Academic literature on the topic 'Primary User Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Primary User Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Primary User Privacy"

1

Clark, Matthew, and Konstantinos Psounis. "Optimizing Primary User Privacy in Spectrum Sharing Systems." IEEE/ACM Transactions on Networking 28, no. 2 (2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jagwani, Priti, and Saroj Kaushik. "Entropy-Based Quantification of Privacy Attained Through User Profile Similarity." International Journal of Information Security and Privacy 15, no. 3 (2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.

Full text
Abstract:
Location-based services refer to services that use location as primary input. But accessing user's location by an adversary invites issues of privacy breach. Instead of specific location coordinates, its surrounding area known as cloaking region is revealed in order to get the service. K anonymity technique of location privacy ensures that at least K-1 users should be included within a specific cloaked region. Researches have established that on combining K anonymity with the idea of including similar users together in a cloaked region provides stringent privacy (especially from background and
APA, Harvard, Vancouver, ISO, and other styles
3

Ullah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem, and Muhammad Azhar Iqbal. "ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain." Journal of Medical Imaging and Health Informatics 9, no. 6 (2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.

Full text
Abstract:
Users around the world send queries to the Web Search Engine (WSE) to retrieve data from the Internet. Users usually take primary assistance relating to medical information from WSE via search queries. The search queries relating to diseases and treatment is contemplated to be the most personal facts about the user. The search queries often contain identifiable information that can be linked back to the originator, which can compromise the privacy of a user. In this work, we are proposing a distributed privacy-preserving protocol (OSLo) that eliminates limitation in the existing distributed pr
APA, Harvard, Vancouver, ISO, and other styles
4

Jaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.

Full text
Abstract:
Many mobile applications and virtual conversational agents now aim to recognize and adapt to emotions. To enable this, data are transmitted from users' devices and stored on central servers. Yet, these data contain sensitive information that could be used by mobile applications without user's consent or, maliciously, by an eavesdropping adversary. In this work, we show how multimodal representations trained for a primary task, here emotion recognition, can unintentionally leak demographic information, which could override a selected opt-out option by the user. We analyze how this leakage diffe
APA, Harvard, Vancouver, ISO, and other styles
5

AlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar, and Raeda AlQutob. "Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai." Information 11, no. 9 (2020): 415. http://dx.doi.org/10.3390/info11090415.

Full text
Abstract:
Introduction: Dubai city made a significant leap forward, which aligns with the vision of leadership, in the region’s eHealth services by adopting a unified electronic medical record system across the country. Electronic medical records provide a better, more efficient standard of care and a vital database that will streamline the administrative process and promote better outcomes with less utilization of resources. Medical records form an essential part in patient management and include a variety of patient data information that might be sensitive. Therefore, the primary challenge is to maint
APA, Harvard, Vancouver, ISO, and other styles
6

S. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, et al. "Privacy-Constrained Biometric System for Non-Cooperative Users." Entropy 21, no. 11 (2019): 1033. http://dx.doi.org/10.3390/e21111033.

Full text
Abstract:
With the consolidation of the new data protection regulation paradigm for each individual within the European Union (EU), major biometric technologies are now confronted with many concerns related to user privacy in biometric deployments. When individual biometrics are disclosed, the sensitive information about his/her personal data such as financial or health are at high risk of being misused or compromised. This issue can be escalated considerably over scenarios of non-cooperative users, such as elderly people residing in care homes, with their inability to interact conveniently and securely
APA, Harvard, Vancouver, ISO, and other styles
7

Ghosh, Isha, and Vivek Singh. "Phones, privacy, and predictions." Online Information Review 44, no. 2 (2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.

Full text
Abstract:
Purpose Mobile phones have become one of the most favored devices to maintain social connections as well as logging digital information about personal lives. The privacy of the metadata being generated in this process has been a topic of intense debate over the last few years, but most of the debate has been focused on stonewalling such data. At the same time, such metadata is already being used to automatically infer a user’s preferences for commercial products, media, or political agencies. The purpose of this paper is to understand the predictive power of phone usage features on individual
APA, Harvard, Vancouver, ISO, and other styles
8

Deni Ardiansyah and Lies Handrijaningsih. "The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)." International Journal of Science, Technology & Management 2, no. 4 (2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.

