Academic literature on the topic 'Intermediary of of personal information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intermediary of of personal information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Intermediary of of personal information"

1

Asunka, Anna. "Internet Service Providers and Intermediary Liabilities." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 113–18. http://dx.doi.org/10.22624/aims/crp-bk3-p19.

Full text
Abstract:
Just as the provision of goods in the physical world necessitates the involvement of numerous entities that act as intermediaries, the internet supply chain involves several online intermediaries that provide the infrastructure via which customers can exchange information. These can include but are not limited to, telecom and internet service providers, web hosting, Internet search engines, social networking, instant messaging, and so on. It is now impossible to consider life without the internet. The internet, which connects billions of people globally, is a key pillar of the modern information society for creating and trading material. The way we connect and share information has changed, with many negative consequences, and it's not every day that intermediaries are neutral. The judicial process has continued to shape and solidify legislation relating to intermediaries over the years. In India section 79, of the Information technology Act, 2000 governs intermediaries (service providers), under this law no person providing any service as a network service provider shall be liable, rules or regulations made thereunder for any third-party information or data made available by him if he proves that the offense or contravention was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offense or contravention(the information technology act, 2000, 2000). In 2017, UNESCO published the book “Fostering Freedom Online: The Role of Internet Intermediaries”. It aimed to shed light on how internet intermediaries both foster and restrict freedom of expression across a range of jurisdictions, circumstances, technologies, and business models. (MacKinnon Rebecca et al., 2015). In Ghana, the (Data Protection Act, 2012) was borne by the constitution to protect the privacy of the individual and personal data by regulating the processing of personal information, providing the process to obtain, hold, use or disclose personal information, and for related matters. Serving as a check to these internet intermediaries. In the (electronic transactions act, 2008 (ACT 772)), section 90 is dedicated to the Liability of service providers and intermediaries. “Liability” means that intermediaries must prevent the occurrence of unlawful or harmful activity by users of their services. Failure to do so may result in legal orders compelling the intermediary to act or expose the intermediary to civil or criminal legal action (APC). Keywords: intermediaries, Internet Service Providers, liable, jurisdictions, internet BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Anna Asunka (2022): Internet Service Providers and Intermediary Liabilities Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 113-118 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P19
APA, Harvard, Vancouver, ISO, and other styles
2

Marotta, Veronica, Yue Wu, Kaifu Zhang, and Alessandro Acquisti. "The Welfare Impact of Targeted Advertising Technologies." Information Systems Research 33, no. 1 (March 2022): 131–51. http://dx.doi.org/10.1287/isre.2021.1024.

Full text
Abstract:
We analyze the welfare implications of consumer data sharing, and restrictions to that sharing, in the context of online targeted advertising. Targeting technologies offer firms the ability to reach desired audiences through intermediary platforms. The platforms run auctions in real time to display ads on internet sites, leveraging consumers’ personal information collected online to personalize the ads. The online advertising industry posits that targeted advertising benefits advertising firms (that is, merchants who want to target ads to the desired consumers), consumers who see ads for preferred products, and the intermediary platforms that match consumers with firms. However, the claims that targeted advertising benefits all players involved have not been fully vetted in the literature. We develop an analytical model to analyze the economic and welfare implications of targeting technologies for those three players under alternative consumer information regimes. The regimes differ in the type and amount of consumer data available to the intermediary and to the advertising firms, and reflect the presence or absence of technological or regulatory restrictions to personal information flows. We find evidence of incentive misalignment among the players, as the intermediary prefers to share only a subset of consumer information with firms, whereas advertising firms prefer having complete information about the consumers. As such, a strategic intermediary with the ability to control which information is shared during the auction can have an incentive to use only the information that maximizes its payoff, overlooking the interests of both advertising firms and consumers. The information regimes that maximize consumer welfare vastly differ depending on consumers’ heterogeneity along two dimensions: a horizontal dimension, capturing consumer’s heterogeneity in product preferences; and a vertical dimension, capturing consumers’ heterogeneity in purchase power. Consumers prefer none of their personal information to be used for targeting only in limited circumstances. Otherwise, consumers are either indifferent or prefer only specific types of information to be used for targeting.
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Robert S. "Question-Negotiation and Information Seeking in Libraries." College & Research Libraries 76, no. 3 (March 1, 2015): 251–67. http://dx.doi.org/10.5860/crl.76.3.251.

