Academic literature on the topic 'Intermediary of of personal information'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intermediary of of personal information.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intermediary of of personal information"
Asunka, Anna. "Internet Service Providers and Intermediary Liabilities." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 23, 2022): 113–18. http://dx.doi.org/10.22624/aims/crp-bk3-p19.
Full textMarotta, Veronica, Yue Wu, Kaifu Zhang, and Alessandro Acquisti. "The Welfare Impact of Targeted Advertising Technologies." Information Systems Research 33, no. 1 (March 2022): 131–51. http://dx.doi.org/10.1287/isre.2021.1024.
Full textTaylor, Robert S. "Question-Negotiation and Information Seeking in Libraries." College & Research Libraries 76, no. 3 (March 1, 2015): 251–67. http://dx.doi.org/10.5860/crl.76.3.251.
Full textWang, Shu, Tsongming Lin, and Yingkai Liao. "The Intermediary Effect of Attachment Behavior in Live Streaming Marketing." Modern Economics & Management Forum 3, no. 4 (September 14, 2022): 262. http://dx.doi.org/10.32629/memf.v3i4.1023.
Full textKusumawardani, Saskia, Sinta Dewi Rosadi, and Elisatris Gultom. "GOOD CORPORATE GOVERNANCE PRINCIPLES ON INTERNET INTERMEDIARY COMPANIES IN PROTECTING THE PRIVACY OF PERSONAL DATA IN INDONESIA." Yustisia Jurnal Hukum 9, no. 1 (May 6, 2020): 65. http://dx.doi.org/10.20961/yustisia.v9i1.39683.
Full textKoehler, Karl A. "Inducing phase transitions in local innovation networks: Implications for state economic development." Local Economy: The Journal of the Local Economy Policy Unit 32, no. 8 (November 7, 2017): 854–66. http://dx.doi.org/10.1177/0269094217739370.
Full textKARAKURT, Yağmur. "The Moderation Role of Need of Social Acceptance on the Relationships between Gender Roles and Sexual Quality." International Journal of Psychology and Educational Studies 9, no. 2 (March 26, 2022): 479–91. http://dx.doi.org/10.52380/ijpes.2022.9.2.740.
Full textHegarty, Rosaleen, Tom Lunney, Kevin Curran, and Maurice Mulvenna. "Ambient Interface Design (AID) for the Ergonomically Challenged." International Journal of Ambient Computing and Intelligence 2, no. 2 (April 2010): 57–64. http://dx.doi.org/10.4018/jaci.2010040104.
Full textGiglio, Ferdinando. "Crowdfunding: An Alternative Method to Invest." International Business Research 15, no. 3 (January 31, 2022): 13. http://dx.doi.org/10.5539/ibr.v15n3p13.
Full textHendricks-Sturrup, Rachele M., and Christine Y. Lu. "What motivates the sharing of consumer-generated genomic information?" SAGE Open Medicine 8 (January 2020): 205031212091540. http://dx.doi.org/10.1177/2050312120915400.
Full textDissertations / Theses on the topic "Intermediary of of personal information"
Katule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.
Full textLUCHETTA, GIACOMO. "Antitrust and regulation in the European Union: selected topics." Doctoral thesis, Luiss Guido Carli, 2013. http://hdl.handle.net/11385/200830.
Full textGartner, R. "Intermediary XML schemas." Thesis, City, University of London, 2018. http://openaccess.city.ac.uk/20288/.
Full textKo, Leonard L. "Personal information system /." Online version of thesis, 1993. http://hdl.handle.net/1850/11976.
Full textSingh, Gurvinder. "Detection of intermediary hosts through TCP latency propagation." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9029.
Full textToday people from all lifestyles, government officials, researchers and executives use internet. The people start to depend on internet for their daily life. However, the increased dependence comes with a great risk. The popularity and potential of internet attracts users with illegal intentions as well. The attackers generally establish a connection chain by logging in to a number of intermediary hosts before launching an attack at the victim host. These intermediary hosts are called as stepping-stones. On the victim side, it becomes hard to detect that the peer communicating with the victim is whether a real originator of the connection or it is merely acting as an intermediary host in the connection chain. This master dissertation proposed an approach based on Interarrival packet time to distinguish an incoming connection from a connection coming via some intermediary hosts. The proposed approach uses information available at the receiving end and applicable to encrypted traffic too. The approach was successfully tested for SSH, Telnet, FTP, HTTP and SMTP protocols and implemented in to an intrusion detection system for corresponding protocols. The main applications for the proposed approach are Manual intrusion detection, Tor usage detection and Spam messages detection. The approach is also applicable for the digital forensics investigations. Keywords : Network security, Stepping stone detection, Manual intrusion detection, Tor usage detection, Spam detection and Digital forensics investigation.
