• No results found

[PDF] Top 20 Data Privacy: An End-User Perspective

Has 10000 "Data Privacy: An End-User Perspective" found on our website. Below are the top 20 most common "Data Privacy: An End-User Perspective".

Data Privacy: An End-User Perspective

Data Privacy: An End-User Perspective

... According to Experian Marketing Services [10], 27% of the time spent online is on social networking, which is more than any other online activity. By their very nature, those websites aggregate, classify and collect ... See full document

14

The Use of Privacy Data by Fitness Applications, a User Point of View

The Use of Privacy Data by Fitness Applications, a User Point of View

... about privacy usage of fitness apps, but do these users even know about the fact that applications have these functions? Therefore, it could be wise to indicate how users of apps in general perceive security and ... See full document

12

A framework for usable end-user privacy control in social software systems

A framework for usable end-user privacy control in social software systems

... 6: Privacy mechanisms must allow definition of groups that reflect interpersonal ...of privacy: they want to be visible and searchable for their friends but not their ...real-life privacy boundaries ... See full document

19

Big data privacy: a technological perspective and review

Big data privacy: a technological perspective and review

... evidence data to get a continuous or discrete number, referred to as a trust ...preserve privacy in trust evalu- ...the privacy preservation and evaluation result sharing among various ...the ... See full document

25

A Survey and Cost Classification of Big Data Analytics and Decision Tools

A Survey and Cost Classification of Big Data Analytics and Decision Tools

... big data analytic tools, although not the whole list of existing tools that cannot be ...big data analytics tool, the remaining twenty-six(26) are licensed commercial big data analytics ...big ... See full document

16

A survey on preserving user data privacy on location based services

A survey on preserving user data privacy on location based services

... the user authentication data; the handsets themselves are the computing ...authenticated end-to-end encrypted communications in mobile phone networks: the handsets act as the authentication ... See full document

5

Demystifying User Data Privacy in the World of IOT

Demystifying User Data Privacy in the World of IOT

... the perspective of user data protection is a very crucial self-test which is required for IoT ...and privacy are used interchangeably, but in the IoT environment, both these concept would play ... See full document

7

The effect of privacy salience on end user behaviour: An experimental approach based on the theory of planned behaviour

The effect of privacy salience on end user behaviour: An experimental approach based on the theory of planned behaviour

... of privacy and participants may act differently if they are outside of that ...such user-oriented ...the privacy information ...for privacy recommender and personalisation ...specific ... See full document

248

BST MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System

BST MRPAS: Binary Search Tree based Multi Replica for Public Cloud Auditing System

... store data and use on-demand applications and ...local data storage and reduce the maintenance cost by outsourcing data to the ...outsourced data is not always trustworthy due to the loss of ... See full document

5

Developing an End User Data Capture Methodology

Developing an End User Data Capture Methodology

... The aim of this research is to establish the extent to which end user requirements are communicated throughout the construction process. The method of inquiry is purely literature based. This research ... See full document

13

Web Search Query Privacy, an End User Perspective

Web Search Query Privacy, an End User Perspective

... Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search ...of user intent remains ...query privacy procedures involve the ... See full document

19

Are workplace end-user computing skills at a desirable level? A New Zealand perspective

Are workplace end-user computing skills at a desirable level? A New Zealand perspective

... Although word-processing applications include advanced text editing and referencing features, the tasks performed using this software are mostly at a basic text editing and formatting level. Grant et al. (2009) and ... See full document

13

SECURE KEY-PATHWAY TO PROTECT CLOUD DATA

SECURE KEY-PATHWAY TO PROTECT CLOUD DATA

... otherwise privacy-relevant data is concerned. These privacy implications primarily stem from the in-Transparency of the involved backend providers of a cloud-based service and their dedicated ... See full document

5

Composite Service Oriented Minimum Privacy Disclosure Method

Composite Service Oriented Minimum Privacy Disclosure Method

... satisfy user functional requirements. To assure user privacy information not being disclosed, using the user minimum privacy data set when providing application, is a research ... See full document

11

Privacy Risks of Sensitive User Data Exposure in Mobile Ecosystems.

Privacy Risks of Sensitive User Data Exposure in Mobile Ecosystems.

... requested data does not align with the app’s ...the data to send to advertisers and disclose this purpose to users, while others request it to search for ... See full document

162

A Collusion-Resistant Privacy-Preserving Attribute Matchmaking For Mobile Social Networks

A Collusion-Resistant Privacy-Preserving Attribute Matchmaking For Mobile Social Networks

... users’ data and increasing their confidence in data privacy has become a real ...describe privacy of user information differently. In this paper, privacy will be defined as ... See full document

11

openLEON: An End-to-End Emulation Platform from the Edge Data Center to the Mobile User

openLEON: An End-to-End Emulation Platform from the Edge Data Center to the Mobile User

... last experiment consists in running from 2 regular Mininet hosts, 50 parallel TCP iperf sessions for 1 minute. Please note that each host is both client and server at the same time, hence a total of 100 connections are ... See full document

24

The CP-ABE with Verifiable Outsourced Decryption Approach With user Privilege Control

The CP-ABE with Verifiable Outsourced Decryption Approach With user Privilege Control

... grained data access control for cloud storage ...by data owners rather than by cloud ...and data owners are not required to be online all the ...the user whose attributes satisfy the access ... See full document

6

The Role of Dialogic Teaching in Fostering Critical Literacy in an Urban High School English Classroom

The Role of Dialogic Teaching in Fostering Critical Literacy in an Urban High School English Classroom

... collects user data from social media plat- forms, for performing business analysis or providing ...to privacy concern, the users do not want to release their sensitive data to third-party ... See full document

114

An Efficient Privacy Preserved Personalized Web Search Model using Fully Homomorphic Encryption

An Efficient Privacy Preserved Personalized Web Search Model using Fully Homomorphic Encryption

... the user information need, looks up its index structure of documents, and returns a ranked list of search results to the client for a user to ...inferred user preferences after receiving the search ... See full document

6

Show all 10000 documents...