Full text
Abstract:
Seekers of information in libraries either go through a librarian intermediary or they help themselves. When they go through librarians they must develop their questions through four levels of need, referred to here as the visceral, conscious, formalized, and compromised needs. In his pre-search interview with an information-seeker the reference librarian attempts to help him arrive at an understanding of his “compromised” need by determining: (1) the subject of his interest; (2) his motivation; (3) his personal characteristics; (4) the relationship of the inquiry to file organization; and (5) anticipated answers. The author contends that research is needed into the techniques of conducting this negotiation between the user and the reference librarian.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Shu, Tsongming Lin, and Yingkai Liao. "The Intermediary Effect of Attachment Behavior in Live Streaming Marketing." Modern Economics & Management Forum 3, no. 4 (September 14, 2022): 262. http://dx.doi.org/10.32629/memf.v3i4.1023.

Full text
Abstract:
E-commerce enterprises regard the influence of Internet celebrity as a new driving force to stimulate business growth, and e-commerce Internet celebrity are the core basis to attract consumers to achieve corporate profits. The key point of this study is to reveal the influence mechanism of e-commerce Internet celebrity on consumer attachment behavior, and then find out the path to change and influence consumer attachment behavior. This paper hopes to clarify whether fans' attachment behavior plays an intermediary role in consumers' purchase intention through multiple aspects and construct a complete marketing theoretical model for the sales model of live broadcast with goods. The conclusion of this study is that the attachment behavior plays an intermediary role in live streaming marketing. (1) Fan attachment has a mediating effect on the influence of personal characteristics on Internet celebrity attachment and purchase intention. (2) Fan attachment has a mediating effect on the influence of information characteristics on Internet celebrity attachment, brand attachment and purchase intention. (3) Internet celebrity attachment has a mediating effect on the influence of personal characteristics on brand attachment and purchase intention. (4) Internet celebrity attachment has a mediating effect on the influence of information characteristics on brand attachment and purchase intention. (5) Brand attachment has a mediating effect on the influence of Internet celebrity attachment on purchase intention.
APA, Harvard, Vancouver, ISO, and other styles
5

Kusumawardani, Saskia, Sinta Dewi Rosadi, and Elisatris Gultom. "GOOD CORPORATE GOVERNANCE PRINCIPLES ON INTERNET INTERMEDIARY COMPANIES IN PROTECTING THE PRIVACY OF PERSONAL DATA IN INDONESIA." Yustisia Jurnal Hukum 9, no. 1 (May 6, 2020): 65. http://dx.doi.org/10.20961/yustisia.v9i1.39683.

Full text
Abstract:
<em>The implementation of good corporate governance (GCG) is the main foundation of companies that needs to run their business activities for a long period. Along with the development of technology and information, the implementation of GCG is increasingly needed for internet intermediary platform providers in carrying out their business activities. The implementation of GCG principles can also reduce the risk of failure in protecting privacy of personal data on the platform. The related principles are transparency, accountability, and responsibility principle by taking into account a number of laws and regulations such as Law No. 11 of 2008 as amended by Law No. of 2016 concerning Amendments to Law No. 11 of 2008 concerning Information and Electronic Transactions (ITE Law), Government Regulation No. 71 of 2019 (GR 71/2019), and Ministry of Communication and Information Regulation No. 20 of 2016. This research will use a normative juridical research method that takes into account the provisions of the legislation and other relevant documents. As a result, the implementation of GCG is not fully implemented in the case of failure in protecting privacy of personal data in internet intermediary company (PT Bukalapak), thus the legal attempt that can be applied to manifest the company’s liability refers back to ITE Law, GR 71/2019, and Ministry of Communication and Information Regulation 20/2016 which are compensation and administrative sanctions. </em>
APA, Harvard, Vancouver, ISO, and other styles
6

Koehler, Karl A. "Inducing phase transitions in local innovation networks: Implications for state economic development." Local Economy: The Journal of the Local Economy Policy Unit 32, no. 8 (November 7, 2017): 854–66. http://dx.doi.org/10.1177/0269094217739370.