Honda, Jun. "Intermediary Search for Suppliers in Procurement Auctions." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4628/1/wp203.pdf.
Full textSeries: Department of Economics Working Paper Series
Layouni, Mohamed. "Privacy-preserving personal information management." Thesis, McGill University, 2010. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=86764.
Full textIn this thesis we provide techniques to enhance users' privacy, and to give them greater control over their data. We propose a protocol allowing users to authorize access to their remotely-stored records, according to a self-chosen privacy policy, and without the storage server learning the access pattern to their records, or the index of the queried records. This prevents the storage server from linking the identity of the party retrieving a record to that of the record owner. In many applications, the association between the identity of the record retriever and that of the record owner represents sensitive information, and needs to be kept private. The proposed protocol is called Accredited Symmetrically Private Information Retrieval (ASPIR), and uses Brands's Anonymous Credentials [Bra00] and a Symmetrically Private Information Retrieval (SPIR) scheme by Lipmaa [Lip05], as building blocks.
Next, we extend the above ASPIR protocol to a setting where the stored records belong to multiple owners simultaneously. The new protocol, called Multi-Authorizer ASPIR, allows the owners of a record to authorize access to their data according to a self-chosen privacy policy, without the storage server learning the access pattern to their record. We present constructions for settings where the retrieving party has to provide authorizations either from all the owners of the target record, or from a subset of them of size greater that a certain threshold. We also consider the case of a General Access Structure, where the retrieval is allowed only if authorizations from certain pre-defined subsets of the owners are provided. The Multi-authorizer ASPIR protocol is more efficient than ASPIR, and can be built with any SPIR primitive.
Finally, we dedicate the last part of the thesis to applying privacy preserving techniques to a real world problem. In particular, we consider the area of e-health, and provide a privacy-preserving protocol for handling prescriptions in the Belgian healthcare system.
La prolifération des services électroniques a eu des retombées positives sur nos sociétés. Les technologies de l'information ont révolutionné divers domaines clé de notre vie, notamment les services gouvernementaux, les affaires, la santé, les transports, les communications et l'éducation. Souvent, le passage au numérique, a rendu les services plus accessibles, plus rapides, plus faciles à utiliser et socialement plus inclusifs. Cependant, avec ces améliorations sont apparus aussi de nouveaux problèmes. En effet, l'utilisation des services électroniques au quotidien, et la collecte massives de données transactionnelles sur les utilisateurs, ont conduit à l'établissement de ce qu'on appelle communément les "dossiers électroniques". Un dossier électronique est une compilation de données personnelles récoltées lorsqu'un individu effectue des transactions électroniques ou reçoit des services. Ces dossiers sont de plus en plus utilisés par le gouvernement et les corporations pour prendre des décisions importantes sur les individus, sans que ces derniers ne soient capables d'y participer.
Cette thèse présente des techniques pour protéger davantage la vie privée des citoyens et leur donner plus de contrôle sur leurs données. On propose, entre autres, un protocole pour permettre à des utilisateurs d'autoriser l'accès à leurs données, sauvegardées sur un serveur distant, sans que celui-ci n'apprenne d'informations sur la fréquence et la distribution des accès, ou même sur l'indice des données récupérées. Ceci empêche le serveur d'établir des liens entre l'identité d'un propriétaire de données, et celle de l'agent qui a demandé l'accès à ses données. On peut penser à une multitude de scénarios où la divulgation de l'existence d'un tel lien est non souhaitable. Le protocole qu'on propose est nommé ASPIR de l'Anglais (Accredited Symmetrically Private Information Retrieval), et utilise les systèmes de certification de Brands [Bra00], ainsi que le système SPIR de Lipmaa [Lip05].
Dans un deuxième temps, on généralise le protocole ASPIR initial à un environnement où les entrées appartiennent à plusieurs parties. Le nouveau protocole, nommé Multi-Authorizer ASPIR, permet aux propriétaires d'autoriser l'accès à leurs données selon une politique qu'ils ont eux même choisie, et sans que le serveur n'apprenne des informations sur la fréquence et la distribution des accès. On présente des constructions pour des scénarios où le demandeur de données doit fournir une autorisation de la part de tous les (respectivement une partie des) propriétaires. Le protocole, Multi-authorizer ASPIR, est plus performant, et peut être implanté avec n'importe quel système SPIR.
Enfin, la dernière partie de la thèse est dédiée à l'application des techniques de protection de la vie privée à un exemple concret de la vie courante. L'exemple qu'on traite appartient au domaine de la santé. On présente alors un protocole pour gérer les ordonnances médicales, qui est compatible avec le système de santé Belge. Le protocole proposé préserve la vie privée des patients et des médecins.