Full text
Abstract:
This research aims to analyze the impact of electronic service quality which consists of efficiency, fulfillment, reliability, privacy, responsiveness, contact, and compensation towards the customer satisfaction on the user of internet banking in PT Bank Rakyat Indonesia, Persero. Customer satisfaction is an urgent matter in banking and is one of the company duty to create that satisfaction out of every single service provided. The sample used in this research are respondents which are customers who use internet banking service from BRI. The data used in this research is primary data collected
APA, Harvard, Vancouver, ISO, and other styles
9

Cohn, Ellen R., and Jana Cason. "Editors' Note." International Journal of Telerehabilitation 9, no. 1 (2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.

Full text
Abstract:
The current issue of the International Journal of Telerehabilitation (IJT) contains original work that explores the feasibility of telerehabilitation for a diversity of purposes: a health and wellness program for caregivers; a phonological awareness program for children with hearing loss; telepractice in a school setting for at-risk youth; occupational therapy home visits employing mHealth to facilitate discharge from the acute admission back to the community, and speech and language intervention for primary school-aged children. The issue’s lead article, “Privacy and Security in Multi-User He
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." International Journal of Information Security and Privacy 14, no. 2 (2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of pr
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Primary User Privacy"

1

Makin, Cameron. "Primary User Obfuscation in an Incumbent Informed Spectrum Access System." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104015.

Full text
Abstract:
With a growing demand for spectrum availability, spectrum sharing has become a high-profile solution to overcrowding. In order to enable spectrum sharing between incumbent/primary and secondary users, incumbents must have spectrum protection and privacy from malicious new entrants. In this Spectrum Access System (SAS) advancement, Primary Users (PUs) are obfuscated with the efforts of the SAS and the cooperation of obedient new entrants. Further, the necessary changes to the SAS to support this privacy scheme are exposed to suggest improvements in PU privacy, Citizens Broadband Radio Service D
APA, Harvard, Vancouver, ISO, and other styles
2

张弦 and Xian Zhang. "Explaining public-private partnerships in China: case study of primary land development in Beijing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849368.

Full text
Abstract:
Public-private partnership (PPP) has been an important issue in recent decades. PPP is seen by some as a cure for inefficient and over-burdensome modern government. Yet, by observing practices in China, this research aims to answer the simple questions: why has there been a decline in PPPs? How does government decide whether or not to establish partnership with private enterprises? By investigating the case of Primary Land Development (PLD) in China especially in Beijing, this research has attempted to provide explanations mainly in relation to coordination effectiveness involving a resource
APA, Harvard, Vancouver, ISO, and other styles
3

Khemsiri, Praphamontripong Heyl Barbara Sherman Padavil George. "Leadership styles used in team building by administrators from accredited private primary schools in Bangkok." Normal, Ill. Illinois State University, 2002. http://wwwlib.umi.com/cr/ilstu/fullcit?p3088030.

Full text
Abstract:
Thesis (Ph. D.)--Illinois State University, 2002.<br>Title from title page screen, viewed January 3, 2006. Dissertation Committee: Barbara Heyl, George Padavil (co-chairs), Linda Lyman, Paul Baker. Includes bibliographical references (leaves 208-215) and abstract. Also available in print.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Primary User Privacy"

1

Salleh, Dani, and Mazlan Ismail. Infrastructure procurement framework for local authority. UUM Press, 2015. http://dx.doi.org/10.32890/9789670474434.

Full text
Abstract:
The spread of infrastructure requirements and variety in mechanisms used to secure contributions (infrastructure provision) from private sector was a reflection of the institutional framework in planning system.The study has identified that although both private and local authorities have a good understanding of the fundamental of concept of local infrastructure provision and the arguments for and against the use of private provision, there are still considerable areas of uncertainty surrounding the precise definition (as prescribed in the relevant legislations) and measurements of the key ele
APA, Harvard, Vancouver, ISO, and other styles
2

Paul, Torremans. Part VI The Law of Property, 33 Corporations. Oxford University Press, 2017. http://dx.doi.org/10.1093/law/9780199678983.003.0033.