Full text
Abstract:
States can undertake innovation system network-focused actions to enhance their entrepreneurial networks. Actions directed primarily at creating transitions in their innovation network structure include: identifying the components and connectivity of the innovation network (persons, entities, businesses, etc.) and communicating with the network; establishing intermediary organizations (academies, roundtables, councils, etc.); establishing interfacial organizations to enhance information diffusion; and creating and supporting an Informatics HUB to facilitate network functions. Actions to enhance information access and communications within the innovation network include: ensuring local access to global information; supporting personal and business interactions within and outside of the local innovation system; supporting creation and maintenance of missing databases; supporting recruitment of talent in gap areas; and utilizing knowledge analytics to identify local overlaps with the global knowledge base. These are relatively inexpensive, but nonetheless challenging, alternatives to firm-level direct payments or incentives typically used by local governments. This Perspective briefly sketches the rationale behind these and related recommendations.
APA, Harvard, Vancouver, ISO, and other styles
7

KARAKURT, Yağmur. "The Moderation Role of Need of Social Acceptance on the Relationships between Gender Roles and Sexual Quality." International Journal of Psychology and Educational Studies 9, no. 2 (March 26, 2022): 479–91. http://dx.doi.org/10.52380/ijpes.2022.9.2.740.

Full text
Abstract:
This study aimed to investigate the mediating role of the need for social acceptance in relation to the relationship between gender roles and sexual quality. The study was conducted with 576 participants aged 18 to 65 years who were married or in a relationship. Due to the pandemic, the scales were made available to participants through online platforms. The Personal Information Questionnaire was used to obtain participants' demographic data, the Gender Roles Scale (GRS) to measure their gender perceptions, the New Sexual Satisfaction Scale (NSS) to determine the quality of their sexuality, the Social Approval Need Scale (SANS) to determine their social approval needs. The data were analyzed using the SPSS 25.0 program. According to ANOVA and t-test results, demographic variables differed according to gender roles, sexuality quality, and social approval needs. A positive and negative correlation was found between gender roles and the sexuality quality variable with social approval. As a result of the intermediary variable analysis, it was found that the need for social approval plays an intermediary role in the relationship between gender roles and sexuality quality. The findings were discussed in the context of the results in the field.
APA, Harvard, Vancouver, ISO, and other styles
8

Hegarty, Rosaleen, Tom Lunney, Kevin Curran, and Maurice Mulvenna. "Ambient Interface Design (AID) for the Ergonomically Challenged." International Journal of Ambient Computing and Intelligence 2, no. 2 (April 2010): 57–64. http://dx.doi.org/10.4018/jaci.2010040104.

Full text
Abstract:
Mobile devices offer convenient communication capabilities and have the potential to create intermediary support for ergonomically challenged users. With the global proliferation of increasing longevity, assisting the elderly and those living with impediments through human engineering and computing technology is pivotal to biotechnological attainment. To remain independently empowered, seamless integrations through efficient affable interfaces are required to provide sedulous location-independent and appliance-sensitive media viewing for the user. The Ambient Interface Design (AID) system assists with finding personal preferences and provides a synchronisation framework, coordinating connectivity across various environmentally distributed devices via sensor data mapping. Cooperative interface communication coupled with context awareness will be abstracted to a representation that facilitates optimisation and customisation to these displays. To overcome personal challenges in the efficient selection and acquisition of online information, AID mediates between the needs of the user and the constraints of the technology to provide a singular customised encapsulation of ‘ability preference and device’ for each authenticated member. A particular emphasis is the application of a human-centered design ethos.
APA, Harvard, Vancouver, ISO, and other styles
9

Giglio, Ferdinando. "Crowdfunding: An Alternative Method to Invest." International Business Research 15, no. 3 (January 31, 2022): 13. http://dx.doi.org/10.5539/ibr.v15n3p13.