McNeill, Allan. "Semantic structure of personal information." Thesis, Connect to e-thesis, 2002. http://theses.gla.ac.uk/840/.
Full textPh.D. thesis submitted to the Department of Psychology, University of Glasgow, 2002. Includes bibliographical references. Print version also available.
Nelwamondo, Murendeni. "The role of intermediaries in information sharing between government and communities in Western Cape." University of the Western Cape, 2021. http://hdl.handle.net/11394/8293.
Full textThe use of Information and Communication Technology (ICT) to share information is rapidly increasing worldwide. The South African government uses ICT to extend sharing of information and provide services to communities through websites, portals, forums and other online platforms. However, there are still digitally divided communities – without access it these ICTs due to, among others, a lack of necessary computer skills and financial resources. Consequently, these communities miss opportunities to use ICTs to share information with the government. To address the digitally divided communities, the government established an initiative to build community ICT access centres (e-centres). These e-centres have become the intermediaries between government and communities as shared community facilities that provide access to ICTs and connect the digitally divided communities to government services with social and economic benefits. However, there seem to be disparities between the government's roles and the eventual roles played by intermediaries in information sharing between communities and the government. The disparity might lead to intermediaries not providing services expected by communities, which might affect how communities use intermediaries to communicate with the government.
Franz, Thomas [Verfasser]. "Semantic Personal Information Management / Thomas Franz." München : Verlag Dr. Hut, 2010. http://d-nb.info/1009972243/34.
Full textBooks on the topic "Intermediary of of personal information"
Ingwersen, Peter. Information retrieval interaction: Design variables and intermediary functionality. Copenhagen: Royal School of Librarianship, 1992.
Find full textWaldfogel, Joel. Does information undermine brand?: Information intermediary use and preference for branded web retailers. Cambridge, MA: National Bureau of Economic Research, 2003.
Find full textAnderson, Ross, ed. Personal Medical Information. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/978-3-642-59023-8.
Full textEtzel, Barbara, and Peter Thomas. Personal Information Management. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8.
Full textAllen, Bryce. Bibliographic and text-linguistic schemata in the user-intermediary interaction. Ottawa: National Library of Canada, 1989.
Find full textOregon. Division of Finance and Corporate Securities., ed. Protecting your personal information. [Salem, Or.]: Dept. of Consumer & Business Services, Division of Finance and Corporte Securities, 2007.
Find full textAccess to personal information. Sydney, N.S.W: New South Wales Law Reform Commission, 2010.
Find full textCouncil, Learning and Skills. The Role of intermediary agencies in promoting information advice and guidance in the workplace. Coventry: LSC, 2003.
Find full textD, Naumann Justus, ed. Personal productivity with information technology. New York, N.Y: McGraw-Hill Companies, Inc., 1997.
Find full textWebb, Sylvia P. Personal development in information work. 2nd ed. London: Aslib, 1991.
Find full textBook chapters on the topic "Intermediary of of personal information"
Yu, Wenli, Li Li, Jingyuan Wang, Dengbao Wang, Yong Wang, Zhanbo Yang, and Min Huang. "Learning Intermediary Category Labels for Personal Recommendation." In Web and Big Data, 124–32. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63564-4_10.
Full textKing, Chris. "Personal Information." In Advanced BlackBerry 6 Development, 189–232. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3211-7_6.
Full textByon, Andrew Sangpil. "Personal information." In Modern Korean Grammar Workbook, 255–57. New York : Routledge-Taylor & Francis Group, [2017] | Series: Routledge Modern Grammars: Routledge, 2017. http://dx.doi.org/10.4324/9781315178158-63.
Full textKing, Chris. "Personal Information." In Advanced BlackBerry Development, 195–239. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2657-4_6.
Full textWallwork, Adrian. "Personal Information." In English for Academic Research, 33–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11090-1_3.
Full textvan der Burg, Martijn. "Intermediary Bodies of Governance." In Napoleonic Governance in the Netherlands and Northwest Germany, 67–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66658-3_4.
Full textEtzel, Barbara, and Peter Thomas. "Personal information management." In Personal Information Management, 8–17. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_2.
Full textLee, Newton. "Personal Information Management." In Facebook Nation, 159–68. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5308-6_12.
Full textEtzel, Barbara, and Peter Thomas. "‘Information overload’ and information management ‘re-engineering’." In Personal Information Management, 25–31. London: Macmillan Education UK, 1996. http://dx.doi.org/10.1007/978-1-349-24869-8_4.