Full text
Abstract:
This chapter examines the legal system governing corporations in relation to private international law. It begins with a discussion of the domicile of a corporation, which is sometimes used as a connecting factor for corporations in private international law, even if the concept of domicile applies primarily to natural persons. An example of a statute that uses the concept of domicile for corporations is the Income and Corporation Taxes Act 1988. Whereas every natural person gets a domicile of origin upon birth, a corporation's domicile is linked to its incorporation. A corporation is therefor
APA, Harvard, Vancouver, ISO, and other styles
3

Randhawa, Gurvaneet S., and Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.

Full text
Abstract:
Big data promises to harness the power of advanced computing to transform health and health care, including cancer research and care delivery. In health care, big data can be generated by administrative and clinical processes, by patients and families, and by machines. Ultimately, the goal of big data is to transform data into actionable knowledge with attention to four dimensions: person-level data collection; data access, exchange, and aggregation; population-level analytics; and provider, researcher, or patient-facing clinical decision support. A fabric of trust forms the basis for policies
APA, Harvard, Vancouver, ISO, and other styles
4

Kearney, Joseph D., and Thomas W. Merrill. Lakefront. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501754654.001.0001.

Full text
Abstract:
How did Chicago, a city known for commerce, come to have such a splendid public waterfront — its most treasured asset? This book reveals a story of social, political, and legal conflict in which private and public rights have clashed repeatedly over time, only to produce, as a kind of miracle, a generally happy ending. The book's authors study the lakefront's evolution from the middle of the nineteenth century to the twenty-first. Their findings have significance for understanding not only Chicago's history but also the law's part in determining the future of significant urban resources such a
APA, Harvard, Vancouver, ISO, and other styles
5

Olsen, Jan Abel. Funding sources: an overview. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198794837.003.0009.

Full text
Abstract:
This chapter provides an overview of alternative funding sources. It starts with the ‘three-party model’ to illustrate the money flows between households, providers, and purchasers, that is, government and private insurance as the third-party payers. The chapter distinguishes four funding sources which in sum will represent the total budget for possible healthcare expenditures: (1) patient payments (commonly referred to as ‘out-of-pocket’ payments); (2) private health insurance; (3) tax funding, including social insurance systems with payroll contributions; and (4) donations. These four source
APA, Harvard, Vancouver, ISO, and other styles
6

Fisher, Talia. Law and Economics of Alternative Dispute Resolution. Edited by Francesco Parisi. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199684250.013.008.

Full text
Abstract:
Alternative dispute resolution (ADR) refers to a variety of private processes for resolving disputes, independent of trial before a court of law. Economists are interested in ADR for two main reasons. First, from an ex post perspective, the manner in which disputes are resolved or decided in society affects the operation of the legal system and its cost-efficiency. Second, from an ex ante perspective, the manner in which rights are vindicated impacts primary behavior and investments in prospective dispute avoidance. The literature relating to the economic analysis of ADR can be divided into tw
APA, Harvard, Vancouver, ISO, and other styles
7

Adsul, Prajakta, and Purnima Madhivanan. Assessing the Community Context When Implementing Cervical Cancer Screening Programs. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0032.

Full text
Abstract:
This case study demonstrates the use of qualitative, community-based, participatory research to understand the context in which cervical cancer screening programs are implemented in rural India, thereby enabling not just successful implementation but also future sustainability of the program in the community. A series of studies were undertaken to understand the cervical cancer screening program in its current state and provide information for the implementation of future programs. These studies included (1) qualitative interviews with physicians delivering cervical cancer care in the private
APA, Harvard, Vancouver, ISO, and other styles
8

Dabhoiwala, Faramerz. Writing Petitions in Early Modern England. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198748267.003.0007.

Full text
Abstract:
Dabhoiwala explores the mechanics of claim-making and the emotional register in which that might be done, focusing on claims addressed not to a wide audience but to a specific and official one: he is concerned with private petitions addressed through the Master of Requests to Charles II. This channel, he argues, was primarily used by those below gentry rank. To make their case effectively, such people tended to turn to specialists with technical knowledge. Drawing on the papers of a scrivener whose services were valued, he examines how this process worked. The scrivener could advise his client
APA, Harvard, Vancouver, ISO, and other styles
9

Romanowski, Nick. Wetland Habitats. CSIRO Publishing, 2010. http://dx.doi.org/10.1071/9780643100220.