Full text
Abstract:
Crowdfunding platforms can be used by individuals both to launch fundraising campaigns and to invest their savings. Crowdfunding is a funding channel through which personal or professional projects of individuals and small businesses can be directly funded by a multitude of entities. The meeting between supply and demand takes place on online platforms that provide information on individual projects and manage the flows of money. Crowdfunding is an alternative financing channel to that represented by banks or other financial intermediaries. The actual financing of a project, in fact, does not depend on the evaluation made by a single intermediary based on its own financing strategies but on the ability of the proponents to convince a sufficient number of investors to risk their funds in direct support of the initiative.
APA, Harvard, Vancouver, ISO, and other styles
10

Hendricks-Sturrup, Rachele M., and Christine Y. Lu. "What motivates the sharing of consumer-generated genomic information?" SAGE Open Medicine 8 (January 2020): 205031212091540. http://dx.doi.org/10.1177/2050312120915400.

Full text
Abstract:
Genomic medicine is an emerging practice that followed the completion of the Human Genome Project and that considers genomic information about an individual in the provision of their clinical care. Large and start-up direct-to-consumer genetic testing companies like Ancestry, 23andMe, Luna DNA, and Nebula Genomics have capitalized on findings from the Human Genome Project by offering genetic health testing services to consumers without a clinical intermediary. Genomic medicine is thus further propelled by unprecedented supply and demand market forces driven by direct-to-consumer genetic testing companies. As government entities like the National Human Genome Research Institute question how genomics can be implemented into routine medical practice to prevent disease and improve the health of all members of a diverse community, we believe that stakeholders must first examine how and scenarios in which stakeholders can become motivated to share or receive genomic information. In this commentary, we discuss consumers three scenarios: satisfying personal curiosity, providing a social good, and receiving a financial return. We examine these motivations based on recent events and current avenues through which have engaged or can engage in genomic data sharing via private, secure (e.g. centralized genomic databases and de-centralized platforms like blockchain) and public, unsecure platforms (e.g. open platforms that are publicly available online). By examining these scenarios, we can likely determine how various stakeholders, such as consumers, might prefer to extract value from genomic information and how privacy preferences among those stakeholders might vary depending on how they seek to use or share genomic information. From there, one can recommend best practices to promote transparency and uphold privacy standards and expectations among stakeholders engaged in genomic medicine.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Intermediary of of personal information"

1

Katule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.

Full text
Abstract:
Personal informatics are important tools in health self-management as they support individuals to quantify and self-reflect on their lifestyle. Human-computer interaction researchers have devoted resources on studying how to design such tools. Various motivational strategies have been explored for their capabilities in improving user engagement. However, such strategies are developed with an assumption that the targeted consumer of information is the one directly manipulating user interfaces of the system that has information. This may not always be the case for users in developing regions. As a result, such systems may not scale well in contexts where a targeted consumer (beneficiary) may use technology through the facilitation of another person (intermediary) whom is responsible for manipulating user interfaces, because such facilitators are not recognized as part of the system, hence motivational strategies don't cater for them. In order to uncover design implications for intermediated technology use in the context of personal health informatics (PHI), the researcher started with the theoretical framing of the work followed by a contextual enquiry which led to development of mobile applications' prototypes for tracking nutrition and physical activity. Evaluation of the prototypes revealed that a familial relationship is a prerequisite for such an intervention. The most promising combination involves family members, possibly a child and a parent working together. The study used self-determination theory to understand how a collaborative gamified system can increase engagement. The result revealed that gamification as the source of a significant increase in perceived competence in intermediary users whom also tended to consider themselves as co-owners of the interaction experience. Therefore, gamification was found to be a catalyst for increasing collaboration between an intermediary and beneficiary user of technology, provided that the two users that formed a pair had a prior social relationship. In the absence of gamification, intermediary users tended to be less engaged in the intervention. The study highlights both the positive and negative aspects of gamification in promoting collaboration in intermediated use and its general implications in health settings. Design considerations required in order to improve the overall user experience of both users involved are proposed. In general, this work contributes to both theory and empirical validation of factors for, supporting proximate-enabled intermediated use of personal health informatics.
APA, Harvard, Vancouver, ISO, and other styles
2

LUCHETTA, GIACOMO. "Antitrust and regulation in the European Union: selected topics." Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.