Full textKauffman, Robert J., T. S. Raghu, and Matt Sopha. "Producer-Intermediary Relationships in the Long Tail." In Lecture Notes in Business Information Processing, 105–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-17449-0_10.
Full textConference papers on the topic "Intermediary of of personal information"
Meissner, Fritz, and Edwin Blake. "Understanding culturally distant end-users through intermediary-derived personas." In the South African Institute of Computer Scientists and Information Technologists Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2072221.2072266.
Full textMaungwa, Tumelo, and Ina Fourie. "How experiences reported on intermediary information seeking from inter-disciplinary contexts can inform a study on competitive intelligence professionals." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2023.
Full textGallup, Lloyd, Jay McCormack, Steven Beyerlein, and Edwin Odom. "Rationale and Methodology for Deploying Axiomatic Design in Interdisciplinary Capstone Design Courses." In ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49885.
Full textYamakami, Toshihiko. "Open intermediary analysis in mobile data services: Shift from closed to open intermediary services." In 2010 3rd International Conference on Information Sciences and Interaction Sciences (ICIS). IEEE, 2010. http://dx.doi.org/10.1109/icicis.2010.5534769.
Full textPeter, Cruickshank, Gemma Webster, and Frances Ryan. "Assisting information practice: from information intermediary to digital proxy." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2017.
Full textTakizawa, Yui, Kazutaka Tsuji, and Tatsuhiro Yonekura. "How to Encourage Intermediary on Social Media." In 2012 15th International Conference on Network-Based Information Systems (NBiS). IEEE, 2012. http://dx.doi.org/10.1109/nbis.2012.102.
Full textSong, Xiaoyu, Lianzhong Liu, Chunfang Li, and Zhouyang Li. "A CRM-oriented model for evaluating intermediary." In 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). IEEE, 2014. http://dx.doi.org/10.1109/itaic.2014.7065100.
Full textHu, Jianping. "Training Needs Analysis of Talent Intermediary Organization Based on Goldstein Model - A Case Study of a Talent Intermediary Organization." In 2011 International Conference on Information Technology, Computer Engineering and Management Sciences (ICM). IEEE, 2011. http://dx.doi.org/10.1109/icm.2011.42.
Full textAlijani, Reza, Siddhartha Banerjee, Kamesh Munagala, and Kangning Wang. "The Limits of an Information Intermediary in Auction Design." In EC '22: The 23rd ACM Conference on Economics and Computation. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3490486.3538370.
Full textXiaoping, Wu. "PROBLEMS, TASKS AND COUNTERMEASURES FOR TEACHING SECONDARY WRITING BASED ON CHINESE PROFICIENCY GRADING STANDARDS — FROM THE PERSPECTIVE OF MEMETI." In Chinese Studies in the 21st Century. Buryat State University Publishing Department, 2022. http://dx.doi.org/10.18101/978-5-9793-1802-8-2022-52-59.
Full textReports on the topic "Intermediary of of personal information"
Waldfogel, Joel, and Lu Chen. Does Information Undermine Brand? Information Intermediary Use and Preference for Branded Web Retailers. Cambridge, MA: National Bureau of Economic Research, September 2003. http://dx.doi.org/10.3386/w9942.
Full textGarfinkel, Simson L. De-identification of personal information. National Institute of Standards and Technology, October 2015. http://dx.doi.org/10.6028/nist.ir.8053.
Full textNystrom, M., S. Parkinson, A. Rusch, and M. Scott. PKCS #12: Personal Information Exchange Syntax v1.1. Edited by K. Moriarty. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7292.
Full textHelton-Fauth, Whitney B. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program. Fort Belvoir, VA: Defense Technical Information Center, March 2008. http://dx.doi.org/10.21236/ada477739.
Full textForsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203780.
Full textForsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203845.
Full textBukhari, Hanan, Kelly Weathers, and Barbara Frazier. Information-seeking and Personal Capital in Novice Learners' Creative Design Approach. Ames: Iowa State University, Digital Repository, November 2016. http://dx.doi.org/10.31274/itaa_proceedings-180814-1450.
Full textBridges, W. M., and Harld L. Frohman. An Electronic Data Interchange Prototype for Exchanging Personal Property Shipment Information. Fort Belvoir, VA: Defense Technical Information Center, March 1992. http://dx.doi.org/10.21236/ada260908.
Full textHasty, III, and Thomas J. Protection of Personal Privacy Interests under the Freedom of Information Act. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada242183.
Full textMcGregor-Lowndes, Myles, Marie Balczun, and Alexandra Williamson. Ancillary Funds 2000–2019: ACPNS Current Issues Information Sheet 2021-1. Queensland University of Technology, July 2021. http://dx.doi.org/10.5204/rep.eprints.211850.
Full text