Full text
Abstract:
Wetland Habitats is a practical and easy to use manual for wetland restoration and conservation of diverse animal species. Covering all the recent work in this field, among other significant issues it discusses making the most of dams and created wetlands; reversing the effects of drainage, grazing, weirs, deteriorating water quality, and associated algal problems; captive breeding and reintroduction; and controlling weeds and vermin. &#x0D; The book describes a range of potential problems encountered during restoration efforts and approaches to dealing with them, so that readers will be able
APA, Harvard, Vancouver, ISO, and other styles
10

Trill, Suzanne. Lay Households. Edited by Andrew Hiscock and Helen Wilcox. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780199672806.013.24.

Full text
Abstract:
This chapter is primarily concerned with how devotional texts were used within lay (that is, non-clerical) households. As the household was frequently identified as ‘a little commonwealth’ such ‘private’ devotions had ‘political’ connotations, especially during a period in which officially sanctioned religious practices were continually shifting. This chapter focuses on how these changes impacted upon the devotions of three quite distinct seventeenth-century households: the controversial community established at Little Gidding by Nicholas Ferrar; the Presbyterian practice of Nehemiah Wallingto
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Primary User Privacy"

1

Çelik, Sabri. "The Conflict Management Styles Used by Managers of Private Primary Schools: An Example of Ankara." In Chaos, Complexity and Leadership 2013. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09710-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Szewczak, Edward J. "Personal Information Privacy and Internet Technology." In Encyclopedia of Information Science and Technology, First Edition. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch400.

Full text
Abstract:
Concerns about the collection of personal information by Internet technology and the possibility of misuse of that information are a primary reason why people limit their use of the Internet and are even limiting the success of e-commerce (Szewczak, 2004). Various uses of technology that collect and/or disseminate personal information include corporate and government databases, e-mail, wireless communications, clickstream tracking, hardware and software watermarks, and biometric devices. The main challenge to personal information privacy is the surreptitious monitoring of user behavior on the Internet without the user’s consent and the possible misuse of the collected information resulting in financial and personal harm to the user. Our focus is primarily on Internet use in the United States of America, though clearly the technology is global in nature and poses challenges and issues for societies around the world.
APA, Harvard, Vancouver, ISO, and other styles
3

Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Introducing the Check-Off Password System (COPS)." In End-User Computing. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch009.

Full text
Abstract:
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security provided by such a password (because they are more difficult to violate or “crack”). However, such passwords tend to be more difficult for end users to remember, particularly when the password does not spell a recognizable word (or includes non-alphanumeric characters such as punctuation marks or other symbols). Conversely, when end users select their own more easily remembered passwords, the passwords may also be easier to crack. This study presents a new approach to entering passwords, which combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords as well as high-protection, assigned-password procedures. The present study investigates trade-offs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all password procedures tested to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared with that high-security password. Further research will be conducted to investigate long-term benefits.
APA, Harvard, Vancouver, ISO, and other styles
4

Grandison, Tyrone, Pei-yun S. Hsueh, Liangzhao Zeng, et al. "Privacy Protection Issues for Healthcare Wellness Clouds." In Privacy Protection Measures and Technologies in Business Organizations. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-501-4.ch009.

Full text
Abstract:
Healthcare is ubiquitous in every business organization. Whether as the primary focus of the business or as a function of the well-being of a firm’s employees, health issues play a dominant role in commerce. This recognition and the demonstrated benefits of a healthy contributor or worker have promoted a rejuvenated emphasis on wellness. In order to garner the benefits of cloud computing and foster improved employee health, the Taiwan Collaboratory is developing a first instance of a Wellness Cloud, which is an integrated, interconnected, and intelligent well-being platform. As the data held in this cloud is potentially very sensitive, the protection of this data is of utmost importance. In this chapter, we present issues and solutions for protecting user data while enabling the data to be usefully processed and for value to be derived, by using advanced technology and by harnessing the cumulative knowledge or wisdom of the collective of users.
APA, Harvard, Vancouver, ISO, and other styles
5

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch043.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

Reddy, Keesara Sravanthi. "Blockchain-Enabled Decentralization Service for Automated Parking Systems." In Advances in Data Mining and Database Management. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3295-9.ch004.