Full text
Abstract:
With the Communication on Smart Regulation issued in October 2010, the European Commission tried to foster a better management of the whole policy cycle. According to that Communication, amending policy proposals must be preceded by an ex post assessment of the current situation, allowing ―closing the policy cycle‖. This paper tries to answer the question whether the EU Impact Assessments System is fit to steer and close the policy cycle, and what is the relation between ex ante IA and ex post evaluations ―on the ground‖ so far. This is done via a macro and micro analysis, based on scorecard approach and three case studies, comparing the EU IA system performance with a theoretical benchmark derived from the EU policy document and process. The paper concludes that the EU Impact Assessment system, as it is currently designed and implemented, it is not yet fit to steer and close the policy cycle. To achieve this goal, all the analytical and empirical layers of the policy cycle should be fully dealt with since the ex ante phase.
APA, Harvard, Vancouver, ISO, and other styles
3

Gartner, R. "Intermediary XML schemas." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.

Full text
Abstract:
The methodology of intermediary XML schemas is introduced and its application to complex metadata environments is explored. Intermediary schemas are designed to mediate to other ‘referent’ schemas: instances conforming to these are not generally intended for dissemination but must usually be realized by XSLT transformations for delivery. In some cases, these schemas may also generate instances conforming to themselves. Three subsidiary methods of this methodology are introduced. The first is application-specific schemas that act as intermediaries to established schemas which are problematic by virtue of their over-complexity or flexibility. The second employs the METS packaging standard as a template for navigating instances of a complex schema by defining an abstract map of its instances. The third employs the METS structural map to define templates or conceptual models from which instances of metadata for complex applications may be realized by XSLT transformations. The first method is placed in the context of earlier approaches to semantic interoperability such as crosswalks, switching across, derivation and application profiles. The second is discussed in the context of such methods for mapping complex objects as OAI-ORE and the Fedora Content Model Architecture. The third is examined in relation to earlier approaches to templating within XML architectures. The relevance of these methods to contemporary research is discussed in three areas: digital ecosystems, archival description and Linked Open Data in digital asset management and preservation. Their relevance to future research is discussed in the form of suggested enhancements to each, a possible synthesis of the second and third to overcome possible problems of interoperability presented by the first, and their potential role in future developments in digital preservation. This methodology offers an original approach to resolving issues of interoperability and the management of complex metadata environments; it significantly extends earlier techniques and does so entirely within XML architectures.
APA, Harvard, Vancouver, ISO, and other styles
4

Ko, Leonard L. "Personal information system /." Online version of thesis, 1993. http://hdl.handle.net/1850/11976.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Gurvinder. "Detection of intermediary hosts through TCP latency propagation." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.

Full text
Abstract:

Today people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.

APA, Harvard, Vancouver, ISO, and other styles
6

Honda, Jun. "Intermediary Search for Suppliers in Procurement Auctions." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.

Full text
Abstract:
In many procurement auctions, entrants determine whether to participate in auctions accounting for their roles of intermediaries who search for the best (or the cheapest) input suppliers. We build on a procurement auction model with entry, combining with intermediary search for suppliers. The novel feature is that costs of bidders are endogenously determined by suppliers who strategically charge input prices. We show the existence of an equilibrium with price dispersion for inputs, generating cost heterogeneity among bidders. Interestingly, the procurement cost may rise as the number of potential bidders increases. (author's abstract)
Series: Department of Economics Working Paper Series
APA, Harvard, Vancouver, ISO, and other styles
7

Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.

Full text
Abstract:
The spread of Information and Communication Technologies (ICTs) has transformed the way we deliver services, and has made them in general more efficient and more accessible to users. With these improvements however came new challenges. The extensive use of electronic services in our daily life, and the massive gathering of transactional data have led to serious privacy violations.
In this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
APA, Harvard, Vancouver, ISO, and other styles
8

McNeill, Allan. "Semantic structure of personal information." Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.

Full text
Abstract:
Thesis (Ph.D.) - University of Glasgow, 2002.
Ph.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
APA, Harvard, Vancouver, ISO, and other styles
9

Nelwamondo, Murendeni. "The role of intermediaries in information sharing between government and communities in Western Cape." University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.

