intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Personal privacy

Xem 1-20 trên 71 kết quả Personal privacy
  • The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services.

    pdf4p longtimenosee06 27-03-2024 2 1   Download

  • Part 1 of ebook "A guide to forensic accounting investigation" provides readers with contents including: fraud - an introduction; psychology of the fraudster; the roles of the auditor and the forensic accounting investigator; auditor responsibilities and the law; when and why to call in forensic accounting investigators; internal audit - the second line of defense; teaming with forensic accounting investigators; anonymous communications; personal privacy and public disclosure;...

    pdf284p mocthanhdao0210 19-11-2023 8 3   Download

  • Ebook "Creating capable kids: Twelve skills that will help kids succeed in school and life" is based on the authors’ research, personal experiences, interviews and real life experiences. In order to protect privacy, names have been changed and identifying characteristics have been altered except for contributing experts. For purposes of simplifying usage, the pronouns his/her and s/he are sometimes used interchangeably.

    pdf305p dangsovu 20-10-2023 6 3   Download

  • In ebook "The driver in the driverless car: How our technology choices will create the future" breakthroughs such as personalized genomics, self-driving vehicles, drones, and artificial intelligence could make our lives healthier, safer, and easier. But the same technologies raise the specter of a frightening, alienating future: eugenics, a jobless economy, complete loss of privacy, and ever-worsening economic inequality.

    pdf156p dangsovu 20-10-2023 6 3   Download

  • Ebook "RFID handbook - Applications, technology, security and privacy" includes content: Physics and geometry of RFID, EPCglobal network, design automation for RFID tags and systems, contemporary RFID reader architecture, progress in RFID education, progress in RFID education, RFID reader synchronization, triage with RFID tags for massive incidents, RFID and NFC on mobile phones, privacy and personal information protection in RFID systems,... and other contents.

    pdf714p haojiubujain07 20-09-2023 8 4   Download

  • Ebook Security in distributed, grid, mobile, and pervasive computing: Part 1 includes contents: Chapter 1 security for content distribution networks — concepts, systems and research issues; chapter 2 key management and agreement in distributed systems; chapter 3 securing design patterns for distributed systems; chapter 4 pragmatic security for constrained wireless networks; chapter 5 authentication in wireless networks; chapter 6 intrusion detection in wireless sensor networks; chapter 7 false data detection and secure data aggregation in wireless sensor networks; chapter 8 privacy and anon...

    pdf217p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Security, privacy, and trust in modern data management: Part 1 includes contents: chapter 17 an introduction to digital rights management systems, chapter 18 copy protection systems, chapter 19 forensic watermarking in digital rights management, chapter 20 person-based and domain-based digital rights management, chapter 21 digital rights management interoperability, chapter 22 DRM for protecting personal content, chapter 23 enhancing privacy for digital rights management,… Please refer to the documentation for more details.

    pdf208p haojiubujain06 06-09-2023 7 4   Download

  • This article presents the journey to establish the right recognition, focuses on analysing the current legislation in protecting personal data, and challenges to effective protection of the right to data protection in Vietnam such as technological advancement in information technology, a need to balance between technology modernisation and public security, the effect of Asian values debate and Confucianism.

    pdf15p viberkshire 09-08-2023 3 3   Download

  • Chapter 13 - Managing technology and innovation. After studying this chapter you will be able to: Evaluating the growth in breaches of personal information privacy, understanding where these attacks come from and what their effects are, evaluating initiatives taken by government and business to minimize invasions of privacy, recognizing the emerging role and responsibilities of the organization’s chief information officer,…

    ppt17p haojiubujain04 27-07-2023 6 5   Download

  • Medical privacy policies, which are clear-cut for adults and young children, become ambiguous during adolescence. Yet medical organizations must establish unambiguous rules about patient and parental access to electronic patient portals. We conducted a national interview study to characterize the diversity in adolescent portal policies across a range of institutions and determine the factors influencing decisions about these policies.

    pdf10p visteverogers 24-06-2023 4 3   Download

  • In this work, we introduce a privacy technique for anonymizing clinical notes that guarantees all private health information is secured (including sensitive data, such as family history, that are not adequately covered by current techniques).

    pdf7p vighostrider 25-05-2023 6 3   Download

  • Privacy-related concerns can prevent equitable participation in health research by US Indigenous communities. However, studies focused on these communities’ views regarding health data privacy, including systematic reviews, are lacking.

    pdf12p vighostrider 25-05-2023 3 2   Download

  • Concerns regarding inappropriate leakage of sensitive personal information as well as unauthorized data use are increasing with the growth of genomic data repositories. Therefore, privacy and security of genomic data have become increasingly important and need to be studied. With many proposed protection techniques, their applicability in support of biomedical research should be well understood.

    pdf9p vighostrider 25-05-2023 4 2   Download

  • Genomic global positioning system (GPS) applies the multilateration technique commonly used in the GPS to genomic data. In the framework we present here, investigators calculate genetic distances from their samples to reference samples, which are from data held in the public domain, and share this information with others.

    pdf5p vielonmusk 30-01-2022 14 0   Download

  • To alleviate financial consumer vulnerability, it should be approached from both objective and subjective sides. Specifically, it necessitates the enhancement in consumer financial literacy, and the collaboration of financial organisations.

    pdf12p visteveballmer 06-11-2021 22 0   Download

  • The current and future applications of genomic data may raise ethical and privacy concerns. Processing and storing of this data introduce a risk of abuse by potential offenders since the human genome contains sensitive personal information. For this reason, we have developed a privacy-preserving method, named Varlock providing secure storage of sequenced genomic data. We used a public set of population allele frequencies to mask the personal alleles detected in genomic reads.

    pdf13p vilarryellison 29-10-2021 9 1   Download

  • This article thus focused on demonstrating some risks that may happen to those who carry medical implantable devices to suggest some solutions to overcome the modern business dilemma situation of: securing the health of patients while protecting their privacy.

    pdf6p vivelvet2711 17-09-2021 14 1   Download

  • In this paper, a solution for privacy preservation and data security is presented. Privacy over the internet can be defined as the ability to decide what information one discloses or withholds about a person over the internet, who can access such information and for what reason a person’s information may or may not be accessed.

    pdf4p phanngocminhtam 14-09-2021 15 4   Download

  • The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the ‘‘Internet of Things.’’ Standards are evolving for all of these potentially connected systems.

    pdf7p kethamoi1 17-11-2019 51 4   Download

  • This study extends a post-adoption model on habit and IS continuance to investigate the effect of personalization (which includes personal content management, personal time management and privacy control) on learning system continuance. Empirical results suggest that personalization has a positive influence on perceived usefulness and habit, but does not directly influence continuance intention. The results of the case study indicate consistently that there is a need to archive and re-access past course materials with personalized content, but different constraints (e.g.

    pdf17p quenchua1 06-11-2019 15 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2