Full text
Abstract:
Due to recent development in technology and smart devices in people's lives, their lives are becoming easier and safer. One of popular examples in todays is parking (i.e., people find free parking space without moving a long distance or consuming more time or fuel over the road network). Today many automated companies are designing vehicles, but we are still unable to get automatic parking system in an area. Finding free parking slot/space has a probability of revealing user's privacy (i.e., either by service provider to third party/attacker or submitted information [user personal information] can be hacked by an attacker [via performing attacks like Man in Middle, Denial of Service, etc.]). Hence, privacy is a main issue in parking. Providing sufficient privacy in parking to vehicle users is a primary concern of this chapter. For that, this chapter used the blockchain technology to avoid privacy issues (raised in parking searching). Blockchain technology makes reservation of parking slot transparent, decentralized, and secure (privacy-preserved).
APA, Harvard, Vancouver, ISO, and other styles
8

Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." In Advances in End User Computing. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-474-3.ch014.

Full text
Abstract:
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures historically have been the primary method of user authentication. There is an inverse relationship between the level of security provided by a password procedure and ease of recall for users. The longer the password and the more variability in its characters, the higher the level of security is that is provided by the password, because it is more difficult to violate or crack. However, such a password tends to be more difficult for an end user to remember, particularly when the password does not spell a recognizable word or when it includes non-alphanumeric characters such as punctuation marks or other symbols. Conversely, when end users select their own more easily remembered passwords, the passwords also may be cracked more easily. This study presents a new approach to entering passwords that combines a high level of security with easy recall for the end user. The Check-Off Password System (COPS) is more secure than self-selected passwords and high-protection, assigned-password procedures. The present study investigates tradeoffs between using COPS and three traditional password procedures, and provides a preliminary assessment of the efficacy of COPS. The study offers evidence that COPS is a valid alternative to current user authentication systems. End users perceive all tested password procedures to have equal usefulness, but the perceived ease of use of COPS passwords equals that of an established high-security password, and the new interface does not negatively affect user performance compared to a high-security password. Further research will be conducted to investigate long-term benefits.
APA, Harvard, Vancouver, ISO, and other styles
9

Kakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Geographic Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2038-4.ch018.

Full text
Abstract:
The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.
APA, Harvard, Vancouver, ISO, and other styles
10

Kakaletris, George, Dimitris Varoutas, Dimitris Katsianis, and Thomas Sphicopoulos. "Design and Implementation Approaches for Location-Based, Tourism-Related Services." In Information Communication Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-949-6.ch065.

Full text
Abstract:
The globally observed recession of mobile services market has pushed mobile network operators into looking for opportunities to provide value added services on top of their high cost infrastructures. Recent advances in mobile positioning technologies enable services that make use of the mobile user location information, offering intuitive, attractive applications to the potential customer. Mobile tourism services are among the primary options to be considered by service providers for this new market. This chapter presents the key concepts, capabilities, and considerations of infrastructures and applications targeted to the mobile tourist, covering data and content delivery, positioning, systems’ interactions, platforms, protocols, security, and privacy as well as business modelling aspects.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Primary User Privacy"

1

Rosenthal, Paul, and L. Jane Park. "Managing Information Systems Textbooks: Assessing their Orientation toward Potential General Managers." In InSITE 2009: Informing Science + IT Education Conference. Informing Science Institute, 2009. http://dx.doi.org/10.28945/3314.

Full text
Abstract:
This paper is an assessment of the topical coverage of current Managing Information Systems (MIS) textbooks. The MIS course is normally required of all undergraduate and graduate business majors , and therefore is their primary education in the use of IS/IT in the modern technology-oriented organization. However, the MIS textbooks researched do not attempt IS/IT management fluency. They do not even fully answer the questions normally asked by management and users during the justification and implementation of modern technology-oriented enterprise applications. The primary author has been teach
APA, Harvard, Vancouver, ISO, and other styles
2