Full text
Abstract:
Masters of Commerce
The use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
APA, Harvard, Vancouver, ISO, and other styles
10

Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Intermediary of of personal information"

1

Ingwersen, Peter. Information retrieval interaction: Design variables and intermediary functionality. Copenhagen: Royal School of Librarianship, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waldfogel, Joel. Does information undermine brand?: Information intermediary use and preference for branded web retailers. Cambridge, MA: National Bureau of Economic Research, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Ross, ed. Personal Medical Information. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Etzel, Barbara, and Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Allen, Bryce. Bibliographic and text-linguistic schemata in the user-intermediary interaction. Ottawa: National Library of Canada, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oregon. Division of Finance and Corporate Securities., ed. Protecting your personal information. [Salem, Or.]: Dept. of Consumer & Business Services, Division of Finance and Corporte Securities, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Access to personal information. Sydney, N.S.W: New South Wales Law Reform Commission, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Council, Learning and Skills. The Role of intermediary agencies in promoting information advice and guidance in the workplace. Coventry: LSC, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

D, Naumann Justus, ed. Personal productivity with information technology. New York, N.Y: McGraw-Hill Companies, Inc., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Webb, Sylvia P. Personal development in information work. 2nd ed. London: Aslib, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Intermediary of of personal information"

1

Yu, Wenli, Li Li, Jingyuan Wang, Dengbao Wang, Yong Wang, Zhanbo Yang, and Min Huang. "Learning Intermediary Category Labels for Personal Recommendation." In Web and Big Data, 124–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63564-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

King, Chris. "Personal Information." In Advanced BlackBerry 6 Development, 189–232. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3211-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Byon, Andrew Sangpil. "Personal information." In Modern Korean Grammar Workbook, 255–57. New York : Routledge-Taylor & Francis Group, [2017] | Series: Routledge Modern Grammars: Routledge, 2017. http://dx.doi.org/10.4324/9781315178158-63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

King, Chris. "Personal Information." In Advanced BlackBerry Development, 195–239. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2657-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wallwork, Adrian. "Personal Information." In English for Academic Research, 33–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11090-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

van der Burg, Martijn. "Intermediary Bodies of Governance." In Napoleonic Governance in the Netherlands and Northwest Germany, 67–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66658-3_4.

Full text
Abstract:
AbstractFollowing the phase of conquest, usually a temporary interim government was formed to supervise the incorporation of newly acquired territories. The timing of the incorporation, as well as the manner in which models from other parts of Europe were applied, influenced how Napoleonic governance worked out in practice. Importantly, the creation of so-called gouvernements généraux became a Napoleonic integration instrument. General-Governors Charles-François Lebrun in Amsterdam and Louis Nicolas Davout in Hamburg had similar tasks but made different choices. Their relationships with other actors, local and French, differed as well. In this chapter the two intermediary bodies are discussed, in relation to other Napoleonic institutions and their main protagonists. Often, Napoleonic officials who had already proven their worth elsewhere were employed in these areas. Thus, institutional examples and personal experiences from other parts of the Empire, such as Italy, influenced the integration of the North. Yet, being remote from the imperial core, many officials competed for power and hence for control of the integration process.
APA, Harvard, Vancouver, ISO, and other styles
7

Etzel, Barbara, and Peter Thomas. "Personal information management." In Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Newton. "Personal Information Management." In Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Etzel, Barbara, and Peter Thomas. "‘Information overload’ and information management ‘re-engineering’." In Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kauffman, Robert J., T. S. Raghu, and Matt Sopha. "Producer-Intermediary Relationships in the Long Tail." In Lecture Notes in Business Information Processing, 105–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17449-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Intermediary of of personal information"

1

Meissner, Fritz, and Edwin Blake. "Understanding culturally distant end-users through intermediary-derived personas." In the South African Institute of Computer Scientists and Information Technologists Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2072221.2072266.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maungwa, Tumelo, and Ina Fourie. "How experiences reported on intermediary information seeking from inter-disciplinary contexts can inform a study on competitive intelligence professionals." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2023.

