurityInformation Security AuditingInformation Security and PrivacyInformation System Security
Plusieurs expériences menées par des chercheurs et journalistes prouvent que nos smartphones nous espionnent. Si la permanence de cette écoute ne peut être établie avec assurance, cela pose de gros problèmes de protection de la vie privée.
    • by 
    •   27  
      PrivacyHomeland SecurityNational Security CultureNational Security Law
In this paper I will argue that establishing and maintaining practices promoting privacy and accountability will typically trump security concerns. While it is true that in specific instances security may outweigh privacy, this is not... more
    • by 
    •   10  
      PrivacyRFID Security and PrivacyInformation Security and PrivacyPrivacy (Law)
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- commerce. This paper explores the problems for... more
    • by 
    •   6  
      Computer ScienceConsentInformation Privacy and SecurityE-Commerce
I have argued elsewhere that individuals have moral privacy rights that limit the surveillance activities of governments. While not absolute, privacy rights shield individuals from the prying eyes and ears of neighbors, corporations, and... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Today business environment is highly dependent on complex technologies, and information is considered an important asset. Organizations are therefore required to protect their information infrastructure and follow an inclusive risk... more
    • by 
    •   18  
      Information SecurityMobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.Information Security CultureInformation Privacy and Security
The author deals with the issues of the right to privacy and the right to anonymity in the framework of freedom and security. In this regard, the author gives definitions and characteristics of privacy and anonymity, indicating the... more
    • by 
    •   32  
      Information SecurityHuman Rights LawHuman RightsPrivacy
    • by 
    •   16  
      Computer ScienceInformation SecurityEconomics of SecurityPrivacy
This submission seeks to respond to the terms of reference raised by Parliamentary Joint Committee on Intelligence and Security in its Review of the Mandatory Data Retention Regime prescribed by Part 5-1A of the Telecommunications... more
    • by 
    •   9  
      PrivacyMetadataInformation Security and PrivacyData Privacy
The Internet today connects about 40% of the world population. Half of these are living outside the advanced economies, often in some countries that are quickly climbing the developmental ladder, with diverse populations and inarguable... more
    • by 
    •   27  
      SecuritySocial Networking Security and PrivacyMobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.Data Security and Privacy Policy
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy,... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Pervasive computing is the third wave in IT, after the PC and the Internet and is based on the use of numerous “invisible”, omni-present, always-on, communicating computers embedded into everyday environments which gather personal... more
    • by  and +1
    •   53  
      Sensors and SensingInformation SocietyHuman RightsPrivacy
Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important... more
    • by 
    •   8  
      Distributed ComputingMobile LearningSecurityInformation Security and Privacy
Dans les processus logistiques, de nombreuses organisations (publiques et privees) sont impliquees, et chacune a potentiellement son propre outil de gestion de chaine logistique (Supply Chain Management). Cependant, elles sont amenees a... more
    • by 
    •   7  
      Supply Chain ManagementPolitical ScienceThe Internet of ThingsInternet of Things
9th International Conference of Managing Information Technology (CMIT 2021) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of information technology and... more
    • by 
    •   7  
      Information TechnologyInformation Communication TechnologyInformation Security and PrivacyComputer and Information Technology
Il 15 ottobre 2019 si è tenuto un interessante confronto presso il Parlamento UE, organizzato dal Supervisore europeo (EDPS) e dall'Osservatorio679, ​ sul tema dei modelli di certificazione ai sensi del GDPR​ , nel contesto del principio... more
    • by 
    •   16  
      PrivacyCommunication Privacy ManagementInformation Security and PrivacyPrivacy (Law)
    • by 
    •   12  
      Information SecurityPrivacyNetwork SecurityComputer Networks
    • by 
    •   20  
      BusinessInformation ManagementPrivacyCommunication Privacy Management
    • by 
    •   5  
      Computer ScienceNetwork SecurityCryptographyInformation Privacy and Security