Bahrak, Behnam, Sudeep Bhattarai, Abid Ullah, Jung-Min Jerry Park, Jeffery Reed, and David Gurney. "Protecting the primary users' operational privacy in spectrum sharing." In 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 2014. http://dx.doi.org/10.1109/dyspan.2014.6817800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Jingyi, Yanmin Gong, Lijun Qian, Riku Jaentti, Miao Pan, and Zhu Han. "Primary Users' Operational Privacy Preservation via Data-Driven Optimization." In 2017 IEEE Global Communications Conference (GLOBECOM 2017). IEEE, 2017. http://dx.doi.org/10.1109/glocom.2017.8254108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yao, Peng Ning, and Huaiyu Dai. "Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures." In 2010 IEEE Symposium on Security and Privacy. IEEE, 2010. http://dx.doi.org/10.1109/sp.2010.24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jianqing, Chi Zhang, Haichuan Ding, Hao Yue, and Yuguang Fang. "Policy-Based Privacy-Preserving Scheme for Primary Users in Database-Driven Cognitive Radio Networks." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brijaková, Annamária. "Information and digital literacy of teachers in Slovakia an their adaptation on homeschooling." In Agria Média 2020 : „Az oktatás digitális átállása korunk pedagógiai forradalma”. Eszterházy Károly Egyetem Líceum Kiadó, 2021. http://dx.doi.org/10.17048/am.2020.69.

Full text
Abstract:
The pandemic situation rapidly changed the way of education throughout the whole world. Teachers had to adapt to the virtual environment and started to use new media which many of them did not know before. In Slovakia, for some of them, it was a new opportunity how to transform education into the 21st century, others saw it as a challenge for learning to use innovative methods and technologies but many teachers perceived this period as very de-manding. Differences have emerged not only between individual schools but primarily bet-ween teachers themselves. The aim of our research during the clo
APA, Harvard, Vancouver, ISO, and other styles
7

Bonasif, Jorge. "Urban Transportation Conditions from the Metropolitan Area of Kuala Lumpur that will Impact and Endanger Putrajaya’s Sustainability Plan." In Environmental Engineering. VGTU Technika, 2017. http://dx.doi.org/10.3846/enviro.2017.101.

Full text
Abstract:
There is a growing demand for mobility and accessibility from the Klang Valley (The Greater Kuala Lumpur) into the city of Putrajaya. Putrajaya is the federal administrative Capital of Malaysia, conceived as the first sustainable intelligent city-garden. The public connectivity in Kuala Lumpur is mainly centralized with the RR (Rapid rail) integrated by the Light Rail Transit (LRT) and the MRT (Mass Rapid Transit) with connections by bus to the peripheral zones. However the primary mode of transportation is still private vehicles such as cars and motorcycles, with an increased use from 458,294
APA, Harvard, Vancouver, ISO, and other styles
8

Slusareva, Elena, and Maria Plugina. "Psychological Characteristics of Inclusive Educational Environments." In The Public/Private in Modern Civilization, the 22nd Russian Scientific-Practical Conference (with international participation) (Yekaterinburg, April 16-17, 2020). Liberal Arts University – University for Humanities, Yekaterinburg, 2020. http://dx.doi.org/10.35853/ufh-public/private-2020-45.

Full text
Abstract:
Inclusive education practices are now widespread in the Russian Federation and are aimed at ensuring the rights of everyone to education. One of the conditions for the effectiveness of inclusive education is the creation of an inclusive educational environment that ensures the personal and professional development of all the subjects of educational relations. Based on this, this article aims to provide a theoretical foundation and empirical investigation into the psychological characteristics of an inclusive educational environment. The following research methods were used to implement the goa
APA, Harvard, Vancouver, ISO, and other styles
9

Barcelos Jorge da Silveira, Victoria, Diego Moreira Souza, and Fabrício Peixoto Alvarenga. "Urban Landscape in the Historic Center of Campos dos Goytacazes:the effect of oil royalties on the use of public and private spaces between 1996 and 2020." In 7th International Congress on Scientific Knowledge. Perspectivas Online: Humanas e Sociais Aplicadas, 2021. http://dx.doi.org/10.25242/8876113220212431.

Full text
Abstract:
The analysis of space comes from its importance in people's daily lives, to carry out their optional, necessary and social activities. In addition to the geographic field, with its divisions and connections, space also influences social bonds, due to its imposition on segregating aspects imposed on society, reproducing it and supporting its relationships, being dynamic and ephemeral according to time . Thus, it is unquestionable that the historic center of a city is commonly defined by its ability to seduce its users, being a central place in relation to the rest of the built area, still remai
APA, Harvard, Vancouver, ISO, and other styles
10

Riis, Dan. "Developing Non-Gasoline Burning Outboard Motors for the UK MoD." In ASME 2005 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/icef2005-1223.

Full text
Abstract:
The UK Ministry of Defence (MoD) operates a wide range of small, high performance boats, used in varying environments, and locations throughout the world. These boats primarily operate using outboard motors (OBMs) due to the optimum power to size and weight ratios they provide, and the ease of maintenance compared to inboard motor boats. The use of OBMs has, with the exception of a large and heavy 27hp diesel (compression ignition) OBM, necessitated the use of Petrol (CIVGAS - F67). This dependency evolved from the difficulty encountered developing a reliable compression ignition OBM over the
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Primary User Privacy"

1

Punjabi, Maitri, Julianne Norman, Lauren Edwards, and Peter Muyingo. Using ACASI to Measure Gender-Based Violence in Ugandan Primary Schools. RTI Press, 2021. http://dx.doi.org/10.3768/rtipress.2021.rb.0025.2104.

Full text
Abstract:
School-related gender-based violence (SRGBV) remains difficult to measure because of high sensitivity and response bias. However, most SRGBV measurement relies on face-to-face (FTF) survey administration, which is susceptible to increased social desirability bias. Widely used in research on sensitive topics, Audio Computer-Assisted Self-Interview (ACASI) allows subjects to respond to pre-recorded questions on a computerized device, providing respondents with privacy and confidentiality. This brief contains the findings from a large-scale study conducted in Uganda in 2019 where primary grade 3
APA, Harvard, Vancouver, ISO, and other styles
2

Schnabel, Filipina, and Danielle Aldridge. Effectiveness of EHR-Depression Screening Among Adult Diabetics in an Urban Primary Care Clinic. University of Tennessee Health Science Center, 2021. http://dx.doi.org/10.21007/con.dnp.2021.0003.

Full text
Abstract:
Background Diabetes mellitus (DM) and depression are important comorbid conditions that can lead to more serious health outcomes. The American Diabetes Association (ADA) supports routine screening for depression as part of standard diabetes management. The PHQ2 and PHQ9 questionnaires are good diagnostic screening tools used for major depressive disorders in Type 2 diabetes mellitus (DM2). This quality improvement study aims to compare the rate of depression screening, treatment, and referral to behavioral health in adult patients with DM2 pre and post-integration of depression screening tools
APA, Harvard, Vancouver, ISO, and other styles
3

Baloch, Imdad, and Abeba Taddese. EdTech in Pakistan: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0035.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, Pakistan. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided
APA, Harvard, Vancouver, ISO, and other styles
4

Khalayleh, A., and A. Taddese. EdTech in Jordan: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0031.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries, in this case, in Jordan. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided b
APA, Harvard, Vancouver, ISO, and other styles
5

Taddese, A. EdTech in Ghana: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0030.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive; however, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Ghana. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
6

Upadhyay, Arjun, and Abeba Taddese. EdTech in Senegal: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0037.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive. The aim is to provide a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Liberia. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
7

Mullan, Joel, and Abeba Taddese. EdTech in Sierra Leone: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0038.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private sector partnerships, and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, in Sierra Leone. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
8

Upadhyay, Arjun, and Abeba Taddese. EdTech in Liberia: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0033.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private sector partnerships, and digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive. The aim is to provide a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Liberia. This report is based primarily on desk research, with quality assurance provided by a country expert.
APA, Harvard, Vancouver, ISO, and other styles
9

Otieno, J., and A. Taddese. EdTech in Kenya: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0032.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. These factors include the policy or vision for EdTech, institutional capacity, private-sector partnerships, and the digital infrastructure. The scans are intended to be comprehensive but are by no means exhaustive; however, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and, in this case, Kenya. This report was originally written in June 2020. It is based primarily on desk research, with quality as
APA, Harvard, Vancouver, ISO, and other styles
10

Kimenyi, Eric, Rachel Chuang, and Abeba Taddese. EdTech in Rwanda: A Rapid Scan. EdTech Hub, 2020. http://dx.doi.org/10.53832/edtechhub.0036.

Full text
Abstract:
EdTech Hub country scans explore factors that enable and hinder the use of technology in education. This includes policies, government leadership, private-sector partnerships and digital infrastructure for education. The scans are intended to be comprehensive but are by no means exhaustive; nonetheless, we hope they will serve as a useful starting point for more in-depth discussions about opportunities and barriers in EdTech in specific countries and in this case, in Rwanda. This report was originally written in June 2020. It is based primarily on desk research, with quality assurance provided
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!