Full text
Abstract:
Introduction. Intermediary and proxy searching, where one person searches on behalf of another, are noted in information science, health sciences and library science (e.g., reference work and early day online searching), professional workplace practices (e.g., lawyers, nurses) and everyday life contexts (e.g., caregivers). It is also observed within the competitive intelligence process, which involves collecting intelligence data from business environments on behalf of senior management and clients. Many problems occur in competitive intelligence intermediary information seeking that might be addressed by examining interdisciplinary contexts. Method. Literature searches were conducted in key library and information science, health science and law databases. A total of 136 publications were manually selected and analysed for a scoping literature review. Analysis. Thematic analysis was applied. Results. Challenges emerging from the thematic analysis are disaggregated into facets of intermediary information seeking (e.g., skills in question negotiation and information needs assessment, search heuristics and knowledge of information infrastructures). Conclusion. Systematised intermediary practices (e.g., application of appropriate question negotiation techniques, expanded knowledge of information infrastructures and landscapes, competitive intelligence domain knowledge and communication) can enhance intermediary information seeking, and should be investigated in competitive intelligence.
APA, Harvard, Vancouver, ISO, and other styles
3

Gallup, Lloyd, Jay McCormack, Steven Beyerlein, and Edwin Odom. "Rationale and Methodology for Deploying Axiomatic Design in Interdisciplinary Capstone Design Courses." In ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49885.

Full text
Abstract:
Capstone design courses require balanced attention to structured design processes as well as development of high quality design solutions. Process elements are commonly built into these courses through intermediate deliverables such as progress reports, design reviews, design reports, and forums for displaying prototypes as well as hardware. Despite this formal structure, steady evolution of design quality is not assured. Personal interaction with instructors, mentors, and clients is needed to evaluate intermediate designs and focus team efforts on design deficiencies as well as on promising design features. Clarification of functional requirements, determination of optimal design parameters, and implementation of viable solutions often requires considerable instructor and design team iteration. Design intent behind instructor feedback given at these junctures is not immediately obvious to many students. This paper outlines the rationale behind selecting and the methodology for deploying axiomatic design as a primary tool in an interdisciplinary design course. The selection of axiomatic design was based on 1) limited bandwidth for the introduction of new tools, 2) the desire to facilitate communication about design attributes between students and instructors, and 3) to provide continuity of application between various phases of the design process.
APA, Harvard, Vancouver, ISO, and other styles
4

Yamakami, Toshihiko. "Open intermediary analysis in mobile data services: Shift from closed to open intermediary services." In 2010 3rd International Conference on Information Sciences and Interaction Sciences (ICIS). IEEE, 2010. http://dx.doi.org/10.1109/icicis.2010.5534769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peter, Cruickshank, Gemma Webster, and Frances Ryan. "Assisting information practice: from information intermediary to digital proxy." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2017.

Full text
Abstract:
Introduction. Dependence on social media and other online systems as part of everyday life has grown considerably over the years. At the same time, the complexity and security of online systems has been increasing, making it more challenging for some people to access the services they need. This impacts the information practices of many users, leading to several scenarios where individuals need assistance in information related tasks, from registering for government services to updating social media content. This poster presents a summary of findings from two qualitative studies and serves as the initial foundation for a larger investigation related to digital proxies. Method. Different methods of investigation were used for each of the two studies. Study One used a combination of interviews and focus groups to determine how social media accounts are managed by and for older adults through the use of digital proxies. Study Two considered a series of scenarios in a workshop with information professionals and volunteers offering digital proxy services to older and vulnerable adults. Analysis. A narrative analysis of data was undertaken from each study independently. The results of these were then considered in tandem to determine patterns of information practices between the digital proxy roles in different contexts. Results. This work confirmed that digital proxies assist older and vulnerable adults in the use of social media and other online platforms, and that proxy roles are undertaken by a range of actors including information professionals, care workers, volunteers, and family members. Conclusion. This work provides a foundation in theorising the role of digital proxies from an information science perspective whilst providing a roadmap for future research in this vital area.
APA, Harvard, Vancouver, ISO, and other styles
6

Takizawa, Yui, Kazutaka Tsuji, and Tatsuhiro Yonekura. "How to Encourage Intermediary on Social Media." In 2012 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 2012. http://dx.doi.org/10.1109/nbis.2012.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Xiaoyu, Lianzhong Liu, Chunfang Li, and Zhouyang Li. "A CRM-oriented model for evaluating intermediary." In 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE, 2014. http://dx.doi.org/10.1109/itaic.2014.7065100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hu, Jianping. "Training Needs Analysis of Talent Intermediary Organization Based on Goldstein Model - A Case Study of a Talent Intermediary Organization." In 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM). IEEE, 2011. http://dx.doi.org/10.1109/icm.2011.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alijani, Reza, Siddhartha Banerjee, Kamesh Munagala, and Kangning Wang. "The Limits of an Information Intermediary in Auction Design." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xiaoping, Wu. "PROBLEMS, TASKS AND COUNTERMEASURES FOR TEACHING SECONDARY WRITING BASED ON CHINESE PROFICIENCY GRADING STANDARDS — FROM THE PERSPECTIVE OF MEMETI." In Chinese Studies in the 21st Century. Buryat State University Publishing Department, 2022. http://dx.doi.org/10.18101/978-5-9793-1802-8-2022-52-59.

Full text
Abstract:
Writing is a personalized creative activity. From the perspective of memetics, the collection-conception-expression process in writing behavior is consistent with the as-similation-memory-expression-dissemination process of memes. Compared with the ele-mentary level, the language ability index points of the intermediate level have a large span. Due to the limitation of the Chinese level, the learners cannot realize the equivalence between personal cognitive information and Chinese expression. The lack of willingness of Chinese learners to write in Chinese is the main problem faced by the intermediate writ-ing teaching. Based on the description of medium writing ability in the Chinese proficien-cy level standard, writing teaching helps students build cognitive memes and language memes. In the middle stage, language memes are mainly applied stylistic training to im-prove the accuracy of word expression and the integrity of content Sex is the core mission. In teaching, countermeasures such as strengthening the cultivation of students' cognitive ability, strengthening the cognitive connection between Chinese and students' mother tongue, and improving the accuracy of students' Chinese expression can be adopted.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Intermediary of of personal information"

1

Waldfogel, Joel, and Lu Chen. Does Information Undermine Brand? Information Intermediary Use and Preference for Branded Web Retailers. Cambridge, MA: National Bureau of Economic Research, September 2003. http://dx.doi.org/10.3386/w9942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garfinkel, Simson L. De-identification of personal information. National Institute of Standards and Technology, October 2015. http://dx.doi.org/10.6028/nist.ir.8053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nystrom, M., S. Parkinson, A. Rusch, and M. Scott. PKCS #12: Personal Information Exchange Syntax v1.1. Edited by K. Moriarty. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Helton-Fauth, Whitney B. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program. Fort Belvoir, VA: Defense Technical Information Center, March 2008. http://dx.doi.org/10.21236/ada477739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Forsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bukhari, Hanan, Kelly Weathers, and Barbara Frazier. Information-seeking and Personal Capital in Novice Learners' Creative Design Approach. Ames: Iowa State University, Digital Repository, November 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bridges, W. M., and Harld L. Frohman. An Electronic Data Interchange Prototype for Exchanging Personal Property Shipment Information. Fort Belvoir, VA: Defense Technical Information Center, March 1992. http://dx.doi.org/10.21236/ada260908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hasty, III, and Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada242183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McGregor-Lowndes, Myles, Marie Balczun, and Alexandra Williamson. Ancillary Funds 2000–2019: ACPNS Current Issues Information Sheet 2021-1. Queensland University of Technology, July 2021. http://dx.doi.org/10.5204/rep.eprints.211850.

Full text
Abstract:
There are two types of ancillary funds that may qualify for DGR status – Private Ancillary Funds (PAFs) and Public Ancillary Funds (PubAFs). The intended purpose of an ancillary fund is to act as an intermediary between donors and organisations (not individuals) that can receive tax deductible donations. In total, as at 30 June 2019, there were 3,090 ancillary funds, with combined net assets of $10.33 billion. They received $1.39 billion in donations in the 2018–19 year and distributed $967 million in grants.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography